Part of the Authentication glossary:

OpenID is a decentralized single sign-on authentication system for the Internet. The goal of the OpenID initiative is to allow users to log in at websites around the Internet with one ID, instead of having to create multiple unique accounts.

To use OpenID, a user must initially register with a Web site that supports OpenID. AOL users, for instance, can simply use their screen name because AOL supports OpenID. When visiting other sites that support OpenID, the user logs in with a URL, which in this case would be http://openid.aol.com/screenname.

Previous attempts at universal authentication methods, like Microsoft's Passport or the Liberty Alliance, failed in part because of proprietary implementations. OpenID was developed using the open source software model to be an interoperable protocol independent from any single organization.

As OpenID matures and evolves into a commercially viable, trusted identity provider service, enterprises will be able to consider outsourcing their federated identity management needs to the framework. Key issues to enterprise adoption will be resolving DNS spoofing vulnerabilities and tighter integration with the Security Assertion Markup Language ( SAML ). Today there are over a quarter of a billion OpenIDs and well over 10,000 Web sites that accept them.

This was last updated in March 2008
Posted by: Margaret Rouse

Related Terms

Definitions

  • time-based one-time password (TOTP)

    - A time-based one-time password (TOTP) is a temporary code, generated by an algorithm, for use in authenticating access to computer systems. (SearchConsumerization.com)

  • BYOI (bring your own identity)

    - BYOI (bring your own identity) is an approach to digital authentication in which an end user's username and password is managed by a third party such as Facebook, Twitter, LinkedIn, Google+ or Amazon. (SearchSecurity.com)

  • John the Ripper

    - John the Ripper is a popular free password cracking tool that combines several different cracking programs and runs in both brute force and dictionary attack modes. Originally developed for Unix-de... (WhatIs.com)

Glossaries

  • Authentication

    - Terms related to authentication, including security definitions about passwords and words and phrases about proving identity.

  • Internet applications

    - This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...

Ask a Question. Find an Answer.Powered by ITKnowledgeExchange.com

Ask An IT Question

Get answers from your peers on your most technical challenges

Ask Question

Tech TalkComment

Share
Comments

    Results

    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.