> First, if the SAML assertion is generated by a legacy idP then it should 
> discriminate between requesters (the RADIUS server in this case) and to 
> decide not to sign the assertion issued for this entity. It could be ok, but 
> I think should be explicitly described     in the text. Other option is to 
> allow the RADIUS server cuts short the assertion and to remove the XML 
> signature, but I don't like this.

The acceptor could ignore it.

> Second, you have to take into account that the SAML assertion will be for a 
> one-time use and it could not be managed/validated by a third party. Let's 
> think in a scenario where the received assertion is used later on to request 
> other end user attributes and the     original SAML assertion should be first 
> validated in order to check validity.


This makes sense (kind of like Kerberos constrained delegation where the 
authorisation data is signed). But it could be optional?

-- Luke
_______________________________________________
abfab mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/abfab

Reply via email to