{"id":1175,"date":"2011-03-20T14:58:01","date_gmt":"2011-03-20T22:58:01","guid":{"rendered":"\/?p=1175"},"modified":"2011-03-21T16:38:49","modified_gmt":"2011-03-22T00:38:49","slug":"six-new-authentication-methods-for-identityblog","status":"publish","type":"post","link":"https:\/\/www.identityblog.com\/?p=1175","title":{"rendered":"Six new authentication methods for Identityblog"},"content":{"rendered":"<p>Back in March 2006, when Information Cards were unknown and untested,\u00a0it became obvious that the best way for me to understand the issues\u00a0would be to put Information Cards onto Identityblog.\u00a0<\/p>\n<p><a href=\"\/?p=428\">I wrote the code in PHP<\/a>, and\u00a0a few\u00a0people started\u00a0trying out Information Cards.\u00a0 Since I was being <em>killed<\/em> by spam at the time, I decided to try an experiment:\u00a0\u00a0make it\u00a0mandatory to use an Information Card to leave a comment.\u00a0\u00a0It was worth a try.\u00a0\u00a0More people might check out InfoCards.\u00a0 And presto, my spam problems would go away.<\/p>\n<p>So on March 18th 2006 I posted <a href=\"\/?p=410\">More hardy pioneers try out InfoCard<\/a>, showing the first few people to give it all a whirl.<\/p>\n<p><img src=\"\/wp-content\/images\/2006\/03\/double-users.jpg\" alt=\"\" \/><\/p>\n<p>At first I thought my draconian &#8220;InfoCard-Only&#8221; approach would get\u00a0a lot of\u00a0peoples&#8217; hackles up and only last a few weeks.\u00a0 But\u00a0over time\u00a0more and more people seemed to be subscribing &#8211; probably because\u00a0Identityblog was one of the few sites that actually used InfoCards in production.\u00a0 And I never had spam again.<\/p>\n<p>How many people joined using InfoCards?\u00a0 Today I looked at my user list (see the screenshot below with PII fuzzed out).\u00a0\u00a0The answer:\u00a02958 people\u00a0successfully subscribed and passed email verification.\u00a0 There were then over 23,000 successful audited logins.\u00a0\u00a0Not\u00a0very many for a commercial site, but\u00a0not bad for\u00a0a technical blog.<\/p>\n<p><img src=\"\/wp-content\/images\/20011\/03\/subscribers_2011.gif\" alt=\"\" \/><\/p>\n<p>Of course, as we all know, the\u00a0powers at\u00a0the large commercial sites have preferred the <img style=\"position:relative;top:2px;\" src=\"\/wp-content\/images\/2011\/03\/nascar_inline.png\" alt=\"\" \/>\u00a0&#8220;NASCAR&#8221; approach of presenting a bunch of different buttons that redirect the user to,\u00a0uh,\u00a0something-or-other-that-can-be-phished,\u00a0ahem, in spite of\u00a0the privacy and security problems.\u00a0 This part of the conversation will go on for some time, since these problems will become progressively more\u00a0widespread as NASCAR\u00a0gains popularity and\u00a0the criminally\u00a0inclined tune in to its potential as a gold mine&#8230;\u00a0But that discussion is for another day.\u00a0<\/p>\n<p>Meanwhile,\u00a0I want to get my hands dirty and understand all the implications of the NASCAR-style approach.\u00a0 So recently I subscribed to\u00a0a nifty\u00a0<a href=\"http:\/\/www.janrain.com\" class=\"broken_link\">janrain\u00a0<\/a>service that offers a whole array of login methods.\u00a0\u00a0I then\u00a0integrated their stuff into Identityblog.\u00a0 I promise, Scout&#39;s Honor,\u00a0not to do man-in-the-middle-attacks or scrape your credentials, even though I probably could if I were so inclined.<\/p>\n<p>From now on, when you need to authenticate at Identityblog, you will see a NASCAR-style login symbol.\u00a0 See, for example, the <em>LOG IN<\/em> option at the top of this page.\u00a0<\/p>\n<p>If you are not logged in and\u00a0you want to leave a comment you will see\u00a0:<br \/>\n<img loading=\"lazy\" style=\"margin-left: 30px; vertical-align: middle; margin-right: 30px;\" src=\"\/wp-content\/images\/2011\/03\/nascar_comment.jpg\" alt=\"\" width=\"463\" height=\"240\" \/>\u00a0<\/p>\n<p>Click on the string of icons and you get something like this:<\/p>\n<p>\u00a0<img src=\"\/wp-content\/images\/2011\/03\/nascar.jpg\" alt=\"\" \/><\/p>\n<p>Because many people continue to use my site to try out Information Cards, I&#39;ve supplemented the <em>janrain\u00a0<\/em>widget experience\u00a0with\u00a0the <em>Pamelaware<\/em> Information Card Option (it was pretty easy to\u00a0make them coexist, and it leaves me with at least one\u00a0unphishable alternative).\u00a0 This will also\u00a0benefit people who don&#39;t like the idea of linking their identifiers all over the web.\u00a0 I\u00a0expect\u00a0it\u00a0will help researchers and students too.<\/p>\n<p>One warning:\u00a0 Janrain&#39;s otherwise\u00a0polished implementation doesn&#39;t work properly with Internet Explorer &#8211; it leaves\u00a0a spurious &#8220;Cross Domain Receiver Page&#8221; lurking on your desktop.\u00a0\u00a0[<strong>Update<\/strong> &#8211; this was apparently my problem: see <a href=\"\/?p=1176\">here<\/a>]\u00a0 Once I figure out how to contact them (not evident), I&#39;ll ask janrain if and when they&#39;re going to fix this.\u00a0 Anyway,\u00a0the system\u00a0works &#8211;\u00a0just a bit messy because you have to manually close the stranded empty page.\u00a0 The problem doesn&#39;t appear in Firefox.\u00a0<\/p>\n<p>It has\u00a0already been\u00a0a riot\u00a0looking\u00a0into the new technology and\u00a0working through\u00a0the implications.\u00a0 I&#39;ll talk about\u00a0this as we go forward.<\/p>\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I want to get my hands dirty and understand all the implications of the NASCAR-style approach. It&#39;s already been a riot looking into this and working through the implications.<\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2,7,47,56,61,11],"tags":[],"_links":{"self":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/1175"}],"collection":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1175"}],"version-history":[{"count":0,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/1175\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1175"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1175"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1175"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}