OpenID, the "decentralized standard for user authentication and access control" has a nice feature whereby you can use your own domain as your OpenID login.

Basically you put a few lines of HTML in your <head> tag, and any OpenID supporting basically treats it as a redirect.

I have a Verisign PIP OpenID account, to login to various sites (such as the Stackoverflow "family" of sites), but I can use my own domain (dbrweb.co.uk) as a login.. I could run my own OpenID "endpoint", but this is much simpler, and more secure (as Versign will do a better job than I could)

Anyway, a bit of searching later and I came across Verisign PIP OpenID Delegation Code, which contains the following code..

<link rel="openid.server" href="https://pip.verisignlabs.com/server/" />
<link rel="openid.delegate" href="http://username.pip.verisignlabs.com/" />
<meta http-equiv="X-XRDS-Location" content="http://pip.verisignlabs.com/user/username/yadis" />
<meta http-equiv="X-YADIS-Location" content="http://pip.verisignlabs.com/user/username/yadis" />

I replaced username with my PIP username, changed the self-closing tags /> to HTML strict-compaible > and ended up with the following <head> tag:

<head>
    <title>dbrweb</title>
    <link rel="openid.server" href="http://pip.verisignlabs.com/server">
            <link rel="openid.delegate" href="http://dbr.pip.verisignlabs.com">
            <link rel="openid2.server" href="http://pip.verisignlabs.com/server">
            <link rel="openid2.local_id" href="http://dbr.pip.verisignlabs.com">
            <!-- ...other stuff.. -->
</head>

Simple.