Oasis Security Services Use Cases And Requirements

Straw Man Draft 1, 25 Jan 2001

Purpose

This document describes the requirements and use cases for the XML standard derived by the Oasis Security Services Technical Committee.

Introduction

This document provides an initial set of use cases and requirements for the Oasis Security Services Technical Committee's (TC's) ultimate product, an XML standard for exchanging authentication and authorization data between security systems.

Notes on This Document

At the time of the initial draft of this document, no name for the XML standard derived by the Oasis Security Services Technical Committee had been decided on. As a placeholder, the phrase "[OSSML]" (Oasis Security Services Markup Language) has been used. This is not final and these placeholders will be replaced at a future date.

Requirements are specified as a list of goals and non-goals for the project.

The document uses UML-style use-case diagrams to illustrate use cases. A link to the UML home page is provided below, but the following list is probably sufficient as a crash course in UML use-case diagrams:

Use-case diagrams capture high-level functionality of a system or interaction without providing excessive implementation detail.

Requirements

The following are requirements for the standard.

Goals

Non-Goals

Use Case Scenarios

Each of the following is a use-case scenario describing a goal for usage of [OSSML]. These scenarios can be used to validate designs for other parts of the [OSSML] standard.

Scenario 1: Single Sign-on, Pull Model

Single Sign-on, Pull
    Model
Fig 1. Single Sign-on, Pull Model.

  1. Web user authenticates with source Web site.
  2. Web user requests link to destination Web site.
  3. Source Web site provides user with authentication reference (AKA "name assertion reference"), and redirects user to destination Web site.
  4. Web user requests destination Web site resource, providing authentication reference.
  5. Destination Web site requests authentication document ("name assertion") from source Web site, passing authentication reference.
  6. Source Web site returns authentication document.
  7. Destination Web site provides resource to Web user.

Scenario 2: Single Sign-on, Push Model

This scenario is a variation on the single sign-on scenario. It's called the "push model" because the source Web site pushes authentication information to the destination Web site on a back channel in order to determine

This scenario is based on S2ML's "Scenario 1: User-Driven Transactions (Single Sign-on)" and in the pull model section from the AuthXML document.

Single Sign-on, Push
    Model
Fig 2. Single Sign-on, Push Model.

  1. Web user authenticates with source Web site.
  2. Web user requests link to destination Web site.
  3. Source Web site requests authorization for Web user to use destination resource from destination Web site.
  4. Destination Web site returns authorization reference to Source Web site.
  5. Source Web site provides user with authorization reference and redirects user to destination Web site.
  6. User requests destination resource from destination Web site, providing authorization reference.
  7. Destination Web site provides resource to Web user.

Single Sign-on, Third-Party Security Service

Single Sign-on, Third Party Security Service
Fig 3. Single Sign-on, Third-Party Security Service.

  1. Web user authenticates with security service.
  2. Security service returns [OSSML] authentication reference to Web user.
  3. Web user requests resource from destination Web site, providing authentication reference.
  4. Destination Web site requests authentication document from security service, passing the Web user's authentication reference.
  5. Security service provides authentication document to destination Web site.
  6. Destination Web site provides resource to Web user.

Back Office Transaction

Back Office
    Transaction
Fig 4. Back Office Transaction.

  1. Buyer authenticates with buyer security system.
  2. Buyer security system provides authentication document to buyer.
  3. Seller authenticates with seller security system.
  4. Seller security system provides authentication document to seller.
  5. Buyer and seller execute transaction, providing authentication documents to each other.

Back Office Transaction, Third-Party Security Service

Back Office
    Transaction, Third Party Security Service
Fig 5. Back Office Transaction, Third Party Security Service.

  1. Buyer authenticates with security service.
  2. Security service provides authentication document to buyer.
  3. Seller authenticates with security service.
  4. Security service provides authentication document to seller.
  5. Buyer and seller execute transaction, providing authentication documents to each other.

Application Chain

Application Chain
Fig 6. Application Chain.

  1. Web user authenticates with enterprise security system. Note that authentication may be through e.g. the Web server.
  2. Enterprise security system provides an authentication reference to Web user.
  3. Web user requests a dynamic resource from Web server, providing authentication reference.
  4. Web server requests application function from application on behalf of Web user, providing Web user's authentication reference.
  5. Application requests authentication document from enterprise security system, corresponding to Web user's authentication reference.
  6. Enterprise security system provides authentication document.
  7. Application performs application function for Web server.
  8. Web server generates dynamic resource for Web user.

References

This document is derived from the following sources:

Other references that may be useful:

Document History