Preview

Open Id

Good Essays
Open Document
Open Document
1241 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Open Id
Open ID and Web Security
INFORMATION SYSTEMS AND OPERATION MANAGEMENT
Lys Rodríguez de Castro Gonzáles 29484 Verónica Herrera Mestizo 30091 Manuela Oberhof 29477 Minyeong Kang 30084

01/02/2011
19/01/2010

1. Explain why OpenID offer users greater convenience and security than the current system

By using the current system, convenience and security are considered as problems, because the different sites have a different ID for the same user and also because most of this sites are not prepared to focus on security.
Getting to a web page using an Open ID, which is a users centric technology, solves this problems, because it is an identity provider and allows the user to have one single ID for all the websites they want to visit and also to control their own IDs.
The “convenience” problem is solved with the Open ID by allowing the user to login in different sites with the same ID in all of them, without registering in each site independently. Identity providers, like My Vidoop on the video, give the user the full control of his identity, so that he can also choose which ID provider he wants to use basing his decision on liability factors. Furthermore, the user of an ID provider can became his own identity provider after a while.
In terms of security, the ID provider is safer for the user because he only needs to trust one site with his login secrets, and as we said, is the user who chooses it when is not himself. 2. What are the possible drawbacks of the OpenID system?

Although it seems that the Open ID system has a lot of advantages, we may not forget that the video showed in the case study is an advertising video from My Vidoop.
This brings us to look for some disadvantages about the new system. First of all, we could mention that since the ID provider is a third

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Unit 8 Lab 1

    • 421 Words
    • 2 Pages

    10. Single sign-on (SSO) is a property of access control of multiple related, but independent software systems. With this property a user logs in once and gains access to all systems without being prompted to log in again at each of them. Microsoft SharePoint Server…

    • 421 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1210 Labs 3.1-3.4

    • 1882 Words
    • 9 Pages

    Personal information and business will slow down due to each vendor having its own standards/protocols. It will also be more vulnerable to attacks and make accessing more difficult.…

    • 1882 Words
    • 9 Pages
    Satisfactory Essays
  • Satisfactory Essays

    34. Kerberos is an example of a single sign-on system providing enterprises with scalability and flexibility.…

    • 352 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Lab 2

    • 473 Words
    • 2 Pages

    How does OAuth 1 or OAuth 2 impact the bottom line cost to a corporation versus the impact to the client and their privacy? By conducting a quantitative research study, I will survey the top 10 most popular websites based on number of users and document which protocol they use, how much money is spent on implementing cybersecurity measures and finally, how OAuth 1 or OAuth 2 affects the consumer. I will catalog how OAuth 1 or OAuth 2 affects the client by determining how often the user’s personal information is unwillingly…

    • 473 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 4

    • 359 Words
    • 1 Page

    1. What is the term used to describe a read-only copy of a user profile stored on a network share? Mandatory Profile.…

    • 359 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    It/205 Week 5 Checkpoint

    • 593 Words
    • 3 Pages

    There are many different types of payment systems, but the four major ones are Online Credit Card Payment System, Online Electronic Cash System, Electronic Check System and Smart Cards based Electronic Payment System. The key advantages to these systems vary from privacy, integrity, compatibility, good transaction efficiency, acceptability, convenience, mobility, low financial risk and anonymity, compared to the traditional method of payment systems. There are some feared concerns with the credit card system such as lack of authentication, repudiation of charges and credit card frauds, and also having to reveal credit information at…

    • 593 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Liberty vs. Security

    • 363 Words
    • 2 Pages

    A national identification card would be used to prove our identity to government officials. There are various arguments for and against having this identification card. The arguments in favor are that it would be easier to identify and control immigration. The arguments against a national I.D. card are that it would be difficult to ensure that the majority of the population would register for it. Some, such as the homeless, might have trouble proving their identities in order to receive a card because of a lack of Social Security numbers or birth certificates. Also there is no point in having a separate national identity card when the state driver's license system is already in place. This card can be used to track individuals, if the government chooses not to create this database, then it might be too easy for people to commit fraud by having multiple cards with different identities. I know that having an identification card can make us feel more secure but still I don’t think it would stop crime.…

    • 363 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    a. Active Directory Federation Services (AD FS) provides Web single-sign-on (SSO) technologies to authenticate a user to multiple Web applications using a single user account. AD FS accomplishes this by securely federating, or sharing, user identities and access rights, in the form of digital claims, between partner organizations.…

    • 646 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Mathias (2013) stated that identity management (ID management) is defined as a wide-ranging area that manages the personal identification during a system, (such as a country or a social networking) and have access to gain resources from it through associating user rights and restriction with established identity.…

    • 1633 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Advantages with this tool is that they were “the market leader in creating and managing private, brand-focused online communities for major corporate clients.” They also had an advantage in building relationships with the consumers, they create a level of trust which leads to a high return on insight.…

    • 317 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Afrigator

    • 838 Words
    • 4 Pages

    2.4. User could log on to multiple websites using Afrigator’s Open ID rather than create yet another account. Another interesting feature was that even bloggers who did not register on the site would have their content indexed and Afrigator could track blog posts even if bloggers had not registered on its site.…

    • 838 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Using a User-ID enables you to track the same user across multiple devices. This User-ID could come from your POS system, kiosk at the mall, or internal database or CRM system.You cannot send personally identifiable information to Google Analytics. When enabling the Google Analytics User-ID feature, you must ensure that your privacy policy complies with the following statement from Google:“You will not (and will not allow any third party to) use the Service to track or collect personally identifiable information of Internet users, nor will You (or will You allow any third party to) associate any data gathered from Your website(s) (or such third parties’ website(s)) with any personally identifying information from any source as part of Your use (or such third parties’ use) of the Service. You will have and abide by an appropriate privacy policy and will comply with all applicable laws relating to the collection of information from visitors to Your websites. You must post a privacy policy and that policy must provide notice of your use of a cookie that collects anonymous traffic…

    • 893 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Pre Phd Syllabus Hntuk

    • 742 Words
    • 3 Pages

    Electronic Mail & IO Security good Privacy, SIMIME, IP Security Architecture, Authentication Header, Encapsulating Security, Pay load Key Management Issues.…

    • 742 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    SRS for passport

    • 740 Words
    • 3 Pages

    · This existing system is not providing secure registration and profile management of all the users properly.…

    • 740 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    What Is Internet

    • 324 Words
    • 1 Page

    Unlike online services, which are centrally controlled, by design, the Internet is decentralized. Each Internet computer, called a host, is independent. Operators can choose which Internet services to use and which local services to make available to the global Internet community. Remarkably, this anarchy by design works exceedingly well. There are a variety of ways to access the Internet. Most online services offer access to some Internet services. It is also possible to gain access through a commercial Internet Service Provider (ISP).…

    • 324 Words
    • 1 Page
    Satisfactory Essays

Related Topics