OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.

 


Help: OASIS Mailing Lists Help | MarkMail Help

security-use message

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [Elist Home]


Subject: RE: Inputs to Strawman/Issue List - Group 2: B2B Scenario Variati ons


Thanks for the comments.

> There's options missing from each issue:
> x) Drop this issue/scenario/requirement
> y) Seek further clarification

I believe the first possible resolution option has been included
in the Strawman 3 that Darren sent out. I agree that the second 
resolution item w.r.t. further clarification could be included. 
My assumption is that we will discuss the new issues in Strawman 3 
Issues List in our next tele-conf.

> We had a clear indication (10-1 on UC-5-3) that the use case group 
> does not want credential exchange in scope, yet UC-2-05 (steps 2-4) 
> explicitly brings this up and proposes making it back into scope.. 

It is true that we have voted on 5-03 (a), (b), and (c), and that the
proposed use case in 5-03 applies Credentials to exchange authentication 
data between 2 B2B applications. Since we have decided to not support
such Credential applications in the scope of SAML and furthermore we
are going to explicitly state in the spec something to the effect: 
"Authentication methods or frameworks are outside the scope of [OSSML]",
I'm willing to revise steps 2-4 in UC2-05 such that it remains consistent 
with 5-03 conclusions.

However, I must point out that non-human operated applications 
(communicating over the internet) do need ability to specify and 
transmit authentication data above the transport protocols such as 
HTTP and SSL. HTTP was primarily designed for browser clients and 
SSL was also designed as an authentication mechanism for end-point 
socket client (e.g., browser) and servers (e.g., web servers). Hence, 
there may be situations where some folks may exploit the simplicity
of SAML Credential specification for sending authentication data 
at the application protocol level for such application-to-application 
connectivity scenario even if we spellout that authenticaiton mechanism 
is out-of-scope of SAML, which I agree that it should. [E.g., I
know that ebXML Security WG has discussed such potential apps in
the past w/o any conclusions yet...]


> What I suggest is that the scenarios you propose should have 
> some clearly delineated sections so that we could vote on portions.  
> Say steps 2-4 are out of scope, but (picking fictious groupings) 
> 5-8 and 9-11 could be put into scope.  If they are all bundled together, 
> then I'm faced with the choice of voting No( to ensure previously 
> No stands) or voting Yes (to ensure new steps are added), and I don't 
> know which way I should vote.

Yes, I'm willing to delineate UC2-05 in the above stated manner, possibly
using the latest session mgmnt use case as the example. Lets talk about 
this in our tele-conf tomorrow, if need be.

thanks,
Zahid



> -----Original Message-----
> From: Orchard, David [mailto:dorchard@jamcracker.com]
> Sent: Tuesday, February 27, 2001 12:21 PM
> To: Ahmed, Zahid; Darren Platt; UseCaseList
> Subject: RE: Inputs to Strawman/Issue List - Group 2: B2B Scenario
> Variati ons
> 
> 
> There's options missing from each issue:
> x) Drop this issue/scenario/requirement
> y) Seek further clarification
> 
> I'm a little fuzzy about the overlap betweent these issues.  
> We had a clear
> indication (10-1 on UC-5-3) that the use case group does not 
> want credential
> exchange in scope, yet UC-2-05 (steps 2-4) explicitly brings 
> this up and
> proposes making it back into scope..  
> 
> What I suggest is that the scenarios you propose should have 
> some clearly
> delineated sections so that we could vote on portions.  Say 
> steps 2-4 are
> out of scope, but (picking fictious groupings) 5-8 and 9-11 
> could be put
> into scope.  If they are all bundled together, then I'm faced with the
> choice of voting No( to ensure previously No stands) or voting Yes (to
> ensure new steps are added), and I don't know which way I should vote.
> 
> On the session mgmt, I broke them up - the general notion of session
> management - and specific step sets.  Some people wanted session with
> timeouts, some wanted session with logouts, some wanted 
> session with logouts
> and timeouts.  
> 
> Cheers,
> Dave
> 
> > -----Original Message-----
> > From: Ahmed, Zahid [mailto:zahid.ahmed@commerceone.com]
> > Sent: Monday, February 26, 2001 3:13 PM
> > To: Darren Platt; UseCaseList
> > Subject: Inputs to Strawman/Issue List - Group 2: B2B Scenario
> > Variations
> > 
> > 
> > Attached is the B2B Transaction Scenarios that I been re-written
> > in terms of Issue List format adopted in latest strawman/issue
> > list document.
> > 
> > 1) ISSUE:[UC-2-05:B2B Transaction via an e-marketplace or 
> trading hub]
> > 
> > 2) ISSUE:[UC-2-06: B2B Transaction using different messaging and   
> >    application protocols]
> > 
> > 3) ISSUE:[UC-2-07:  B2B Transaction over multiple e-marketplace or 
> >    trading hubs/portals]
> > 
> > 
> > Sorry for late feedback; please provide any comments.
> > 
> > I will definitely provide in the future some UML based interaction
> > diagrams; however, all three issues have detailed use case steps
> > described and also possible resolution questions.
> > 
> > >This input will no doubt be very useful then, and I look forward to
> > >benefiting from your expertise in this area.  In the 
> > meantime we should
> > >start tracking these scenarios on the issue list.  You 
> suggested that
> > >you could provide more details - could we ask that you 
> please do so,
> > >perhaps providing interaction diagrams if possible, so that 
> > we can add
> > >them to the issue list for Strawman 3?>
> > 
> > 
> > 
> > > -----Original Message-----
> > > From: Darren Platt [mailto:dplatt@securant.com]
> > > Sent: Wednesday, February 21, 2001 6:59 PM
> > > To: UseCaseList
> > > Subject: Issue Groups and Champions
> > > 
> > > 
> > > Here are the current list of issue groups, and thier champions:
> > > 
> > > Group 1: Single Sign-on Push and Pull Variations - Darren 
> > Platt, Evan
> > > Prodromou
> > > Group 2: B2B Scenario Variations - Prateek Mishra, Zahid Ahmed
> > > Group 3: Sessions - David Orchard
> > > Group 4: Security Services
> > > Group 5: AuthC Protocols - Prateek Mishra, Bob Blakley
> > > Group 6: Protocol Bindings
> > > Group 7: Enveloping vs. Enveloped
> > > Group 8: Intermediaries
> > > Group 9: Privacy
> > > Group 10: Framework
> > > Group 11: AuthZ Use Case - Irving Reid
> > > 
> > > Please let me know if I missed anybody.
> > > 
> > > 
> > > 
> > > Darren Platt
> > > Principal Technical Evangelist
> > > Securant Technologies
> > > 1 Embarcadero Center, Floor 5
> > > San Francisco, CA 94111
> > > tel - (415) 315-1529
> > > fax - (415) 315-1545
> > > http://www.securant.com/
> > > -----------------------------
> > > 
> > > 
> > > 
> > > ------------------------------------------------------------------
> > > To unsubscribe from this elist send a message with the single word
> > > "unsubscribe" in the body to: 
> > > security-use-request@lists.oasis-open.org
> > > 
> > 
> > 
> 


[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [Elist Home]


Powered by eList eXpress LLC