>>>>> "Leif" == Leif Johansson <[email protected]> writes:

    Leif> On 11/08/2012 09:39 PM, Sam Hartman wrote:
    >> 
>
> Klaas> Also speaking as an individual. I do support the idea of
    Klaas> using RadSec. However, I think that one reason why one would
    Klaas> be willing to support SAML sigs is the simple fact that they
    Klaas> exist today and presumably organizations might be willing to
    Klaas> continu to use their existing practice for end to end
    Klaas> protection. I realize that in some scenarios it will be
    Klaas> impossible for the RP to verify the signature, but I'd say
    Klaas> that in the majority of cases this is not more of a problem
    Klaas> than it would be in RadSec (barring trust router
    Klaas> implementations).
    >> 
    >> Sure, and for that reason, I think SAML sig validation
    >> implementation should be a SHOULD.  But I think for an MTI
    >> mechansim we should pick something that actually protects the
    >> whole exchange.
    Leif> Still with no hat on whatsoever...

    Leif> You seem to be assuming a situation where attributes are
    Leif> sometimes sent as AAA-attributes and sometimes as
    Leif> SAML-attributes.

no, I'm assuming that deployments have the flexibility as to whether to
use AAA attributes or SAML attributes.
Some of the use cases I'm looking at involve no SAML at all; some
involve using SAML for everything.

Having multiple ways to convey attributes was a fairly explicit decision
here. It's true that it means attribute-container-specific security
mechanisms lose value.
_______________________________________________
abfab mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/abfab

Reply via email to