2008 was an awesome year for OpenID where the community created significant momentum moving toward mainstream adoption. No, not every site on the web is using OpenID nor does every consumer know what OpenID does, but last year alone the number of sites that accept OpenID for sign in more than tripled ((Relying Party Stats as of Jan 1st, 2009)). Today, there are over thirty-thousand publicly accessible sites supporting OpenID for sign in and well over half a billion OpenID enabled accounts.
- AOL ((Why AOL Created 63 Million New OpenIDs)), Google ((Google is Now an OpenID Provider)), Microsoft ((Windows Live Adds Support For OpenID, Calls It De Facto Login Standard)), mixi (the largest social network in Japan) ((mixi Supports OpenID with the Simple Registration Extension)) and Yahoo! ((Yahoo Implements OpenID; Massive Win For The Project)) have all shipped OpenID Provider implementations with nearly all of them supporting OpenID 2.0.
- In addition to many of the independent OpenID Providers already supporting the ability to exchange profile data, Google added the ability to do so in a limited fashion with AOL ((AOL releases preview support for SREG)), mixi ((Mixi Brings Sophisticated OpenID to Millions of Japanese Users)) and Yahoo! ((Yahoo! OpenID limited testing for Simple Registration support)) have all introduced it in a limited beta fashion. This means that OpenID users signing into your site will easily be able to share information like their preferred username or email address if they wish to do so.
- A number of major sites added support to sign in using OpenID including AOL's MapQuest ((AOL’s MapQuest Integrates OpenID)), Google's Blogger ((Blogger Buzz: OpenID Commenting)), Microsoft's Health Vault ((Microsoft’s First Step In Accepting OpenID SignOns - HealthVault)), SourceForge ((SourceForge Allows OpenID Logins)) as well as the commenting services TypePad Connect ((TypePad Connects to Google, AOL, Yahoo! and more)) and Intense Debate (which in turn enabled Barack Obama’s Change.gov ((Barack Obama's Change.gov Adds OpenID))). Google Friend Connect also enabled any site to support OpenID sign in via JavaScript ((Google Friend Connect: now available)) which thousands of sites have done.
- Google, IBM, Microsoft, VeriSign, and Yahoo! joined the board of the OpenID Foundation ((Evolving the Foundation Board)) bringing additional insight, complementing the community board members and helping financially support the organization.
- A Japanese chapter of the OpenID Foundation was formed in February ((Supporting OpenID Communities Around the World)) and has since added nearly forty-five member companies ((OpenID Japan Launches with 32 Member Companies)); including merchants, portals, educational institutions, insurance companies, manufacturing companies, airlines and banks.
- The BBC hosted twenty-six people from seventeen organizations in New York City to kick off an OpenID Content Provider Advisory Committee ((OpenID Content Provider Advisory Committee Kickoff Meeting)) meeting facilitated by JanRain and the OpenID Foundation. Through the day specific questions by the content provider community (media companies and national affinity groups) were answered about OpenID and a discussion around how it could benefit the participants by supporting OpenID.
- The OpenID Foundation helped push forward usability and user experience research and best practices, by hosting an OpenID user experience summit led largely by Yahoo! and Google. The community plans to continue this work throughout 2009, with many individuals and companies participating.
- Projects aimed squarely at open source developers like the Pinax platform which is built atop Django or the DiSo project atop WordPress and Movable Type integrated OpenID support as a core feature, making it even easier to build new social websites with support for OpenID sign in. These of course join the likes of Ruby on Rails which already had an OpenID plugin used by sites like 37Signals.
- The OpenID Provider Authentication Policy Extension was approved as a finalized OpenID specification ((PAPE Approved as an OpenID Specification)). It enables Relying Parties to request that the Provider employ specified authentication policies such as that the Provider employ a phishing-resistant authentication method.
- Multiple community driven projects looked at how OpenID usability and security could be improved by integrating OpenID with the web browser. Coming into 2008, VeriSign had launched their OpenID SeatBelt plugin and Sxip launched Sxipper for FireFox and Flock. In 2008, not only did VeriSign ((Personal Identity Portal (PIP) - Learn More About PIP)) and Vidoop ((What is the myVidoop Plugin?)) add one-click sign in functionality to their OpenID Providers, but Flock, MySpace and Vidoop collaboratively launched a new project called Identity in the Browser ((Vidoop and MySpace Bring OpenID to Flock)). I also wrote my thoughts on Getting OpenID Into the Browser, talking about why an identity enabled web browser really should be built.
- The first annual election of the OpenID Foundation's community board members was held where one-hundred-and-seventy-five members voted resulting in the election of Brian Kissel, Chris Messina, David Recordon, Eric Sachs, Nat Sakimura, and Snorri Giorgetti ((OpenID Board Election Results)).