Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Microsoft The Internet

Microsoft Opens Up Windows Live ID 212

randommsdev writes "Microsoft has announced the release of Windows Live ID Web Authentication. This means that WLID (formerly known as Passport) is now opened to third party websites to use as their authentication system. Any Windows Live user can potentially log in to a website that implements Web Authentication. Interestingly sample implementations are available in the Ruby, Python, Perl, and PHP open source languages amongst others — tested on openSUSE 10.2 but expected to work on any platform that supports these languages. More details are available in the SDK documentation."
This discussion has been archived. No new comments can be posted.

Microsoft Opens Up Windows Live ID

Comments Filter:
  • by Anonymous Coward on Friday August 17, 2007 @12:40AM (#20257507)
    Put your comments below this one.
     
    • by Anonymous Coward on Friday August 17, 2007 @02:19AM (#20258003)
      What is top posting?

      Thanks!

      Put your comments below this one.
  • w00t! (Score:4, Funny)

    by doxology ( 636469 ) <cozzydNO@SPAMmit.edu> on Friday August 17, 2007 @12:41AM (#20257509) Homepage
    urls gone wlid!
  • How long (Score:5, Insightful)

    by afidel ( 530433 ) on Friday August 17, 2007 @12:43AM (#20257521)
    Until the first site with a fake passport login form shows up? I mean before semi-intelligent people weren't going to enter their passport ID into non-MS websites, but now... I bet a lot more corporate keys get exposed this way as passport is the keys to your Enterprise Licensing kingdom.
    • Re:How long (Score:5, Informative)

      by smashin234 ( 555465 ) on Friday August 17, 2007 @12:57AM (#20257591) Journal
      This has been done many times in the past, and I am sure it will continue to happen. Most common were the times that people would set-up false bank of america websites and people would type in their account information....perfect set-up. What was even better was that these sites sometimes were set to bankofamrica.com or some slight variation of the site, so the common user would have no idea they were at the wrong site.

      Well there are safeguards for this now, and I am sure if it gets to be a problem like that was at one time, it will also get fixed.
      • Re:How long (Score:4, Insightful)

        by jamesh ( 87723 ) on Friday August 17, 2007 @01:16AM (#20257677)

        Well there are safeguards for this now, and I am sure if it gets to be a problem like that was at one time, it will also get fixed.

        The safeguards only work if the user is paying attention. It only takes a fraction of a percent of people to click a 'log in here with your bank of america credentials to see if you have won a prize' link and the scammers can make a profit, and will keep on scamming.

        Still... if you've got a way around this that is truly idiot proof, I'd like to hear it! The best thing I can come up with is that the banks themselves initiate the scam, and then send 'the boys' around to break the thumbs of anyone who falls for it, or otherwise punish the scammee (that's strange... my spell check says scammee isn't a valid word...).
        • Re:How long (Score:4, Insightful)

          by arivanov ( 12034 ) on Friday August 17, 2007 @02:30AM (#20258063) Homepage
          'log in here with your bank of america credentials to see if you have won a prize'. As a matter of fact this is the latest and probably the most successfull class of phishing sites. The ruse is a "survey" on behalf of "Bank of America" or someone else. It is surprising how many people fall for it. The website has nothing to do with the bank, the addresses are not the bank ones, but none the less the consumer enters their credentials. As a results of many years of brainwashing by direct marketeers they now consider all this to be "business as usual".
        • by Gazzonyx ( 982402 ) <scott,lovenberg&gmail,com> on Friday August 17, 2007 @09:09AM (#20259771)
          Or if your bank is stupid and has something insecure on it's secure website. Wachovia's Secure Site [wachovia.com] has had a broken SSL login for ages, and I've told them about it. I also told them that the problem was probably just some insecure javascript or something to that effect, and pleaded that they'd forward it to their tech. staff who would immediately know what the problem was and how to fix it. I got a canned response and no action has been taken. Not sure what to do besides check the cert. every time I login.
        • by jasen666 ( 88727 ) on Friday August 17, 2007 @11:25AM (#20261591)
          Still... if you've got a way around this that is truly idiot proof, I'd like to hear it!

