El 10/01/11 20:17, Sam Hartman escribió:
Things get a lot more messy when assertions from multiple IDPs are
included.
What does it mean to include them in the AAA transport? I can think of
several trust models that are appropriate depending on deployment:
* The IDP corresponding to the subject's NAI has validated these
additional assertions and wishes to assert that the attributes can be
trusted. "If you trust me then you should trust these." Here, the
assertions are being included either for convenience of packaging the
attributes into some form the RP can process or because it is possible
that the RP may be able to validate some signature and trust the
attribute source more than the IDP.
It should require a trust relationship between attribute providers and
idp, in order to validate attribute assertions before to sent them all
together to the RP. I just want to remark the requirement of this trust
relationship.
* The subject IDP has performed SAML validation on the
assertions. However the IDP is making no claims about how trusted the
attributes included in the additional assertions are. Even if the IDP
would be permitted to make a claim made in an additional assertion,
the RP needs to make an independent policy decision about whether the
actual issuer should be permitted to make that claim.
you could include here XACML
* Here are some assertions for the RP's convenience. The IDP makes no
claims about them; not even the implied claim that they have not been
modified in transit. They better be signed, the RP better have
metadata for their issuer, and the RP is more or less on its own.
I'm not sure to understand this point. Do you need the trust
relationship between RP and idP?
Another source of complexity surrounds how an IDP links an assertion to
a subject. What confidence is the RP asserting that the additional
assertion describes the same principal as the access-accept message.
Another potential source of complexity is how does the IDP know what
information to gather? Does the IDP just know somehow? Does the RP pass
information back?
The RP could request specific attributes in a SAML Attribute Query.
Beside, idP/attribute provider could decide what attributes be disclosed
to the RP, by means of attribute release policies (XACML?)
regards, Gabi.
How does the RP make the policy decisions it needs to make? How does it
get metadata that is needed?
I think this sort of issue will also have impacts for kitten, because
we'll need to describe it in the naming extensions interface. It seems
like ABFAB is not going to be the only group facing these sorts of
discussions; Kerberos is in the middle of a similar discussion right
now.
_______________________________________________
abfab mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/abfab
--
----------------------------------------------------------------
Gabriel López Millán
Departamento de Ingeniería de la Información y las Comunicaciones
University of Murcia
Spain
Tel: +34 868888504
Fax: +34 868884151
email: [email protected]
_______________________________________________
abfab mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/abfab