OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.

 


Help: OASIS Mailing Lists Help | MarkMail Help

id-cloud message

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]


Subject: RE: ID-Cloud Minutes from June 28 2010 Call


Thomas,

Please add my name to the list

Thanks
Doron


-----Original Message-----
From: Thomas Hardjono [mailto:hardjono@MIT.EDU] 
Sent: Monday, June 28, 2010 22:53
To: id-cloud
Cc: Anil Saldhana; Anthony Nadalin
Subject: [id-cloud] ID-Cloud Minutes from June 28 2010 Call

Minutes from Oasis ID-Cloud TC (June 28, 2010)

1) Roll Call:
John Bradley
Andy Kindred - Acxiom
John Dilley - Akamai Technologies
James Ducharme Aveksa, Inc.
Paul Lipton - CA*
Mark Robinton - HID Global
Heather Hinton - IBM
Matthew Rutkowski - IBM
John Bradley - Individual
Peter Brown - Individual
Gershon Janssen - Individual
Michael Stiefel* - Individual
Thomas Hardjono - M.I.T.
Dee Schur - OASIS *
Patrick Harding - Ping Identity Corporation*
Anil Saldhana - Red Hat
Bill Becker - SafeNet, Inc.
Tom Clifford - Symantec Corp.*
Kyle Austin - TriCipher, Inc.
Siddharth Bajaj - VeriSign
Daniel Turissini - WidePoint Corporation

2) Approval of the June 14th Minutes
http://lists.oasis-open.org/archives/id-cloud/201006/msg00036.html

   Moved: Gershon Janssen.
   Second: John Bradley.
   No objections. Minutes approved.


3) Discussion of Safe Net Use Cases by Doron Cohen/Bill Baker

(A) Use-Case #1: Privileged Accounts in the Cloud.
- Use-Case description: Need more stringent security (eg. auth, audit, etc) than normal accounts and in-perimeter accounts.

- Anil: Q: Can we make this into an infrastructure Privileged Account
  + Doron: We need a new set of requirements for cloud service (different from traditional in-perimeter infra). 
  + Siddarth: Supports this use-case.

- John Dilley: Q: Would authN infra for this use-case be different than in normal accounts?
  + Doron: They may have different policies and different back-end capabilities. Thus we need this new use-case.

- John Dilley: We need to create a core set of mechanisms that are true/valid across all use-cases (in the Cloud-ID TC).

- John Bradley: has been looking at Federation metadata (from projects in Europe), including issues relating to SAML usage (eg. is SAML secure enough). Some accounts in the cloud will need better risk analysis.

- Patrick: agrees with John Bradley and John Dilley. Has questions about federated accounts. What happens if things go wrong (ie. when even the privileged accounts/users get locked-out). Need a statement how to handle this.

- Anil: Any assumptions about federated identity and the priviledged accounts use-case?
  + Doron: No assumptions. Up to each implementation.
  + Siddarth: has seen these implemented before.


(B) Use-Case #2: Enterprise employee accesing cloud services.
- Use-Case description: Regular employee of Enterprise want to access cloud services.
  + Want to benefit from SSO
  + Will require different level of assurance (ie. compared to intra-enterprise services)
  + Will require different sec. requirements and authN policies.
  + Related to federated provisioning.
  + Will need to support different form-factors and access methods.

- Thomas Hardjono: Q: Is the cloud-service part of the Enterprise or is it run by a trusted third party (TTP)?
  + Doron: the later (ie. TTP).

- Anil: Suggest to change the title of the use-case.
  + Doron: agree, but want to focus on extending the (enterprise) identity to the cloud.


(C) Use-Case #3: Consumer scenario.
- Use-Case description: Want to use a Consumer Identity to access different services on the Internet
  + Instead of using the one-ID per service today.
  + Want SSO capability.
  + Has similar requirements (to previous use-case?)
  + Main twist: Need for privacy and need for user-control over which informations to disclose.

- John Dilley: Q: is that ID linked to an enterprise ID?
  + There is the *why* and the *how* questions.
  + Is this simply a federated ID use-case?
  + Each ID (in an environment) typically has an accompanying info about that ID. Do we mean to export this info to other/new environments?

- Patrick Harding: If I was a web service, why would I let my user authenticate using Google, Yahoo, etc ?
  + John Bradley: for targetted apps.
  


