On 10/3/2012 2:04 PM, Anders Rundgren wrote:
> On 2012-10-03 20:45, Andreas Schwier wrote:
>> Hmmm, so why would I want an IDP if I could prove my identity
>> (certificate) and authenticity (client signature in SSL) with the
>> credentials I have on my card ?

The SSO aspect of the IDP... Using a smart card for every access is
an annoyance especially if you have many services a user uses on a daily
basis. It also allows for Federations. InCommon for example.

>>
>> Is it because SAML is easier to integrate than SSL client authentication
>> ? Or is it because I want my IDP (e.g. Google / Facebook) to know what
>> I'm doing ?

The IDP in our case is an enterprise IDP only usable by employees.

>>
>> The IDP model is perfect for username / password, but IMHO it's of less
>> use when you use keys and certificates. In the later case the CA is your
>> IDP by providing you with a certificate you can use to authentication
>> towards others (who trust that certificate issuer as they would trust
>> the IDP). And just lets wait for the first Diginotar incident at an IDP
>> - ops they've copied our SAML signing keys...)

Yes that is a concern.

>
> I think one of the reasons is that the folks that created 
> TSL-client-certificate-authentication
> forgot to implement logout in a way that works for web applications.
>
> They claim that this is a "feature" and that I'm just to understand 
> understand the beauty of it :-)
> So everybody has to write local IDPs using SAML or cookies even if they have
> PKI if they want to build anyhthing that looks like a real web app.
>
> Then there are of course other a very legitimate uses of IDPs where
> SAML attributes carry potentially completely alien information like
> a role which often is less suitable having in a certificate.

Yes, that too. We can map the certificate to an employee and pass
employee attributes. Especially helpful if the smart cards are issued by
some higher authority.

>
> Andes
>
>
>>
>> Andreas
>>
>> Am 03.10.2012 15:44, schrieb Douglas E. Engert:
>>>
>>> On 10/3/2012 5:08 AM, Andreas Schwier (ML) wrote:
>>>> So why do you think the smart card industry has never managed to get
>>>> their stuff "web compatible" ?
>>>>
>>>> Isn't OpenSC the best example that "Yes, you can access a protected
>>>> website / webapplication / webservice using a smart card and standard
>>>> based technology" works ?
>>>>
>>>> The issue really is, that the topic at hand (PKI) is way to complex for
>>>> the average Doe to manage. That's always the downside: Security often
>>>> means complexity and comes with a price tag. And if it is complex, hard
>>>> to understand and someone offers some cheaper snake-oil, I probably go
>>>> for that.
>>>>
>>>> Rather than exposing the complexity of the matter with a zoo of options
>>>> you can choose from, we need to focus on a single generic mechanism and
>>>> a well designed user experience.
>>>>
>>>> It's all there (meaning S/MIME and TLS), it just needs to become a
>>>> little simpler to manage. So rather than re-inventing the n-solution for
>>>> Web-ID, SSO or One-Time-Passwords, we - as a community - should improve
>>>> what is already existing.
>>> The approach we are taking for SSO is Shibboleth.
>>>
>>> http://shibboleth.net/
>>>
>>> Using the X509 login handler:
>>>
>>> https://wiki.shibboleth.net/confluence/display/SHIB2/X.509+Login+Handler
>>>
>>> OpenSC provides the client cert and key for TLS authentication to the IDP.
>>>
>>> Shibboleth is all SAML based, and can work with other SAML based
>>> services.
>>>
>>> Support for OTP or whatever then is only needed in the IDP.
>>>
>>>
>>>> Andreas
>>>>
>>>>
>>>>
>>>>
>>>>
>>>>
>>>> Am 03.10.2012 11:09, schrieb Anders Rundgren:
>>>>> http://www.w3.org/2012/09/sysapps-wg-charter 
>>>>> <http://www.linkedin.com/redirect?url=http%3A%2F%2Fwww%2Ew3%2Eorg%2F2012%2F09%2Fsysapps-wg-charter&urlhash=Tqzg&_t=tracking_disc>
>>>>>
>>>>> Since the smart card industry have never managed making their stuff "web 
>>>>> compatible" before, I assume they will fail this time as well.
>>>>>
>>>>> Anders
>>>>> _______________________________________________
>>>>> opensc-devel mailing list
>>>>> opensc-devel@lists.opensc-project.org
>>>>> http://www.opensc-project.org/mailman/listinfo/opensc-devel
>>>>
>>
>>
>
> _______________________________________________
> opensc-devel mailing list
> opensc-devel@lists.opensc-project.org
> http://www.opensc-project.org/mailman/listinfo/opensc-devel
>
>

-- 

  Douglas E. Engert  <deeng...@anl.gov>
  Argonne National Laboratory
  9700 South Cass Avenue
  Argonne, Illinois  60439
  (630) 252-5444


_______________________________________________
opensc-devel mailing list
opensc-devel@lists.opensc-project.org
http://www.opensc-project.org/mailman/listinfo/opensc-devel

Reply via email to