> renew=true means re-authentication whatever the previous authentication is. 
> So if you want to stay backward compatible, you can't change this, you need a 
> renew=increase_loa.
> Do you want to specify an explicit loa name by renew or just ask for 
> increasing loa level ?

I'm glad you're dwelling on this point.  I'm wavering on the expected
or desirable behavior here, and most of my vacillation is related to
the impact on user experience in attempting to satisfy expectations of
the service.  I would argue that forcing authentication every time the
renew parameter is present could represent a fairly unpleasant user
experience in some cases.  If a user accesses two services with
renew=true in succession, I would think most users would be fairly
annoyed having to authenticate twice in a short period of time.  The
security value of this annoyance seems negligible.

I'm thinking that perhaps we need to apply some configurable policy to
the concept of renew to allow for considerations such as timing as
well as security policy that could include LOA.  With a policy
framework we could presumably allow deployers to choose strict
backward compatible behavior for renew, or opt for more control over
behavior including assurance considerations.

> Can you point me to some docs at "InCommon Assurance program" ?

http://www.incommon.org/assurance/

> You're right, there are highest LOA above username/password. By the way, 
> what's VT ?

Sorry, should have said, "Virginia Tech" to be clear.  Public
university in southwest Virginia where I work.  I think it's fair to
say we're fairly far along in the use of multifactor/strong
authentication to access secure services, so the interest in combining
that expertise with SSO is fairly natural growth.

> The question is : what authentication mean to display when current LOA is not 
> sufficient ? So far, we just have one : login page for username/password.
> Do we need to create a new concept : authentication mean associated to LOA ? 
> Or just display the login page when LOA is not sufficient ?

This is one of the hardest problems to solve, and in previous
discussions on related topics we've punted it as UX problem to be
solved later largely due to difficulty and lack of requirements.  But
with multifactor and identity assurance, the user experience is
vitally important since the concepts are fairly sophisticated and
users need clear guidance to take required or recommended action to
satisfy security requirements.  Unfortunately, it's hard to imagine a
single framework that would meet the needs of every environment.  The
only successful approach I can imagine is to solve the problem for a
limited number of cases and from that work attempt to generalize.

I suppose I didn't answer your question since it's hard to answer in
general.  I'll offer an answer that's specific to our environment that
might be helpful.  If the client made an LOA demand of 2, we'd show
our user/password UI.  If the client made and LOA demand of anything
higher, we'd display a custom UI for X.509 certificate authentication.

I think it's a reasonable simplifying assumption that for every LOA
there would be a distinct UI, so you could model the LOA to
corresponding view using a map.  I'm fairly certain we'll use this
general approach in our solution.  On the other hand, I can imagine
that some institutions would have various sets of user/pass
credentials that have distinct LOA values all served by a single user
interface.  Those sorts of details make a generalized solution
difficult.

> So far, we talked about client initiated flows (asking for increasing LOA). 
> But I think we can also have LOA definition in CAS service (no use of renew 
> parameter).
> Does it make sense to you ? If so, I will add a second example in spec with 
> LOA defined in CAS service.

It absolutely makes sense and sounds like a valuable feature.

M

-- 
You are currently subscribed to cas-dev@lists.jasig.org as: 
arch...@mail-archive.com
To unsubscribe, change settings or access archives, see 
http://www.ja-sig.org/wiki/display/JSG/cas-dev

Reply via email to