          I've been thinking about it. My idea is that you would install an activeX control or java applet from MS. Websites that want to log you into your Live account would invoke this applet, which does all of the authentication client side, then returns only a token back to the website that called it. That token would contain only whatever information was deemed appropriate for them to have or need.

          Of course nothing is fool proof. I'm sure the attack vector they'd use to try and break this scheme is to try to distribute fake applets, that don't really authenticate you, just report back your login info.
      • by Propaganda13 ( 312548 ) on Friday August 17, 2007 @04:36AM (#20258517)
        This is a lot different. Before bankofamrica.com had to set up a website then send out email. Halfway smart people wouldn't click on the link because they'd be wondering why their bank is emailing them. Now, I can set up joesfreeporn.com with a fake sign-in. If you're used to going to a lot of sites(bobsfreeporn.com and mikesfreeporn.com), using the sign-in isn't going to throw up a red flag at all.

        The signon form should only be on one secured site, not added to any site.
    • Re:How long (Score:4, Interesting)

      by macbort ( 224663 ) on Friday August 17, 2007 @01:06AM (#20257633)
      Google and Yahoo have both been offering similar services for awhile now, I believe, and I don't remember hearing either of them having this problem. Not to say it couldn't happen, but I imagine they've thought about this situation and have accounted for it somehow.
    • Re:How long (Score:5, Insightful)

      by jamesh ( 87723 ) on Friday August 17, 2007 @01:06AM (#20257637)
      I would love to have a 'single sign-on' and forever forget the hassle of remembering and entering passwords, but the flaw you mention and many others mean I don't think it will ever work. The value of pwning someone's 'single sign-on' code (whether it is Microsoft or some other solution) is just too high.

      If a 'single sign-on' became everyone's only method of authenticating to anything, then it would make identity theft just too easy.

      You can go to extreme lengths to protect all the sign-on pages in the world, but as long as there are people who will click on a 'your account will be deleted in 2 days unless you go to http://i.am.going.to.steal.your.identity.com/verif y.php [identity.com]' link in an email, none of it matters.

      I can't think of any way of preventing that problem without there still being the possibility of a "man in the middle" attack...
      • Re:How long (Score:2, Informative)

        by JonathanR ( 852748 ) on Friday August 17, 2007 @01:49AM (#20257863)
        Two Factor [wikipedia.org] authentication using a security token (like the RSA SecurID tokens).
        • by jamesh ( 87723 ) on Friday August 17, 2007 @06:24AM (#20258861)
          That prevents the re-use of your credentials, but doesn't stop a phishing site from grabbing them and using them there and then. And, given the idea of 'single sign-on', they could still do a lot of damage with a single authenticated session.

          Don't get me wrong, two factor authentication is a good idea, it solves a lot of problems completely (eg if someone is stupid enough to give away their password), and minimizes many others. But man-in-the-middle attacks are not really very well addressed. The _only_ way I can think of for the second factor to completely solve all the problems is that if it is a device that you connect to the network, and it establishes a secure session between the end points, and that you enter your password into it. And i wouldn't be surprised if someone found a hole in that!
          • Re:How long (Score:3, Informative)

            by swillden ( 191260 ) * <shawn-ds@willden.org> on Friday August 17, 2007 @10:42AM (#20261007) Journal

            The _only_ way I can think of for the second factor to completely solve all the problems is that if it is a device that you connect to the network, and it establishes a secure session between the end points

            Another way is to use a cryptographic challenge-response authentication, with the relying site's URL hashed into the challenge.

            Since the relying site never actually receives the secret key used to create the response, phishing sites gain nothing useful when they prompt the user for authentication. And since the site the user is authenticating to is hashed into the challenge (by an authentication tool on the user's machine, not by the relying site), a response give to a phishing page will not provide access to the legitimate site it's pretending to be.

            A more flexible way is the approach taken by OpenID: The relying site redirects you to your real authentication site (the one that provides the OpenID service, which may be a personal site) to enter your authentication credentials. The OpenID auth site then redirects you back to the relying site. Assuming you know enough to check the URL in the location bar, you can be sure that you're not giving your credentials to a phishing site.

            Since a real relying site will always contact the OpenID provider directly, and give it the correct URL for the second redirect, a phishing site may initiate the process but will get cut out of the loop when the OpenID site redirects the user to the real site. At present, most OpenID implementations provide fairly weak security, but that's not an inherent weakness of the protocol.

            Both of these approaches ultimately rely on the integrity of DNS, unfortunately, so they can be subverted by spoofing DNS. Fortunately, that's a much harder thing to do than to put up a phishing site and send spam to get users to visit it, so either option is a net security gain.

            • by swillden ( 191260 ) * <shawn-ds@willden.org> on Friday August 17, 2007 @11:43AM (#20261913) Journal
              Sorry to reply to myself, but I just noticed that I described OpenID inaccurately. The relying site does not give the redirect_to URL to the OpenID site directly, the user's browser does. However, the data block passed back to the relying site by the OpenID site contains the redirect_to URL, signed by that shared secret. So a phishing site can't play man-in-the-middle with your bank and your OpenID provider, because the phishing site can't alter the redirect_to URL without invalidating the signature and the bank won't accept the authentication with an invalid signature.
      • Re:How long (Score:5, Insightful)

        by baboonlogic ( 989195 ) <anshul.anshul@io> on Friday August 17, 2007 @03:35AM (#20258303) Homepage
        There is nothing in a single sign on system to force you to use only one id. Using openid and the few sites that actually allow you to use it, I have already brought down my username password combos needed from about 10 to 2. So I can decrease the number of sign ons with systems like openid.

        Secondly, as far as identity theft is concerned, my email accounts are already single points for attack. Once you have the email, the password recovery services will do your bidding. A single-identity-solution allows you to just shift this from email to some server which was created to keep and handle this data. Whats more you could be the one setting up that server... (not in the ms case but in the case of openid).

        So, on the whole, single sign ons can work and openid hopefully will. I dont even want to rtfa. If I cant decide who keeps my username password for my single signon, I am just not interested.
      • by Yvanhoe ( 564877 ) on Friday August 17, 2007 @04:27AM (#20258485) Journal
        Well, how many people use 10 different passwords anyway ? I think that most people end up using the same password again and again. The man in the middle attack can be prevented using a good crypto and certificates provided by the OS during installation (ie. not downloaded)
        • by KiloByte ( 825081 ) on Friday August 17, 2007 @05:44AM (#20258729)

          Well, how many people use 10 different passwords anyway ?

          I use... lemme estimate the count... somewhere around 50 different passwords, with little to remember.

          All you need is any mapping you remember anyway. For me, that's ASCII codes, names of Doom2 levels, etc, but for you it could be for example episode names of Star Trek (bleh), or even, horrors, results of 1976 baseball league. Everyone has something of this kind.

          Next, pick a scheme of turning account/host names into the domain of your mapping.
          Then, do the same for turning the mapping's codomain into short strings.

          This does have a potential vulnerability of letting an attacker guess the scheme if he intercepts several of your passwords and the scheme itself is very obvious, but hey, that's a whole world harder than learning a single password and using it to get a good part of your accounts. And I don't use the main scheme for accounts I don't give a damn about.
          • by PopeRatzo ( 965947 ) * on Friday August 17, 2007 @06:21AM (#20258853) Journal

            All you need is any mapping you remember anyway. For me, that's ASCII codes, names of Doom2 levels, etc, but for you it could be for example episode names of Star Trek (bleh), or even, horrors, results of 1976 baseball league. Everyone has something of this kind.
            ahem.

            I'm not sure I do have "something of this kind", not being a sufferer of OCD. However, the idea intrigues.

            What do you mean when you say "a scheme of turning the account/hostnames into the domain of your mapping". Can you give me an example? I'd like to try this.
            • by KiloByte ( 825081 ) on Friday August 17, 2007 @09:06AM (#20259751)
              In the lack of such a data set, you can make it up on the spot. Factorizing numbers for one.
              In fact, any http://en.wikipedia.org/wiki/Hash_function [slashdot.org] will work. I named ASCII codes and Doom2 levels because they're something I know by heart; I suck at factorizing so it would take me longer. And I don't want to ever spend more than 10 seconds trying to remember a password I didn't use for a while. This is not an issue for ones you type in frequently as they'll be "cached" in your fingers' memory, though.

              Producing the input for your hash function can be trickier, though. In some cases like ASCII codes it's trivial -- take 3rd and 5th letter of the hostname, turn them to their ASCII codes, mangle the numbers somewhat and you're done -- like: hostname="flame" => 97, 101 => "!97a101a". The final rule was: prepend with '!'s to get three digits, add "a" for odd codes, "b" for even ones.

              This particular scheme isn't too secure; it resembles one of my early ones. The weakness here is that someone who intercepts one or two of these can guess what to brute force, needing only 16-18 bits of work; it's obvious how to close this hole.

              Now, while my passwords are not the ones you get from "pwgen -s", at least I can actually "remember" all of them without being superhuman.
      • Re:How long (Score:2, Insightful)

        by Catil ( 1063380 ) on Friday August 17, 2007 @04:49AM (#20258551)
        Thanks to the forgot-password-option every site offers, using a single email address to register to everything makes that email account already the weakest link anyway. With the millions of blogs and forums these days, however, that all require people to register and validate via email just to leave a comment, a "single sign-on system" is still a good idea. I guess secure critical sites like Paypal wouldn't cause a problem because they hopefully would never provide to login with such a system in the first place.
        It's a pity that OpenID somehow doesn't take off as many expected and I don't think a Microsoft solution will either. Google comes to mind as one company that could probably do it successfully.
      • by MMC Monster ( 602931 ) on Friday August 17, 2007 @07:09AM (#20258973)
        Absolutely. I know the MSPassport IDs and passwords for a number of people I used to be close to. One of them is now actively hostile towards me. Should I use their ID/Password to do something illegitimate? Well, only if I'm pushed...
    • Re:How long (Score:5, Informative)

      by SgtChaireBourne ( 457691 ) on Friday August 17, 2007 @01:10AM (#20257657) Homepage

      [How long] Until the first site with a fake passport login form shows up? ...

      It doesn't matter so much, it's not like MS WLID, formerly known as MS Passport can ever be made secure. It's fundamentally flawed from the design [avirubin.com].

      However, all the bad press was about MS Passport, so a simple name change and, Voila, no bad press about the product. Palladium was sanitize the same way.

      • by RightSaidFred99 ( 874576 ) on Friday August 17, 2007 @02:02AM (#20257933)
        Nonsense. But way to dig up a 7 year old paper. I'm sure Live is _totally_ the same thing and their complaints are still _totally_ valid.
      • by weicco ( 645927 ) on Friday August 17, 2007 @05:17AM (#20258635)

        We found out something is broken, they fixed it the same day but we still believe it is broken. Wow!

        Only thing I found interesting in that article was the 3DES encryption thing. Passport could use per-client key but did TFA say it should be assigned to user's address, IP address? I get dynamic IP address from ISP so if keys would be assigned to my IP address and ISP's DHCP server decides to change my address wouldn't I be force to reauthenticate?

        Other attack mechanism aren't solely entangled to Passport. If attacker gets his computer to act as man-in-the-middle or is able to attack name server(s) you are basically screwed anyway. Same goes if attacker is able to attack the actual server (Passport or business server).

        But there's easier way to get user's information, I think. Just release email-worm which says "cool emoticons for you Messenger/Skype/whatever" and you have 1000000 teenagers downloading your trojan EXE the next day :) I've cleaned up couple of computers infected this way. It is pretty efficient attack and enables attacker to do lot's of kind nasty things at least on Windows 98/ME/2K/XP.

        But should we start crusade against every goddamn software which is subject of somekind of security hole, not matter how abstract or theoritical? Don't get me wrong, security holes are bad but if we decide that attacking DNS server is compromising Passport, then we could ban all the web browsers also.

        • by SgtChaireBourne ( 457691 ) on Friday August 17, 2007 @11:35AM (#20261765) Homepage

          Nice strawman. WLID (formerly known as MS Passport) is not just any random piece of shit. It's a piece of shit being marketed as a core security component -- authentication. So, no, in answer to your question. Sure some things were "fixed" but the fundamental design flaws remain.

          Furthermore, since M$ still maintains a monopoly on desktop systems and has been found on many occasions to have been illegally leveraging that monopoly to break into a new market, the risk of WLID spreading is actually rather high. If the stats at NetCraft are anything close to reliable, then M$ would be able to leverage the IIS install base.

    • by QuantumG ( 50515 ) <qg@biodome.org> on Friday August 17, 2007 @01:23AM (#20257709) Homepage Journal
      Go to Hotmail [hotmail.com]. You will see that Hotmail now requires you to login with Windows Live ID. Now, take a look at this page. It's a login page. They want you to enter your ID and your password. This is what gives you access to all the different services that are currently integrated with Windows Live ID, and will be integrated in the future. It's basically your "master password". Thing I'm trying to stress here: you shouldn't just give this out to anyone who asks. Ok, you get the idea.

      So, first check you should do whenever you're logging into a page is what? That's right, check the url. "http://login.live.com/login.srf?wa=wsignin1.0&rps nv=10&c...." etc. Great, login.live.com, that's what I expect. Cool. Ok, so what's the second thing I should check? Anyone? Come on, it's web password security 101 here people. What do I need to check before I enter a login/password on a web site? That's right.. I need to check I'm on an SSL secured page. The url should start with what? https right? And I should look for the little lock in my browser window.. and if I'm feeling especially paranoid I should check the security certificate to see whether or not it is valid, not expired, and for the site that I am expecting.

      This page has none of those things. Well done Microsoft.

      Oh, but it gets better. There's this link that says "Use enhanced security". I would have thought that "enhanced" security was a sensible default, silly me. It's not underlined, so you don't know it is a link until you hover your mouse over it, but it will take you to a https:/// [https] page. Of course, the certificate it offers you is not for login.live.com, it's for graphics.hotmail.com. If you accept this certificate then you are basically saying that you're ok with trusting this data that didn't come from graphics.hotmail.com as if it did come from graphics.hotmail.com. Just for the hell of it, let's fire up this "enhanced security" page in IE and see what happens. Oh.. I see. We get no warnings. In fact, if we double click on the padlock we see that the certificate now IS for live.login.com. Hmm, what's going on here. Ahh, I see, half the content on this page didn't come from live.login.com, it came from graphics.hotmail.com.. so this isn't a secure site *at all*, it's a mixed domain site and IE's pitiful support for multiple certificates on a single page is happy to just ignore this (and doesn't even warn you).

      XSS anyone?

    • by biocute ( 936687 ) on Friday August 17, 2007 @01:26AM (#20257719)
      Hasn't MS already got a solution?

      All these partner sites must display a "Genuine Live" hologram GIF image.

      Beat that!
    • Got it backwards. (Score:2, Interesting)

      by twitter ( 104583 ) on Friday August 17, 2007 @01:27AM (#20257727) Homepage Journal

      before semi-intelligent people weren't going to enter their passport ID into non-MS websites, but now... I bet a lot more corporate keys get exposed this way as passport is the keys to your Enterprise Licensing kingdom.

      Hmmm, massive FUD has much inertia. First, intelligent people have known for a long time not to trust M$ with anything. This has harmed the online economy, but that's a different story. If the 25% prevalence of keyloggers is not enough, a rogue site has been able to harvest Passport IDs forever, because IE can be resized, reshaped and made to look like whatever the rogue site wants it to. Firefox puts a stop to menu hiding and resizes, but Mozilla.org can't save you from a key logger.

