Skip to content
This repository was archived by the owner on Sep 23, 2025. It is now read-only.
This repository was archived by the owner on Sep 23, 2025. It is now read-only.

Develop additional authentication mechanisms to run alongside WebID+TLS #22

@dmitrizagidulin

Description

@dmitrizagidulin

Develop an alternative mechanism to the current in-browser-only certificate-based WebID authentication workflow.

Note: This is part of a two-pronged approach - 1) continue to improve the browser's certificate management UI and overall user experience (possibly get in touch with the browser vendors), and 2) (this issue here) develop a short-term alternative to WebID-TLS.

Friction points with current approach

  • Firefox bug requiring browser restart when first signing up for a WebID
  • User unfamiliarity with certificate management
  • Lacking or limited support in several browsers (Internet Explorer, mobile browsers, etc)
  • Lack of Log Out capability
  • No good story for use on public/shared computers
  • Limited or confusing UI for many use cases:
    • no good way of determining which app/browser tab is requesting a certificate (the UI only shows what datastore is being accessed)
    • difficulty in managing multiple identities, once a user has a handful of certificates
    • initial confusion when first using a Solid app, before a user has a WebID
  • Current browser-centric focus makes it difficult for non-Javascript programming languages to interact with Solid

Possible Approaches (Proposals so far)

  1. Username & Password authentication to a user's pod, and the pod would proxy requests (possibly using parts of the WebID Delegated Requests mechanism) to other pods
  2. WebID RSA proposal
  3. Use HTTP-Signature instead of WebID-RSA
  4. Sandro's Spot spec.
  5. indieauth (see IndieAuthProtocol) / distributed-indieauth

Related / Helpful Reading

The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes - a remarkable paper evaluating 20 years' worth of authentication schemes, and rating them on various criteria (security, usability, ease of deployment, etc).

W3C Credential Management Level 1 recommendations

Wikipedia entries: https://en.wikipedia.org/wiki/Single_sign-on and https://en.wikipedia.org/wiki/List_of_single_sign-on_implementations

JSON Web Tokens

W3C FIDO 2.0 Platform Specifications (see W3C Welcomes the FIDO 2.0 Member Submission post)

W3C Good Practices for Capability URLs

indiecert/auth and Introducing IndieCert blog post

WebDHT

YouID

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions