On Mon, Aug 13, 2012 at 7:12 AM, jleleu <lel...@gmail.com> wrote:

> Hi Matt,
>
> Thanks for your feedback.
>
> I agree with you on LOA definition but CAS is not dealing with
> registration process but authentication procces, so LOA I talked about must
> be seen as a LOAA : Level Of Assurance in Authentication.
>

Agreed -- and perhaps we can map the LoAA and Authentication Handlers to
the SAML Authentication Method Identifiers in section 7.1 here?:
https://www.oasis-open.org/committees/download.php/3406/oasis-sstc-saml-core-1.1.pdf


>
> I still believe a numeric value is appropriate for it, as levels of
> assurance can also be given multiple names. So I imagine we can have (just
> to give you a silly example) : LOA4 (value = 30, names="NIST_Level2",
> "IAP_Bronze"). I think of numeric value as internal LOA for CAS server and
> names as public standards references.
>
>

I argue this only from our own scenarios compared to your current ranking
-- as a single example, for us, a Remember Me cookie is probably /stronger/
than an IP, given that we NAT a significant part of our wireless network.
 However, I understand that would not necessarily be true for all
deployers.  I would think it very difficult to develop a system that can
compare the strengths and weakness of each method in a relative numerical
fashion, meeting all CAS deployers needs.

Admittedly, I am thinking about this in a Federation sense, where we all
agree to common values.  If these values are free to change by each
deployer, with no need to maintain commonality across deployers, perhaps
this is not important.

I'm not sure to understand if you find something wrong in the spec and if
> so, what do you want to change and how ? I expect discussions on this
> thread to be *also* more concrete and more focused on concepts and spec
> parts.
>
> About the two options you propose and your recommendation (#2), I think I
> agree with you and the spec should be more precise on responses to client.
> I present LOA as *requested* from client or by CAS server definition and
> not as *computed* to be returned to client. Proofing and authentication
> attributes should be returned to client (and certainly *effective* LOA
> also).
>
>
I think section IV, use of the "renew=name", could be expanded.  Perhaps it
shouldn't be an LoA that is requested (since LoA requires proofing
assurance), but just an Authentication Method (or list of acceptable
authentication methods), ideally using the values in the SAML spec.
 Authentication Handlers then register one or more Authentication Method
Identifiers, and deployers could map Authentication Method Identifiers to
custom authentication handlers.

Uniform use of the SAML Identifiers would let clients perform authorization
on the authentication method, and request a specific authentication method
(or set of authentication methods) from the server, in a consistent fashion.

Note well -- I am nitpicking on detail of the naming specification and
relative comparison process.  In general, I think the writeup is very good.


-- 
m...@forsetti.com
PGP: E2144AD8

-- 
You are currently subscribed to cas-dev@lists.jasig.org as: 
arch...@mail-archive.com
To unsubscribe, change settings or access archives, see 
http://www.ja-sig.org/wiki/display/JSG/cas-dev

Reply via email to