    • by Blakey Rat ( 99501 ) on Friday August 17, 2007 @08:27AM (#20259397)
      Screw that.

      I don't care if it's Microsoft, Google, Apple, or some nerd's basement server, but please, please SOMEBODY make a single sign-on that sites actually use, so I can use it for casual things. I'm goddamned sick of every goddamned forum on the entire Internet asking me to create an account and sign in before doing crap. You can't even read comments on IMDB now without registering and making some moronic account.

      I have thousands of petty little accounts on blogs, on news sites, on wikipedia and IMDB-- all with the same username/password combination. Single sign-on, PLEASE!
  • Phishing? (Score:2, Redundant)

    by FliesLikeABrick ( 943848 ) <ryan@u13.net> on Friday August 17, 2007 @12:50AM (#20257553)
    What keeps anyone from creating a site (and/or spamming for it), saying it uses Windows Live authentication, then just farming a giant pile of logins they can sell or use for evil things?
  • No License? (Score:5, Informative)

    by originalhack ( 142366 ) on Friday August 17, 2007 @12:58AM (#20257595)
    Great... it's copyrighted and provides no license.
  • There's no possible way anything could go wrong with this plan.
  • Article placement (Score:5, Interesting)

    by Infonaut ( 96956 ) <infonaut@gmail.com> on Friday August 17, 2007 @01:44AM (#20257817) Homepage Journal

    Is it just me, or does placing this article directly above the Diebold rebranding article make you think of a theme common to both? Company loses credibility. Keeps trying to regain it, but still doesn't grok that you can't just make it *look* like you've changed your spots. You actually have to change your behavior, and regaining credibility takes a lot longer than destroying it does.

    • by violet16 ( 700870 ) on Friday August 17, 2007 @07:44AM (#20259137)

      you can't just make it *look* like you've changed your spots. You actually have to change your behavior, and regaining credibility takes a lot longer than destroying it does.

      Only to people who pay attention.

      You noticed this because it's tech. You don't notice most of the thousands of times it happens elsewhere [usatoday.com].

  • CardSpace? (Score:2, Interesting)

    by ZSO ( 912576 ) on Friday August 17, 2007 @01:44AM (#20257819)
    Does this mean they've given up on CardSpace [wikipedia.org], which is built into Vista right now? I thought it was a much better solution to the need for single sign-on. Check out thechannel9 video [msdn.com].
    • Re:CardSpace? (Score:3, Insightful)

      by Shados ( 741919 ) on Friday August 17, 2007 @01:57AM (#20257901)
      Different purposes. CardSpace, part of .NET 3.0 and up, is made as a way to authenticate and share data on a site by site basis, as opposed to the central system of Live ID. One could say Cardspace is a "mini-LifeID" thing, so to speak. Still quite useful if implemented right.
    • by RupW ( 515653 ) * on Friday August 17, 2007 @07:51AM (#20259169)

      Does this mean they've given up on CardSpace [wikipedia.org], which is built into Vista right now? I thought it was a much better solution to the need for single sign-on. Check out thechannel9 video [msdn.com].
      If you try the login link in the sample [live.com] - which redirects you back to 'localhost' when you've signed in - it says:

      Windows Live is not affiliated with localhost and will share with it only an anonymous ID. Learn more. For additional protection, you may use an Information Card.
      (a.k.a. Cardspace)

      AFAICT from the docs and the code they've just released, there's no way for a third party to get any information about you from Live (e.g. email, name) even if you want to give it to them to speed up sign-up for example. Cardspace does allow that, configurable by the user, and so is the better solution for both you and the third party sites anyway. In fact the login page doesn't look very professional to me - the sort of thing you'd use on your blog maybe but not on your ecommerce site.
  • Uh, what? (Score:3, Informative)

    by misleb ( 129952 ) on Friday August 17, 2007 @01:44AM (#20257821)
    I thought Passport was outted years ago as being fundamentally broken. Why would I want to implement it on my site? Did they fix it? If not, why are they still using it at all?

