Changes

no edit summary
Line 8: Line 8:  
* Centralized users database.
 
* Centralized users database.
 
* Reuse users database not only for Web services, but also for shell accounts, for example.
 
* Reuse users database not only for Web services, but also for shell accounts, for example.
 +
* (a side-benefit) Education about the risks of inter-networked services.  Most people have little understanding of such risks, their significance, or appropriate protective behaviors.
   −
== Costs ==
+
== Costs & Risks==
    
* To be accounted.
 
* To be accounted.
Line 16: Line 17:  
*: This point belongs to [[#Benefits|Benefits]] as well, e.g., if most of our services will use CAS, we will have only one, well controlled, access point. --[[User:Alsroot|alsroot]] 13:40, 28 September 2011 (EDT)
 
*: This point belongs to [[#Benefits|Benefits]] as well, e.g., if most of our services will use CAS, we will have only one, well controlled, access point. --[[User:Alsroot|alsroot]] 13:40, 28 September 2011 (EDT)
 
*:: There is an escalating intrusion/protection arms race on the Internet that challenges the most advanced providers of ethical services.  Yes, we should seek to benefit from those efforts. --[[User:FGrose|FGrose]] 13:34, 5 October 2011 (EDT)
 
*:: There is an escalating intrusion/protection arms race on the Internet that challenges the most advanced providers of ethical services.  Yes, we should seek to benefit from those efforts. --[[User:FGrose|FGrose]] 13:34, 5 October 2011 (EDT)
 +
* What risks are there after signing on from a public workstation and leaving one's authentication cookie behind, or otherwise loosing one's cookie?  What responsible efforts should we undertake to get the vulnerable community to participate more safely?
    
== Resources to authenticate on ==
 
== Resources to authenticate on ==