StyleCop clean.
[dotnetoauth.git] / src / DotNetOpenAuth / OpenId / Extensions / ProviderAuthenticationPolicy / AuthenticationPolicies.cs
blobd39692c969617a1587b4c523db3ae7f503920a7e
1 //-----------------------------------------------------------------------
2 // <copyright file="AuthenticationPolicies.cs" company="Andrew Arnott">
3 // Copyright (c) Andrew Arnott. All rights reserved.
4 // </copyright>
5 //-----------------------------------------------------------------------
7 namespace DotNetOpenAuth.OpenId.Extensions.ProviderAuthenticationPolicy {
8 using System.Diagnostics.CodeAnalysis;
10 /// <summary>
11 /// Well-known authentication policies defined in the PAPE extension spec or by a recognized
12 /// standards body.
13 /// </summary>
14 /// <remarks>
15 /// This is a class of constants rather than a flags enum because policies may be
16 /// freely defined and used by anyone, just by using a new Uri.
17 /// </remarks>
18 public static class AuthenticationPolicies {
19 /// <summary>
20 /// An authentication mechanism where the End User does not provide a shared secret to a party potentially under the control of the Relying Party. (Note that the potentially malicious Relying Party controls where the User-Agent is redirected to and thus may not send it to the End User's actual OpenID Provider).
21 /// </summary>
22 [SuppressMessage("Microsoft.Naming", "CA1704:IdentifiersShouldBeSpelledCorrectly", MessageId = "Phishing", Justification = "By design")]
23 public const string PhishingResistant = "http://schemas.openid.net/pape/policies/2007/06/phishing-resistant";
25 /// <summary>
26 /// An authentication mechanism where the End User authenticates to the OpenID Provider by providing over one authentication factor. Common authentication factors are something you know, something you have, and something you are. An example would be authentication using a password and a software token or digital certificate.
27 /// </summary>
28 [SuppressMessage("Microsoft.Naming", "CA1704:IdentifiersShouldBeSpelledCorrectly", MessageId = "Multi", Justification = "By design")]
29 [SuppressMessage("Microsoft.Naming", "CA1702:CompoundWordsShouldBeCasedCorrectly", MessageId = "MultiFactor", Justification = "By design")]
30 public const string MultiFactor = "http://schemas.openid.net/pape/policies/2007/06/multi-factor";
32 /// <summary>
33 /// An authentication mechanism where the End User authenticates to the OpenID Provider by providing over one authentication factor where at least one of the factors is a physical factor such as a hardware device or biometric. Common authentication factors are something you know, something you have, and something you are. This policy also implies the Multi-Factor Authentication policy (http://schemas.openid.net/pape/policies/2007/06/multi-factor) and both policies MAY BE specified in conjunction without conflict. An example would be authentication using a password and a hardware token.
34 /// </summary>
35 [SuppressMessage("Microsoft.Naming", "CA1702:CompoundWordsShouldBeCasedCorrectly", MessageId = "MultiFactor", Justification = "By design")]
36 [SuppressMessage("Microsoft.Naming", "CA1704:IdentifiersShouldBeSpelledCorrectly", MessageId = "Multi", Justification = "By design")]
37 public const string PhysicalMultiFactor = "http://schemas.openid.net/pape/policies/2007/06/multi-factor-physical";
39 /// <summary>
40 /// Used in a PAPE response to indicate that no PAPE authentication policies could be satisfied.
41 /// </summary>
42 /// <remarks>
43 /// Used internally by the PAPE extension, so that users don't have to know about it.
44 /// </remarks>
45 internal const string None = "http://schemas.openid.net/pape/policies/2007/06/none";