OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.

 


Help: OASIS Mailing Lists Help | MarkMail Help

id-cloud message

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]


Subject: RE: [id-cloud] 19 March 2012 Meeting Minutes of the Oasis IDCloud TC


----------------------------------------
DRAFT MINUTES
OASIS IDCloud TC Meeting
19 March 2012, 02:00pm to 03:00pm ET
----------------------------------------

Scribe: Anil Saldhana

1. Roll Call and Agenda Review

Name                  Status
----                  ------
Anil Saldhana	Member
Anthony Nadalin	Member
Colin Wallis	Member
David Kern	Member
David Turner	Member
Dr. Dominique Nguyen	Member
Matthew Rutkowski	Member
Roger Bass	Member
Cathy Tilton	Member

Observers:
None.

9 people joined the meeting.

This meeting quorates.

Member status status changes:

Lost voting rights:
None.

Gained voting rights:
David Turner

Now: 11 voting members in TC.


-----Original Message-----
From: id-cloud@lists.oasis-open.org [mailto:id-cloud@lists.oasis-open.org]
On Behalf Of Anil Saldhana
Sent: maandag 19 maart 2012 20:14
To: id-cloud
Subject: [id-cloud] 19 March 2012 Meeting Minutes of the Oasis IDCloud TC

=============
David Kern (IBM): Hmm... doesn't look like we've reached quorum yet.
Roger Bass morphed into Roger Bass (Traxian) David Kern (IBM): Anil - have
you started the call yet?
anonymous morphed into Cathy Tilton (Daon)
AnilSaldhana(RedHat): just did it
AnilSaldhana(RedHat): David Kern: it takes like 90 secs to start the call.
David Kern (IBM): wow...
AnilSaldhana(RedHat):
=========
AnilSaldhana(RedHat): Agenda
1) Roll Call, Agenda Review and Minute Taker Nomination.
2) Approval of the 5 March 2012 Meeting Minutes.
http://lists.oasis-open.org/archives/id-cloud/201203/msg00028.html
3) [VOTE] Approve Editor's Draft
(http://www.oasis-open.org/committees/download.php/45416/id-cloud-usecases-v
1.0-wd02a.doc)
as Committee Note Draft and send it to 15 day Public Review.
4) Gap Analysis Discussion.
5) Other Business.
6) Adjourn.
AnilSaldhana(RedHat): ==========================

AnilSaldhana(RedHat): Roll Call:  6 out of 10 voting members (60%): achieved


Dominique Nguyen (Bank of America): Hi, i

Dominique Nguyen (Bank of America): m in the chat room now

Dominique Nguyen (Bank of America): 2nd item Approval of March 5 meeting
meeting

AnilSaldhana(RedHat): 
http://lists.oasis-open.org/archives/id-cloud/201203/msg00035.html

AnilSaldhana(RedHat): Approval of 5th march 2012 meeting minutes

AnilSaldhana(RedHat): Dominique: moves. Anil: seconds

Dominique Nguyen (Bank of America): no ojection

AnilSaldhana(RedHat): meeting minutes approved.

Matt Rutkowski (IBM): 
http://www.oasis-open.org/apps/org/workgroup/id-cloud/download.php/45416/id-
cloud-usecases-v1.0-wd02a.doc

AnilSaldhana(RedHat): Approve Editor's Draft
(http://www.oasis-open.org/committees/download.php/45416/id-cloud-usecases-v
1.0-wd02a.doc)
as Committee Note Draft and send it to 15 day Public Review.

AnilSaldhana(RedHat): Matt: moves

Dominique Nguyen (Bank of America): Matt moves to move the draft approved
last week to be raised for final public review

AnilSaldhana(RedHat): Tony: second

Dominique Nguyen (Bank of America): no ojection

AnilSaldhana(RedHat): motion passes.

AnilSaldhana(RedHat): 4) IPR discussion

AnilSaldhana(RedHat): *6 to mute your lines

Dominique Nguyen (Bank of America): Tony: we do committee notes & we want
vendor organizations to take our output and there is no standard bodies to
take our output

Dominique Nguyen (Bank of America): there is some discussions at the OASIS
level to see what can happen

Matt Rutkowski (IBM): there is no approved way in our OASIS IP process to
allow Comm. Nots that have been approved for other SDOs to reference/use

Matt Rutkowski (IBM): we may have to resolve this within our TC

Dominique Nguyen (Bank of America): current OASIS IPR prohibits this - so
this will be a big change

Dominique Nguyen (Bank of America): Tony & Jamie discussed at great length
last week

Dominique Nguyen (Bank of America): Technical notes are work that we did &
we want other TCs to be able to take our use cases & gaps and use them as
their input

Dominique Nguyen (Bank of America): No other committees can take our notes
right now

Dominique Nguyen (Bank of America): unless there is rule change

Dominique Nguyen (Bank of America): Anil will create the TC request

AnilSaldhana(RedHat): Matt: u able to type in the minutes?

Dominique Nguyen (Bank of America): Gap Analysis discussion:

AnilSaldhana(RedHat): Use Case 21 is all about Mobile Identity.

Matt Rutkowski (IBM): 
http://www.oasis-open.org/committees/document.php?document_id=44915&wg_abbre
v=id-cloud

Dominique Nguyen (Bank of America): Use Case 21: Mobile Customers' 
Identity Authentication Using a Cloud Provider

Short description:
Feature the need to have a standard secure authentication in order to use
Cloud service to authenticate mobile users

Relevant applicable standards:
- SAML
- OAuth
- XSPA
- WS-Trust
- PMRM

OAuth v 1.0a Gap summary:

This standard provides no security mechanism to protect the confidentiality
and integrity of the information passed between User to Service Provider and
Service Provider to Consumer.  Thus it exposes the id exchange information
to eavesdrop and information theft by Man-in-the-Middle and Man-in-the
Browser attacks.  The protocol relies on SSL/TLS to provide security for
information exchanged in motion.  However, if mutual authentication is not
enforced in the SSL/TLS handshake connection, SSL/TLS is also subject to
eavesdrop and information theft by Man-in-the-Middle and Man-in-the Browser
attacks.
.
Terms used in OAuth and detailed gaps:

* Service Provider: A web application that allows access via OAuth
* User: Individual who has account with Service Provider
* Consumer: A website or application that uses OAuth to access the Service
Provider on behalf of the User
* Consumer Key: A value used by the Consumer to identify itself to the
Service Provider
* Consumer Secret: A secret used b the Consumer to establish ownership of
the Consumer Key
* Request Token: A value used by the Consumer to obtain authorization from
the User, and exchanged for an Access Token
* Access Token: A value used by the Consumer to gain access to the Protected
Resources on behalf of the User, instead of using the Users Service Provider
credential
* Token Secret: A secret used by the Consumer to establish ownership of a
given Token

Standard / ProtocolCredentials & Token ExchangePlaintext
signatureConfidentiality of RequestsSpoofing by Counterfeit ServersPlaintext
Storage of CredentialsSecrecy of the Consumer SecretScoping of Access
RequestsCross-Site Request ForgeryAutomatic Processing of Repeat
Authorization OAuth 1.0aNo mechanism to protect Tokens & secrets from
eavesdroppers when transmitted from Service Provider to CustomerNo attempt
to protect User credentials from eavesdroppers or man-in-he-middle attacks.
This method is intended to be used in conjunction with a transport-layer
security mechanism such as TLS or SSLOnly provides mechanism for verifying
the integrity of requests, not confidentiality of the request, eavesdroppers
will have full access to request contentNo attempt to verify the
authenticity of the Service Provider. 3rd party can intercept the Consumers
request and returning misleading or incorrect responsesConsumer Secret and
Token Secret are stored in plaintext form for Service Provider to compute
the signatures used in the non-plaintext methodsThis is a single factor
secret and can be downloaded by attackerBy itself, OAuth does not provide
any method for scoping the access rights granted to a Consumer would either
has access to Protected Resources or it doesnt.CSRF  web-based attacks on
OAuth approvals allow an attacker to obtain authorization to OAuth Protected
Resources without the consent of the UserAn attacker can use the stolen
Consumer Key and Secret to redirect the User to the Service Provider with an
authorization request.  The Service Provider will then grant access to the
Users data without the Users explicit approval

Matt Rutkowski (IBM): Use Case 21: Mobile Customers' Identity Authentication
Using a Cloud Provider



Short description:

Feature the need to have a standard secure authentication in order to 
use Cloud service

to authenticate mobile users



Relevant applicable standards:

- SAML

- OAuth

- XSPA

- WS-Trust

- PMRM





SAML v2.0 Information Card Token Profile Vers1on 1.0 - Gap summary:

Dominique Nguyen (Bank of America): Gap identified: The need for a 
higher security profile to access the resource.

Dominique Nguyen (Bank of America): Recommend to enhance both OAuth and 
OpenID to have higher security profile to access the resource

Matt Rutkowski (IBM): OpenID Connect

Dominique Nguyen (Bank of America): openID Connec needs to be added - 
description can be based on OAuth but extended

Dominique Nguyen (Bank of America): 3rd gap to be considered Discovery 
of profiles - some level of discovery in openID Connect already started 
- we can look at it as a start

Dominique Nguyen (Bank of America): Meeting adjourns - we will meet in 2 
weeks

Dominique Nguyen (Bank of America): Today's attendees:

Dominique Nguyen (Bank of America):
AnilSaldhana(RedHat)
  Anthony Nadalin
  Cathy Tilton (Daon)
  Colin Wallis (NZGovt)
  David Turner (Microsoft)
  Dominique Nguyen (Bank of America)
  Matt Rutkowski (IBM)
David Kern (IBM)
Roger Bass (Traxian)
=============================================================


---------------------------------------------------------------------
To unsubscribe, e-mail: id-cloud-unsubscribe@lists.oasis-open.org
For additional commands, e-mail: id-cloud-help@lists.oasis-open.org



[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]