OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.

 


Help: OASIS Mailing Lists Help | MarkMail Help

security-use message

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [Elist Home]


Subject: RE: [UC-1-04:ARundgrenPush]


I think Bob Morgan was right to point out how 'loaded' the term
'authentication' is, and so I think we should be very clear about the
different ways we are using that term.  I see 3 ways currently (I'll give
them some crummy names for now for the sake of discussion) - 'end user',
'domain to domain', and 'peer to peer'.

'End user' authentication is where one security domain asserts to another
security domain the fact that an authentication event took place related to
a specific user.  When authC types are discussed in this context, they
pertain to types of authentication an end user has presented to authenticate
themselves to the security domain.  So far there is some agreement that 'end
user' authC should be part of the specification.  In my opinion, the 'end
user' authentication information should be considered part of the session
information (ISSUE:[UC-3-01:UserSession]) to be shared between security
domains.

The 'domain to domain' authC being discussed is between the security domains
themselves in order to support UC-1.  There have been a few methods for this
discussed over the last few months - including using digital signatures,
2-way authenticated SSL, or encryption.  I recall some debate about the
advantages and drawbacks of each - mostly centered around performance
considerations.  I think this is the type of authC that Anders desires, and
would suggest that his requirement could be stated as something like 'When
providing the SSO behavior described in UC-1, use the validation of the
digital signatures of the assertions for the purpose of authenticating the
security domains to each other. ' + (privacy considerations requirements).

The third type of authC is where an actor provides credentials to a service,
which returns what is essentially an authorization assertion.  This type of
authC is where the 'challenge response' non-goal applies - that the service
not support that type of authC.  This is related to
ISSUE:[UC-4-01:SecurityService].

Perhaps if we frame the conversation this way, we can come to agreement to
some parts at least.

Regards,

Darren



> -----Original Message-----
> From: Orchard, David [mailto:dorchard@jamcracker.com]
> Sent: Monday, February 12, 2001 3:50 PM
> To: Evan Prodromou; S2ML-USE
> Subject: RE: [UC-1-04:ARundgrenPush]
>
>
> Evan,
>
> I completely concur with your opinion on this issue.  We do have a clear
> process to follow.
>
> We (Anders?) should write up a concrete use case, called something like
> "negotiate trust relationship between partners".  We should then
> discuss on
> the mailing list/concalls to make sure the use case is described
> enough for
> us to vote on.  We should then vote on the use-case.  My early
> prediction is
> that the use case will not pass muster - certainly a lot would have to be
> done to convince me to vote for it - but we will have followed the process
> and we will have useful artifacts for future work.
>
> Cheers,
> Dave
>
> > -----Original Message-----
> > From: Evan Prodromou [mailto:evan@outlook.net]
> > Sent: Monday, February 12, 2001 2:27 PM
> > To: S2ML-USE
> > Subject: Re: [UC-1-04:ARundgrenPush]
> >
> >
> > >>>>> "HL" == Hal Lockhart <hal.lockhart@entegrity.com> writes:
> >
> >     >> You also lack a business case.  Why do you need a particular
> >     >> business case when we are talking about extending the access
> >     >> system of practially all computer systems (but with arbitrary
> >     >> granularity and semantics) to function over the web between
> >     >> different, independent and constantly changing organizations as
> >     >> well?  IMO that's *hell* of a use case!  If it is a hell to
> >     >> design I am not yet able to tell.
> >
> > I'm replying to the wrong message, so, sorry.
> >
> > But I think Anders has gotten to the kernel of this issue. I think for
> > most of us with experience with AuthXML or S2ML, we've dealt from the
> > get-go with expecting peer security systems to have arranged their
> > partnership out-of-band. In other words, there are configuration
> > options on each piece of software that say what data is sent as
> > credentials, what profile information to share, what keys belong to
> > what security system, etc.
> >
> > We explicitly have this called out in the current doc, saying that
> > "trust negotiations must be made out-of-band." I agree with Anders
> > that there's a momentous opportunity in dropping this non-goal and
> > allowing the trust relationship to be negotiated IN-band ("Who are
> > you? Who says that's you? What do you want?").
> >
> > However, I am extremely leery of this expansion of scope. I wonder if
> > there's an opportunity here to stow away this use case and use it for
> > a next version of [OSSML] or for even another effort of this
> > TC. Something that operates well with what we do, but not part of this
> > current effort.
> >
> > ~ESP
> >
> >
>



[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [Elist Home]


Powered by eList eXpress LLC