I\'m trying to implement OpenId login for a web application. Whenever new user who logs in via OpenId I create a new user on the sustem, and among the data I store their openid
Google's OpenID identifier is more or less a hashed representation of multiple data including the host the request came from (more exactly the openid.realm
parameter sent to the provider). So if your host changes from time to time (like the port and ip address changes), then the ID will change from time to time too. StackOverflow uses a workaround for this issue too. Check these posts:
Here is an FAQ excerpt from google:
Q: The OpenID spec says that the
openid.realm
is optional, and that if not provided, Google should use theopenid.return_to
URL instead. Will that work?A: It will work in the sense that the protocol will complete successfully. But if your
return_to
URL is something likewww.example.com/authenticate?style=openid-federated_login
, you are asking us to prompt users to approve and trust a specific address at your site, which is not user-friendly. Also, if you omit theopenid.realm
parameter, you will never be able to change yourreturn_to
URL: It will also implicitly change the realm and the URL identifiers of your Google Account users.