O'Reilly logo

Programming Social Applications by Jonathan LeBlanc

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Step 2: Perform Discovery to Establish the Endpoint URL

The process of performing discovery on an OpenID provider identifier will take us through a couple of substeps, both involving communication between the relaying party and the OpenID provider. Our goal in this stage is to perform discovery on the OpenID identifier to:

  1. Determine whether the OpenID identifier is valid.

  2. If it is valid, extract the endpoint URL to which the user will be forwarded for authentication.

This exchange is demonstrated in Figure 11-2.

OpenID, step 2: Relaying party performs discovery on OpenID identifier

Figure 11-2. OpenID, step 2: Relaying party performs discovery on OpenID identifier

Using the normalized URL from the last step, the relaying party will make a request to the provided OpenID identifier URL. If the identifier is valid, the provider will respond with the endpoint URL that is used either to redirect the user or to request the markup that sends the user through the authentication step.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required