JiscMail Logo
Email discussion lists for the UK Education and Research communities

Help for MOONSHOT-COMMUNITY Archives


MOONSHOT-COMMUNITY Archives

MOONSHOT-COMMUNITY Archives


MOONSHOT-COMMUNITY@JISCMAIL.AC.UK


View:

Message:

[

First

|

Previous

|

Next

|

Last

]

By Topic:

[

First

|

Previous

|

Next

|

Last

]

By Author:

[

First

|

Previous

|

Next

|

Last

]

Font:

Proportional Font

LISTSERV Archives

LISTSERV Archives

MOONSHOT-COMMUNITY Home

MOONSHOT-COMMUNITY Home

MOONSHOT-COMMUNITY  May 2014

MOONSHOT-COMMUNITY May 2014

Options

Subscribe or Unsubscribe

Subscribe or Unsubscribe

Log In

Log In

Get Password

Get Password

Subject:

Re: Attribute filtering / access control with moonshot

From:

Josh Howlett <[log in to unmask]>

Reply-To:

Josh Howlett <[log in to unmask]>

Date:

Fri, 23 May 2014 11:12:06 +0000

Content-Type:

text/plain

Parts/Attachments:

Parts/Attachments

text/plain (103 lines)

Hi Rhys,

I have a preference for option 1. This is a AAA architecture, and so we should use representations consistent with that, and map to alternative representations as necessary.

There is also value for an IdP in having the option to choose between releasing identifiers for realm and/or CoI. It is in effect a mechanism for the IdP to manage its tolerance of collusion between realms.

I also propose that we define a third opaque identifier targeted on the acceptor name of the RP. This addresses the case where the IdP is intolerant of collusion within a realm. So for opaque identifiers we have acceptor-targetedid, realm-targetedid, coi-targeted. We could even scope a fourth identifier to each service on an acceptor, although I'm not sure that makes sense. 

Josh.

> -----Original Message-----
> From: Moonshot community list [mailto:MOONSHOT-
> [log in to unmask]] On Behalf Of Rhys Smith
> Sent: 23 May 2014 09:21
> To: [log in to unmask]
> Subject: Re: Attribute filtering / access control with moonshot
> 
> On 22 May 2014, at 19:15, Sam Hartman <[log in to unmask]>
> wrote:
> 
> > I think for RADIUS, separate attributes will fit their model better.
> > But this is something to consider.
> 
> So we have two options for an opaque identifier:
> 
> 1) The two attribute option:
> 
> a) moonshot-realm-targetedid. Value a hash of Gss-Acceptor-Realm, NAI,
> salt. Representation: [log in to unmask] e.g. [log in to unmask]
> 
> b) moonshot-tr-coi-targetedid. Value a hash of CoI-Identifier, NAI, salt.
> Represented as [log in to unmask] e.g. [log in to unmask]
> 
> IdPs would release coi-based, or realm-based, or neither, based on policy.
> Could release both, of course, though not sure what the point of that would
> be.
> 
> 
> 
> or 2) SAML persistant-id-alike single attribute:
> 
> a) moonshot-targetedid. Value a hash of Gss-Acceptor-Realm OR CoI-
> Identifier, NAI,salt. Represented as {idp-realm}!{audience}!{value}.
> e.g. when the audience is the CoI -
> camford.ac.uk!pilot.communities.moonshot.ja.net!asdfghjkl
> e.g. when the audience is a gss-acceptor-realm -
> camford.ac.uk!someservicerealm.com!asdfghjkl
> 
> IdPs would release it or not, and choose which option to use, based on
> policy.
> 
> 
> Some considerations that spring to mind:
> 
> 
> In the first (two attribute) case:
> * recipients would check User-Name, then moonshot-tr-coi-targetedid, then
> moonshot-realm-targetedid, otherwise anonymous. More complex logic
> (more attributes to iterate through), but whether the ID is targeted at the CoI
> or at the realm is very explicit and easy to figure out.
> * Representation matches the way RADIUS normally does things.
> * IdPs have a simple attribute definition which generates the values for both
> attributes, and the policy lives at the point of release - which CoIs get to see
> the coi-targetedid, and which don't. Those that don't just get to see realm-
> targetedid, or nothing.
> 
> In the second (one attribute) case:
> * recipients would check User-Name, then moonshot-targetedid, otherwise
> anonymous. Simpler logic, but if you want to know whether you have an ID
> that is targeted at the CoI or at your realm, you have to do some work
> looking at the audience value to figure that out.
> * Representation matches the way SAML normally does things.
> * IdPs have a more complex attribute definition as the policy now lives on the
> point of attribute creation, but the release policy is probably simpler (either
> release it or nothing).
> 
> 
> Also, if we're then going to use these identifiers as a nameid when sending
> subsequent SAML assertion requests (as per what Josh said), in the first case
> we either have to define our own custom SAML name id format, or convert
> from the RADIUS representation to the SAML triple and use the persistent
> name-id format. In the second case we could just use it directly. (All
> potentially subject to mapping AAA names to SAML names? I'm still not clear
> on that bit of the puzzle yet...).
> 
> 
> Are there any other considerations or reasons to use one option over the
> other?
> 
> Rhys.
> --
> Dr Rhys Smith
> Identity, Access, and Middleware Specialist Cardiff University & Janet, the
> UK's research and education network
> 
> email: [log in to unmask] / [log in to unmask]
> GPG: 0x4638C985

Janet(UK) is a trading name of Jisc Collections and Janet Limited, a 
not-for-profit company which is registered in England under No. 2881024 
and whose Registered Office is at Lumen House, Library Avenue,
Harwell Oxford, Didcot, Oxfordshire. OX11 0SG. VAT No. 614944238

Top of Message | Previous Page | Permalink

JiscMail Tools


RSS Feeds and Sharing


Advanced Options


Archives

April 2024
March 2022
December 2021
October 2021
September 2021
August 2021
June 2021
April 2021
February 2021
January 2021
December 2020
November 2020
October 2020
August 2020
July 2020
June 2020
May 2020
April 2020
March 2020
January 2020
November 2019
October 2019
September 2019
July 2019
June 2019
May 2019
April 2019
March 2019
February 2019
January 2019
December 2018
June 2018
April 2018
November 2017
October 2017
September 2017
August 2017
July 2017
May 2017
April 2017
March 2017
February 2017
November 2016
October 2016
August 2016
July 2016
June 2016
May 2016
March 2016
February 2016
January 2016
November 2015
October 2015
September 2015
August 2015
July 2015
June 2015
May 2015
April 2015
March 2015
February 2015
January 2015
December 2014
November 2014
October 2014
September 2014
August 2014
July 2014
June 2014
May 2014
April 2014
March 2014
February 2014
January 2014
December 2013
November 2013
October 2013
September 2013
August 2013
July 2013
June 2013
May 2013
April 2013
March 2013
February 2013
January 2013
December 2012
November 2012
October 2012
September 2012
August 2012
July 2012
June 2012
May 2012
April 2012
March 2012
February 2012
January 2012
December 2011
November 2011
October 2011
September 2011
August 2011
July 2011
June 2011
May 2011
April 2011
March 2011
February 2011
January 2011
November 2010
October 2010
September 2010
August 2010
July 2010
June 2010
May 2010
April 2010
March 2010
February 2010


JiscMail is a Jisc service.

View our service policies at https://www.jiscmail.ac.uk/policyandsecurity/ and Jisc's privacy policy at https://www.jisc.ac.uk/website/privacy-notice

For help and support help@jisc.ac.uk

Secured by F-Secure Anti-Virus CataList Email List Search Powered by the LISTSERV Email List Manager