← Back to team overview

launchpad-dev team mailing list archive

Re: Instead of authorizing individual applications against the Launchpad web service, let's authorize the Ubuntu desktop as a whole

 

On 24 September 2010 08:59, Kees Cook <kees.cook@xxxxxxxxxxxxx> wrote:
>> Pretty much every third-party developer (and at least one internal
>> developer) has responded to our OAuth token authorization protocol by
>> hacking around it, creating some native-GUI way of asking the user for
>> their Launchpad username and password, so that their users don't have
>> to do the browser dance.
>
> Why not offer a non-browser way to do this? Gnome-keyring is effectively
> holding the "authentication token", and could go fetch a new "session
> token" for different applications, etc. Why confine the session management
> to the browser?

Because Launchpad has no concept of logging in other than by OpenID,
and that means sending the user to a web page in a (probably
graphical) browser.  See <http://pastebin.ubuntu.com/499131> around
line 160.

For me it's analogous to PAM, which in principle may do any arbitrary
action to authenticate the user but for many useful cases is actually
going to have a text dialog that can be remapped into a graphical
greeter or whatever.

I think accepting openid is great, but it if the user does have a
Canonical username and password it's being pointlessly stubborn not to
let them use it.  At the moment all our users are in this category.
This, to me, is also an example of where we're not listening to what
our api clients want to do.

One way to improve this would be to ship some code that, given a user
name and password, logs in to Canonical SSO.  This code already
apparently exists in some clients; we might as well acknowledge the
fact and make it properly supported subject to the caveat that
eventually some users may not have Canonical passwords.

-- 
Martin



References