&ers
apitman.com
&ers
@apitman.com
North Idaho is practically a different state.
November 8, 2024 at 8:41 PM
Spent a year in the Palouse. Beautiful area. Everything turns green in the summer, gold in the fall before harvest, white during the winter, and brown in the spring after plowing.
November 8, 2024 at 8:39 PM
There are definitely tradeoffs, but I think the key point is that did:web is the only way today to have an atproto identifier that wouldn't die with Bluesky. Moving plc.directory to an org would be a great step but it could take a very long time for it to achieve the same level of trust as DNS.
did:plc Directory
plc.directory
November 5, 2024 at 5:48 PM
In addition to reusing existing libraries, there's also avoiding fracturing the ecosystem, just when OIDC is starting to get some traction in the decentralized world. To be clear, I don't necessarily think this is vital, I'm just trying to advocate for existing standards as much as possible.
October 16, 2024 at 12:30 AM
I envision it as a 3-step process with OIDC in the middle:
1. You get some sort of handle/identifier from the user and look up their OP
2. Do OIDC
3. Verify the OP is authoritative for the handle
October 16, 2024 at 12:29 AM
I've been thinking about this a lot lately, because I'd like a system that doesn't require different logins. Do you already have thoughts on how this could look?
October 7, 2024 at 11:16 PM
And I'm not sure how much protection your current approach adds. Definitely a lot for devs using your libraries, but anyone making their own implementation (as I did) can just skip the checks.
October 7, 2024 at 5:54 PM
I would ask you to not give up on OIDC too easily. See for example the way Tailscale implements custom OIDC providers. You give them an email address, and they use WebFinger to look up the OIDC provider. I've found this to be an excellent way of doing things.
October 7, 2024 at 5:52 PM
The main issue isn't that it returns extra data, it's that `sub` is a DID, and you need to resolve that DID before you can trust that AS as authoritative for it. The protocol also requires use of the `atproto` scope. But I don't think either of these necessarily make it non-OIDC compatible.
October 7, 2024 at 5:34 AM