[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]
Subject: Notes from today
Attendance –
Anil Saldhana David Chadwick David Kern David Turner Dominique Nguyen Felix Gomez Gines Dolesa Tony Nadalin Lippa02 Room Information: <place room info (eg call-in #s) here> US Call: (800) 451-8679
CONFERENCE CODE: 6703828003 [14:00] anonymous morphed into David Kern (IBM) [14:00] David Kern (IBM): I'll be dialing in a few minutes late today [14:02] Dominique Nguyen (Bank of America): Good morning [14:05] AnilSaldhana(RedHat): Minutes 1. Roll Call, Agenda Review and Minute Taker Nomination 2. Approval of 7 Jan 2013 Meeting Minutes https://lists.oasis-open.org/archives/id-cloud/201301/msg00003.html 3. Gap Analysis Document 4. Profile Documents 5. Other Business 6. Adjourn [14:08] Cathy Tilton (SCC): No quorum yet - defer approval of minutes [14:09] Cathy Tilton (SCC): Gap analysis pending doc upload [14:09] AnilSaldhana(RedHat): IDCloud PaaS Profile Document:
https://www.oasis-open.org/committees/download.php/47969/IDCloud-paas-v1e.pdf [14:10] Cathy Tilton (SCC): Pg 6, Identity services changed to security services [14:11] Cathy Tilton (SCC): Plus added figure for this [14:12] Cathy Tilton (SCC): David - What about directory services? Would this be
needed in a federated environment? [14:13] Cathy Tilton (SCC): Could be added in text or in a graphic. [14:13] Cathy Tilton (SCC): Put under directory services. [14:14] Cathy Tilton (SCC): e.g., lookup users [14:15] Cathy Tilton (SCC): Try not to get into implementation. [14:16] Cathy Tilton (SCC): Dominique - Is monitoring included in one of the existing
boxes (e.g., auditing) [14:17] Cathy Tilton (SCC): Compliance monitoring - where to put it? [14:18] AnilSaldhana(RedHat): sorry dialing back [14:19] Cathy Tilton (SCC): Dominique - monitoring for unauthorized access attempts [14:21] Cathy Tilton (SCC) morphed into Cathy Tilton (Daon) [14:22] Cathy Tilton (Daon): Anil - Too high level? [14:22] AnilSaldhana(RedHat): IDCloud Outsourcing Profile:
https://www.oasis-open.org/committees/download.php/47971/IDCloud-outsourcing-v1.0-wd01b.pdf [14:22] Cathy Tilton (Daon): Keep at this level as it is meant to provide context.
Too low will distract and may get into implementation. [14:22] Cathy Tilton (Daon): OK for now. [14:24] Cathy Tilton (Daon): Outsourcing defined. Make more specific to identity
outsourcing. [14:26] Cathy Tilton (Daon): May be covered in introduction [14:26] Cathy Tilton (Daon): Maybe add something to Clause 2 also. [14:30] Cathy Tilton (Daon): CT - will the document address different groupings of
functional components such that these groupings can be outsourced? [14:30] Cathy Tilton (Daon): Try to address in next version. [14:31] Cathy Tilton (Daon): Use case 26 - question definition of impersonation [14:32] Cathy Tilton (Daon): Perhaps delegation? No different. Maybe make 2 separate
use cases. [14:33] Cathy Tilton (Daon): Malicious vs non-malicious? Both are non-malicious. [14:33] Cathy Tilton (Daon): 'out of band' authorized impersonation [14:34] Cathy Tilton (Daon): How accomodate this? [14:35] Cathy Tilton (Daon): When the computer knows and doesn't know. [14:35] Cathy Tilton (Daon): Biometrics complicate. [14:35] Cathy Tilton (Daon): Add text to existing description to clarify. [14:35] Cathy Tilton (Daon): 'Impersonation' has a malicious connotation. [14:37] Cathy Tilton (Daon): Use case comes from another document. [14:37] Cathy Tilton (Daon): Use cases are referenced by the gap analysis doc as
well. [14:38] Cathy Tilton (Daon): Enough info for Dominique to start her doc? Yes. [14:40] Cathy Tilton (Daon): Use Word or OpenOffice? [14:40] Cathy Tilton (Daon): Either OK. [14:41] Cathy Tilton (Daon): Can convert. Can post as PDF. |
[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]