Guide for OpenID+WebID? Proxy Service that Enables WebID? Exploitation via OpenID
All of our early WebID?
demonstrations focused on exposing the critical value that WebID?
brings to OpenID
Basically, that takes the form of eliminating username-and-password-based authentication on the more obvious front, while disambiguating hyperlink-based Names and Addresses on the less obvious front, with Linked Data in mind (i.e., via OpenID
you ended up with a URI based global Identifier with the requisite fidelity for InterWeb?
scale User Centric Identity)
In recent times, we've decoupled many of our WebID? implementation layers from both Virtuoso and ODS.
The net effects of these actions are:
What follows is a simple step-by guide showcasing the OpenID+WebID? proxy service:
- Get yourself a WebID.
- Visit a space on the InterWeb? that supports OpenID-based authentication.
- When challenged for your WebID? URL, simply provide a URL in the following form:
You will notice that you are able to use OpenID without username-and-password-based authentication.
You simply present your X.509 certificate, and that's it.
Why is this important?
WebID? is best understood and appreciated when experienced as a complementary enhancement of what exists.
Here is a sequence of screenshots that showcase OpenID+WebID? using the decoupled proxy service we now provide, distinct from the ODS instances used in our much earlier implementation demos:
- Load http://openid-demo.appspot.com/ in your web browser.
- Enter your WebID?:
- When challenged for certificate authorization, select your X.509 certificate:
- You should be redirected to Virtuoso OpenID Authentication Service Endpoint, asking you how to proceed further.
- Finally, you should be successfully logged in: