On 2012-10-03 20:45, Andreas Schwier wrote:
> Hmmm, so why would I want an IDP if I could prove my identity
> (certificate) and authenticity (client signature in SSL) with the
> credentials I have on my card ?
> 
> Is it because SAML is easier to integrate than SSL client authentication
> ? Or is it because I want my IDP (e.g. Google / Facebook) to know what
> I'm doing ?
> 
> The IDP model is perfect for username / password, but IMHO it's of less
> use when you use keys and certificates. In the later case the CA is your
> IDP by providing you with a certificate you can use to authentication
> towards others (who trust that certificate issuer as they would trust
> the IDP). And just lets wait for the first Diginotar incident at an IDP
> - ops they've copied our SAML signing keys...)

I think one of the reasons is that the folks that created 
TSL-client-certificate-authentication
forgot to implement logout in a way that works for web applications.

They claim that this is a "feature" and that I'm just to understand understand 
the beauty of it :-)
So everybody has to write local IDPs using SAML or cookies even if they have
PKI if they want to build anyhthing that looks like a real web app.

Then there are of course other a very legitimate uses of IDPs where
SAML attributes carry potentially completely alien information like
a role which often is less suitable having in a certificate.

Andes


> 
> Andreas
> 
> Am 03.10.2012 15:44, schrieb Douglas E. Engert:
>>
>> On 10/3/2012 5:08 AM, Andreas Schwier (ML) wrote:
>>> So why do you think the smart card industry has never managed to get
>>> their stuff "web compatible" ?
>>>
>>> Isn't OpenSC the best example that "Yes, you can access a protected
>>> website / webapplication / webservice using a smart card and standard
>>> based technology" works ?
>>>
>>> The issue really is, that the topic at hand (PKI) is way to complex for
>>> the average Doe to manage. That's always the downside: Security often
>>> means complexity and comes with a price tag. And if it is complex, hard
>>> to understand and someone offers some cheaper snake-oil, I probably go
>>> for that.
>>>
>>> Rather than exposing the complexity of the matter with a zoo of options
>>> you can choose from, we need to focus on a single generic mechanism and
>>> a well designed user experience.
>>>
>>> It's all there (meaning S/MIME and TLS), it just needs to become a
>>> little simpler to manage. So rather than re-inventing the n-solution for
>>> Web-ID, SSO or One-Time-Passwords, we - as a community - should improve
>>> what is already existing.
>> The approach we are taking for SSO is Shibboleth.
>>
>> http://shibboleth.net/
>>
>> Using the X509 login handler:
>>
>> https://wiki.shibboleth.net/confluence/display/SHIB2/X.509+Login+Handler
>>
>> OpenSC provides the client cert and key for TLS authentication to the IDP.
>>
>> Shibboleth is all SAML based, and can work with other SAML based
>> services.
>>
>> Support for OTP or whatever then is only needed in the IDP.
>>
>>
>>> Andreas
>>>
>>>
>>>
>>>
>>>
>>>
>>> Am 03.10.2012 11:09, schrieb Anders Rundgren:
>>>> http://www.w3.org/2012/09/sysapps-wg-charter 
>>>> <http://www.linkedin.com/redirect?url=http%3A%2F%2Fwww%2Ew3%2Eorg%2F2012%2F09%2Fsysapps-wg-charter&urlhash=Tqzg&_t=tracking_disc>
>>>>
>>>> Since the smart card industry have never managed making their stuff "web 
>>>> compatible" before, I assume they will fail this time as well.
>>>>
>>>> Anders
>>>> _______________________________________________
>>>> opensc-devel mailing list
>>>> opensc-devel@lists.opensc-project.org
>>>> http://www.opensc-project.org/mailman/listinfo/opensc-devel
>>>
> 
> 

_______________________________________________
opensc-devel mailing list
opensc-devel@lists.opensc-project.org
http://www.opensc-project.org/mailman/listinfo/opensc-devel

Reply via email to