    -matthew
  • OpenID (Score:5, Insightful)

    by jediknil ( 1090345 ) on Friday August 17, 2007 @01:47AM (#20257841) Homepage

    I'd prefer to see the rise of OpenID [openid.net]. Now if Microsoft gave you an OpenID authentication point with your LiveID (preferably with something simple, like adding the OpenID <link> tags to login.live.com or even just live.com), that would be a feature worth using and supporting. And wouldn't require changing the sites that already support OpenID, including, AFAIK, the SixApart family of blogs.

    With modern technology, diverse applications are a good thing (healthier market and better apps from consumer selection). Information, however, is more useful the more widely it can be read and used. Unless you are specifically trying to hide something.

    Unfortunately, like Live ID, there seems to be more OpenID providers than servers that use them for authentication.

  • by ls671 ( 1122017 ) on Friday August 17, 2007 @02:12AM (#20257979) Homepage

    I use 3 passwords for all sites I access mapping to 3 levels of trust. I try to use the same user id when possible :

    Level 1 : risky

    Level 2 : less risky

    Level 3 : almost trustable

    For sites that I really trust (banking, etc...) I use dedicated passwords. I, also, can forecast problems with a single sign-on scheme that would be more or less like giving away your social security number if hacked.

    I have been working on this problematic before for big organizations and one conclusion we came up with was that we needed to re-use the old assembly language "indirection" principle, called pointers in higher level languages.

    So basically, one has to be able to authenticate with multiples set of usernames/passwords combinations. Once the unique user is authenticated, the central authentication authority limits its role to just that, authenticating the user.

    All authorization is managed by the local system that interacts with the user.

    Do a search for MBUN on Google. In Canada, a user can have multiple MBUNs to deal with the government. This solution was implemented to cope with privacy concerns and still allow the citizen to deal with the government with the same level of privacy that was previously achieved with paper forms. Basically, what has been done is creating a mapping between the MBUN and the real userid and the choice has been given the citizen to have as many MBUN as he wishes to deal with the government.

    Serious concerns should apply to too simplistic solutions ;-) Now for all /. MS bashers to enjoy : Although a qualified partner in the project, none of MS products where used to implement the solution. Given the money and the visibility at stakes, this caused a commotion in Canada with MS canadian VP putting pressure on everybody to reverse the decision.

    Hey Sam, your products are just too simplistic and too proprietary. Phone us next year please ;-) That was really funny, the guy just couldn't understand that Macdonald's like marketing techniques did not work in this case. I mean, they even flew us for a week to Redmond at the campus to try to brainwash us, but still no go for MS.

    -ls

  • OpenID (Score:5, Informative)

    by AceJohnny ( 253840 ) <jlargentaye AT gmail DOT com> on Friday August 17, 2007 @02:13AM (#20257981) Journal
    and how this compare to OpenID [wikipedia.org] ? (See also OpenID Enabled [openidenabled.com] for those interested in using it)
  • by iovar ( 998724 ) on Friday August 17, 2007 @02:54AM (#20258155) Homepage
    From: http://www.microsoft.com/downloads/details.aspx?Fa milyId=8BA187E5-3630-437D-AFDF-59AB699A483D&displa ylang=en [microsoft.com]

    Supported Operating Systems: Linux; Windows Vista; Windows XP

    How's the wheather in hell these days?
  • by mporcheron ( 897755 ) on Friday August 17, 2007 @03:25AM (#20258261)
    Well, it will inherit Microsoft's stellar security and perfect programming. Besides which, its a closed network unlike OpenID so it will be about as popular as Google's Account Authentication [google.com] which does the same thing but with Google Accounts. Even OpenID isn't that widely used, and it's an open system.
  • by CopaceticOpus ( 965603 ) on Friday August 17, 2007 @04:29AM (#20258497)
    The worst possible things that could happen for widespread adoption of a universal login system are:

    1. Competition between different standards.
    2. Companies with profit motives pushing their own solutions.

    It's like the whole HD-DVD vs BluRay issue. End users don't want to deal with choosing one or the other. It would be better for everyone if we could all just come together around one completely open standard.

