Dear James, all, We apologise for not clearly stating the purpose of draft-pashalidis-sip-saml-00 and its key differences with draft-ietf-sip-saml-04.txt - we should have done that.
> [...] making me question why the new ID was written [...] [...] asking > if you can explain the need for this second SAML in SIP ID [...] We wrote this ID having in mind the following main use case (among others). The user wants to register with his SIP proxy, and is then put in contact with his IdP to perform authentication. The IdP provides authentication (as a service) but is not itself a SIP proxy. In general, the IdP provides authentication and user attributes to a multitude of service providers (including SIP proxies, webservers, and other types of service). In other words, we would like to have a solution where the authentication is offloaded to an IdP, and where the relevant messages are SAML messages. We do not think that this competes or interferes with other user authentication mechanisms for SIP in any way. The reason why would like to have the messages encoded in SAML is because this is likely to maximise overall interoperability (and hence, positively affect overall user experience) since one can make the system work with any SAML-based IdP with limited effort. Having a SIP proxy accept a SAML authentication assertion means that we can have Single Sign-On *across* application domains (e.g. across HTTP and SIP) - this is what we would like to have. The main differences of draft-pashalidis-sip-saml-00 and draft-ietf-sip-saml-04.txt are as follows (according to our current, perhaps limited, understanding). 1. the former addresses the main use case above; the latter doesn't because it only allows the exchange of attributes (and "trait-based authorization" somehow conveys the message that the user's authentication status is NOT regarded as an attribute, i.e. explicitly excluded) 2. the former focuses on the SIP REGISTER method; the latter focuses on the SIP INVITE method 3. (as a side-effect of 2:) the former focuses of the provision of user authentication and attributes to the SIP proxy of the *caller*; the latter focuses on the provision of attributes to the *callee* (or its SIP proxy) 4. the former specifies how to carry SAML over SIP, in a fashion that is similar to the way that HTTP has been specified to carry SAML. The advantage of SIP carrying SAML messages is that SIP UAs or SIP proxies do not need to implement two different transport protocols (SIP and HTTP), as is currently required by draft-ietf-sip-saml-04.txt. However, this could be easily added to the existing WG doc as well (at least we think so). As to the why we submitted this draft, we wanted to support these activities which we think are important and fit to our current use of SIP and SAML. The current WG doc has a scope founded by rfc4474 and rfc4484 which does not cover all the use cases we'd like. Perhaps those are outside the scope of the WG, we think that's the discussion we'd like to have. The draft should be seen as input on this topic rather than competing or a statement of disagreement. The other reason to submit this draft was to try and rekindle the discussion on the use of SAML in the context of SIP (it's recently been rekindled enough :)). We believe it is very important to have a consistent view on SSO and attribute exchange - a view that is consistent across platforms and, as much as possible, application domains. Best Regards, Andreas & Joao NEC Europe Limited | Registered Office: NEC House, 1 Victoria Road, London W3 6BL | Registered in England 2832014 _______________________________________________ Sip mailing list https://www.ietf.org/mailman/listinfo/sip This list is for NEW development of the core SIP Protocol Use [EMAIL PROTECTED] for questions on current sip Use [EMAIL PROTECTED] for new developments on the application of sip
