Thanks Kyle. I am going to look at this and Patrick's suggestions for
SAML and WS-Fed. They seem to be viable options.

On Tue, Jul 15, 2008 at 2:22 PM, Kyle Hamilton <[EMAIL PROTECTED]> wrote:
> On Tue, Jul 15, 2008 at 7:57 AM, Oil Supply <[EMAIL PROTECTED]> wrote:
>>> If you are including a value in there that is meant to be read by a person,
>>> then yes. If you are including a value in there that is meant to be
>>> interpretted and acted upon by a Relying Party computer program, then no -
>>> but then, as I said in my previous message, if you include a private
>>> extension, the chances of either of these being possible with a
>>> non-proprietary client is approximately nil. If your certificates are only
>>> ever being used by a proprietary client in a closed community, then feel 
>>> free
>>> to add Private Extensions. If not, then it would probably be better to find 
>>> a
>>> way to express what you want to convey using one of the standard extensions.
>>
>> ah, now that clears things up. Thanks Patrick.
>>
>> I am toying with the efficacy to use certificate attributes to make
>> application decisions (access control, look and feel, etc), so yes, a
>> private, closed system.
>
> There's actually a type of certificate out there that is called an
> "Attribute Certificate" that can provide access-control rights.  You
> might want to look into this -- generally, the CA would in this case
> be the authenticator (either Active Directory, or Kerberos, or
> something that provides centralized user authentication) which issues
> certificates with relatively-short times, revoked whenever the user
> logs out or otherwise changes some security attribute (such as group
> membership).
>
>> My idea, not a new one by any means, is to separate user provisioning
>> from application logic. I want to have an authoritative source of the
>> user and their role, and based on that, the application does something
>> special. I know there are probably easier ways to do this like assign
>> a user a role in the app, but I may want to have the user access
>> multiple apps and using a certificate seems like a good option. I will
>> certainly use the standard options where I can. I am reading through
>> the IETF PKIX docs even as we speak.
>
> I should mention that Lotus Domino has been doing this for nearly 20
> years.  If it had a lower cost-of-entry (currently it's around $35,000
> for a single server, plus licenses to run Notes clients, plus client
> licenses for Notes clients to access the Domino server) I'd recommend
> it as a potentially-viable approach.
>
> Alas, it's not.
>
> -Kyle H
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           [EMAIL PROTECTED]
>
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to