    The standard with the most momentum seems to be OpenID. I hope that a few years from now, I'll be using it for most of my web logins.
  • Why? (Score:3, Insightful)

    by PietjeJantje ( 917584 ) on Friday August 17, 2007 @05:16AM (#20258631)
    Why on earth would I want to, of all things, authenticate using a 3rd party propriety system from a vendor with proven business practices like MS? That seems like the very last thing I want to do. And I haven't even mentioned the outages, so your uptime depends on MS. What are you gonna do when that happens, call them? I have a much better idea, Bill. Why don't you use my unified login system. I've made a version in Visual Basic especially for you.
  • Terms of Use (Score:3, Insightful)

    by giafly ( 926567 ) on Friday August 17, 2007 @05:54AM (#20258757)
    Ever intending to compete against a Microsoft product?

    you may not: use the service in a way that harms us or our affiliates, resellers, distributors, and/or vendors (collectively, the "Microsoft parties"), or any customer of a Microsoft party ...
    Care about money?

    We may choose in the future to charge for use of the service. If we choose to establish fees and payment terms for such use, Microsoft will provide at least one (1) month advance notice of such terms as provided in section 18 below, and you may elect to stop using the service rather than incurring fees.
    https://msm.live.com/app/tou.aspx [live.com]
  • by mrjb ( 547783 ) on Friday August 17, 2007 @06:31AM (#20258873)
    The 'one password for everything' concept is fundamentally broken. It is like having one key for everything you own- your house, your car. During a vacation, I *want* to be able to give the housekeeper access to my house, but I also want to *prevent* her from going for a joyride in my brand new expensive car. The fact that I have neither a housekeeper nor a brand new expensive car is a minor detail.
  • by abecede ( 1097981 ) on Friday August 17, 2007 @06:56AM (#20258945)
    It is just sad to read the Python implementation of this functionality. Almost nothing is written according to the Python Style Guide [python.org]. Weird "__foo"-variables can be found, then it's not Python2.3 compliant because of ONE silly "staticmethod", many "getters" and "setters" which are just useless in this script. If MS wants to show their code to the scripting community, they should at least make it pretty and according to the language's coding standards. But maybe that is their understanding of "pretty". Who knows.
  • by crivens ( 112213 ) on Friday August 17, 2007 @07:51AM (#20259171)
    Oh yeah I'd love to use an authentication system on multiple sites that forces me to re-enter my password in Firefox every time I visit hotmail.com!
  • by Espectr0 ( 577637 ) on Friday August 17, 2007 @08:01AM (#20259235) Journal
    From the download page:

    System Requirements


    •    
    • Supported Operating Systems: Linux;[...]


    How far have we come?
  • by athloi ( 1075845 ) on Friday August 17, 2007 @09:47AM (#20260271) Homepage Journal
    New market: either proprietary web-based services (quasi-thin client) or a standards-based, PC-based market. Microsoft wants the latter, Google wants the former. Consequently, Microsoft is opening up to open source, as it will help it gain its goals.

    The important thing to remember about corporations is that they're not evil. They're realpolitik. Their only goal is to make their stock price rise, so their stockholders go home happy. Stockholders are people like you and me who've bought Microsoft stock and want to make money off of it.

    F/OSS is people power, which should come out and admit that it is opposed to this system. It's not anti-capitalism, but it is anti-capitalism, in its own way. I don't think it means bad by this. I compare it more to the volunteers who spend more time than most people do at day jobs to help their communities. But even that is insane from a capitalist perspective, since they could be getting $$$ for that time.
  • by Schraegstrichpunkt ( 931443 ) on Friday August 17, 2007 @10:41AM (#20260985) Homepage
    How is this different from OpenID [openid.net], other than that MS displays a massive not-invented-here syndrome?

"Can you program?" "Well, I'm literate, if that's what you mean!"

Working...