Open ID TX : Topic lists for each spec ( draft )

Spec Topic Description
XRDS-EX certificate resolution participants find and fetch the coutnter parties certficate
certificate verification verify the certificate is proper or not
service verification verify the service offered to use by a party is proper or not
security consideration XRDS-EX security consideration
DS namespace definition OpenID namespace for DS extension
signature algorism and parameter both partiies must properly verify the coutner party’s digital signature
signature negotiation rule way to tell signature algorism and parameters to the coutner party( for security compromise)
request schema definition define parameters for digitaly sign and verify a request message
response schema definition define parameters for digitaly sign and verify a response message
nonce rule rule the nonce to identify every single unique message
encoding rule how to encode name and value
digest rule rule for calculating digest value
signature rule rule for delivering digital signature
direct call and indirect call note about calling procedure
security consideration DS security consideration
AX-EX bi-direction call currently AX expect only a RP initiates request
direct call currently AX expect only indirect call as per OpenID signon 
artifact binding call for mobile devices
delayed response and ticket decouple data response from data reqeust
security consideration AX-EX security consideration
CX namespace definition OpenID namespace for CX extension
offer data schema definition define offer message
contract data shema definition define contract message
security consideration CX security consideration
EN namespace definition OpenID namespace for AX extension
shared key exchange rule both partiies must secretly exchange the shared key to enrypt secure data
encryption algorism and parameter accepting parth must property decrypto the message encrypted by offering party
message packing rule how to pack a parameter in a encrypted attribute
encryption negotiation rule way to tell encryption algorism and parameters to the coutner party( for security compromise)
security consideration EN security considerations
カテゴリー: 未分類 パーマリンク

コメントを残す

以下に詳細を記入するか、アイコンをクリックしてログインしてください。

WordPress.com ロゴ

WordPress.com アカウントを使ってコメントしています。 ログアウト / 変更 )

Twitter 画像

Twitter アカウントを使ってコメントしています。 ログアウト / 変更 )

Facebook の写真

Facebook アカウントを使ってコメントしています。 ログアウト / 変更 )

Google+ フォト

Google+ アカウントを使ってコメントしています。 ログアウト / 変更 )

%s と連携中