4) Follow up on the Kerberos In The Cloud Discussion
- Thomas Hardjono: no update for today, but plan to update the use-case doc.

5) Other Business
* Members Reference: Cloud Identity Summit in July
(http://www.cloudidentitysummit.com/)

6) Adjourn
- Next telecon on 12 July 2010.
- Moved: Gershon
 + seconded: John Dilley.
 + No objections. Meeting adjourned.


________
SoapHub chatroom:

anonymous2 morphed into Michael Stiefel
anonymous3 morphed into Doron Cohen
Doron Cohen morphed into Doron Cohen (SafeNet)
anonymous morphed into John Dilley (Akamai)
AnilSaldhana_RedHat: The bridge has toll free numbers your individual countries. That will save you from calling the US.
AnilSaldhana_RedHat: Doron, thanks for joining in.  It must be late for you.
Peter morphed into Peter F Brown
anonymous morphed into Jim Ducharme
Jim Ducharme morphed into Jim Ducharme (Aveksa)
anonymous1 morphed into Siddharth Bajaj
Siddharth Bajaj morphed into Siddharth Bajaj (VeriSign)
anonymous morphed into Benny Koren (Mellanox)
anonymous morphed into Jason Rouault (HP)
Heather Hinton (IBM): just joined on the phone
anonymous morphed into Patrick Harding
Thomas Hardjono (MIT)1: Notes: Minutes from 14 June 2010 meeting approved unanimously. Moved by Gershon Janssen. 2nd by John Bradley.
John Bradley: Meeting Attendees
NameCompanyStatus
Andy KindredAcxiomGroup Member
John DilleyAkamai TechnologiesGroup Member
Paul LiptonCA*Group Member
Mark RobintonHID GlobalGroup Member
Heather HintonIBMGroup Member
Matthew RutkowskiIBMGroup Member
John BradleyIndividualGroup Member
Peter BrownIndividualGroup Member
Gershon JanssenIndividualGroup Member
Michael Stiefel*IndividualGroup Member
Thomas HardjonoM.I.T.Group Member
Dee SchurOASIS *Group Member
Patrick HardingPing Identity Corporation*Group Member
Anil SaldhanaRed HatGroup Member
Bill BeckerSafeNet, Inc.Group Member
Tom CliffordSymantec Corp.*Group Member
Kyle AustinTriCipher, Inc.Group Member
Siddharth BajajVeriSignGroup Member
Daniel TurissiniWidePoint CorporationGroup Member
Jim Ducharme (Aveksa): Please add Jim Ducharme (Aveksa) to the attendee list.
AnilSaldhana_RedHat: John, I usually copy paste into an editor and remove the "Group Member"
Matt Rutkowski (IBM): The case of avoiding use of the same identity (token) (e.g. email address) seems new to the discussion as this leads to customer risk.  In cloud, it seems a real concern that there is a masking to the customer that they are accessing hosted (partner) services and that leads to inadvertent release of privacy information related to identity and at the worst perception that reuse of passwords for the same identity token is acceptable.
John Bradley: NameCompany
Andy KindredAcxiom
John DilleyAkamai Technologies
James DucharmeAveksa, Inc.
Paul LiptonCA*
Mark RobintonHID Global
Heather HintonIBM
Matthew RutkowskiIBM
John BradleyIndividual
Peter BrownIndividual
Gershon JanssenIndividual
Michael Stiefel*Individual
Thomas HardjonoM.I.T.
Dee SchurOASIS *
Patrick HardingPing Identity Corporation*
Anil SaldhanaRed Hat
Bill BeckerSafeNet, Inc.
Tom CliffordSymantec Corp.*
Kyle AustinTriCipher, Inc.
Siddharth BajajVeriSign
Daniel TurissiniWidePoint Corporation
AnilSaldhana_RedHat: I am bit under the weather. thanks to everyone for bearing my voice.
___________________________________


---------------------------------------------------------------------
To unsubscribe from this mail list, you must leave the OASIS TC that
generates this mail.  Follow this link to all your TCs in OASIS at:
https://www.oasis-open.org/apps/org/workgroup/portal/my_workgroups.php 

The information contained in this electronic mail transmission 
may be privileged and confidential, and therefore, protected 
from disclosure. If you have received this communication in 
error, please notify us immediately by replying to this 
message and deleting it from your computer without copying 
or disclosing it.




[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]