JiscMail Logo
Email discussion lists for the UK Education and Research communities

Help for JISC-SHIBBOLETH Archives


JISC-SHIBBOLETH Archives

JISC-SHIBBOLETH Archives


JISC-SHIBBOLETH@JISCMAIL.AC.UK


View:

Message:

[

First

|

Previous

|

Next

|

Last

]

By Topic:

[

First

|

Previous

|

Next

|

Last

]

By Author:

[

First

|

Previous

|

Next

|

Last

]

Font:

Proportional Font

LISTSERV Archives

LISTSERV Archives

JISC-SHIBBOLETH Home

JISC-SHIBBOLETH Home

JISC-SHIBBOLETH  August 2005

JISC-SHIBBOLETH August 2005

Options

Subscribe or Unsubscribe

Subscribe or Unsubscribe

Log In

Log In

Get Password

Get Password

Subject:

levels of authentication assurance

From:

"Paschoud,J" <[log in to unmask]>

Reply-To:

Discussion list for Shibboleth developments <[log in to unmask]>

Date:

Mon, 8 Aug 2005 12:55:31 +0100

Content-Type:

text/plain

Parts/Attachments:

Parts/Attachments

text/plain (1 lines)

[apologies for cross-posting; but JISC-SHIBBOLETH seems to need warming up with a bit of traffic, and I don't know what the overlap of membership is]

 

I get your point Ian.  I think the important bit is that we have to get our collective head(s) around the whole idea of delegating trust, amongst a large (therefore scaleable) number of organisations, to a federation.  

 

What *won't* be scaleable is if *every* SP takes the view that it must individually be assured of the security ("trustworthiness"?) of *every* IdP in a fed.  I'm experiencing such an attitude first-hand currently in the process of trying to sign up LSE to use the Shib-to-Athens Gateway run by Eduserv.  Their current procedures require that, having made various written undertakings about LSE network security policies and procedures, we grant a 'test login' to Eduserv so that they can assure themselves (how???) that LSE won't allow access to Athens-protected resources to someone who isn't covered by the LSE licenses to use those resources.  I'm sure Eduserv is doing this with the best of intentions and I don't doubt their integrity.  We're using standard LSE network login credentials (or it wouldn't be SSO, would it?) for AuthN to our Shib IdP, which includes access to various internal resources like shared workstations and wireless network on campus, email, etc.  Our problem is that Eduserv would like a 'test account' that "only gives them access to Athens-protected resources";  and LSE doesn't have any directory attributes that distinguish such a user.  Why would we?  We *could* create a special class of LSE user for Eduserv, but that would rather defeat the object of whatever they want to test.  Or we can give them a 'proper' network account, like one of the users they want to impersonate for test purposes, which *should* (according to the LSE security policies which Eduserv have just audited thoroughly) involve the individual nominated by Eduserv presenting themselves at one of the registration desks on the LSE campus, with an appropriate personal photographic identity document (such as a passport), and signing the acceptable use agreement covering use of internal and external (including Athens-protected) resources that we require from staff and students.  Personally I don't mind too much if Eduserv make poor Phil Leahy get a train to London just to do this (but I suspect Phil might!); or if we compromise our own rules by letting him do this by email.  But I don't want to set a precedent for all SPs to expect to do this!  I'm not a lawyer  - but our highly-talented IT Infrastructure Manager *has* just decided to become a barrister instead!

 

Admittedly, the Gateway is arguably now in the position of being a fed of its' own, rather than just a representative of the collection of resources to which it provides access.  We'll need it for a relatively long time as a way of achieving the transition from Athens.  But I'd hope in due course (soon?) that it becomes effectively just another SP within the wider .ac.uk fed that JISC is seeking to establish, alongside the resource hosts that implement their own SPs  - as Elsevier, JSTOR, EBSCO, etc have already done.

 

In this respect, Athens/Eduserv could be more like the SWITCH VHO (http://www.switch.ch/aai/vho.html) that Nicole has just mentioned  - a way for resource hosts to outsource the job of individual user registration.  At present, 'Athens classic' is a way for institutions to outsource the job of being IdPs  - although most Athens-using institutions already have to duplicate this process and operate as IdPs for access to internal resources;  and they don't pay Eduserv directly for doing this significant job.

 

I too can imagine a situation where some SPs need a higher LOA than most IdPs can offer (many won't have the local infrastructure to support AuthN beyond name/password).  I've for a long time been pushing the argument that we will need to develop some protocols for interoperation between multiple fed's (whether these are national or sectoral or both), for supporting situations where an individual has affiliations with several IdPs (but *please* let's stop calling these "multiple identities" and getting all confused with schizophrenia ;->), possibly across different fed's;  and other complexities.

 

But I can also imagine a highly desirable model for a UK fed to support HE and FE activities / institutions, in which IdPs could register their capabilities to provide different LOAs, and be regularly audited in appropriate ways by the body responsible for the fed.

 

John



	-----Original Message----- 

	From: Ian Young [mailto:[log in to unmask]] 

	Sent: Mon 08/08/2005 10:26 

	To: [log in to unmask] 

	Cc: 

	Subject: Re: [JISC-MIDDLEWARE-DEVELOPMENT] Name Game: levels of authentication assurance

	

	



	Paschoud,J wrote:

	

	> I disagree with Mark that different fed's will be needed to support

	> different levels of identity authentication (for which we could

	> probably safely adopt the levels already enshrined in the UKeGov

	> standards  - unless anyone out there in radiotelescopeland has

	> something that needs more-than MI5/6 levels of security...???).

	

	Despite Mark's own partial recanting of his original post :-) I'd just

	like to point out that the level of assurance issue doesn't go away just

	because you can pass a claimed level of assurance from IdP to SP.  It

	just moves around a bit.

	

	For example, I might see a claim of a high level of assurance in a

	subject's identity coming in from an IdP.  Assume that I trust that IdP

	to manage such claims correctly; that still isn't sufficient for me to

	believe the claim: I also need a high level of confidence in the

	identity of the IdP *making* the claim.

	

	In other words, the more extraordinary the claim coming from the IdP,

	the more confidence I need about the IdP's claim of its *own* identity

	(to avoid the federation becoming the weak link in the chain).   That

	confidence has to come from my knowledge of the policies and procedures

	the federation uses to authenticate entities and distribute the

	corresponding metadata.

	

	There is therefore a tradeoff between reducing the degree of hassle

	imposed on members by the federation policies and increasing the

	ultimate level of assurance in any claims passed between members.  If

	you want the high LOA people to be able to make use of a federation, you

	need to build the federation policies accordingly, which will impose

	some additional burdens on everyone joining.

	

	To come back to Mark's original point, it *is* possible to imagine a

	situation in which the high LOA group just need more than everyone else

	is prepared to sign up to, in which case you would indeed end up with

	multiple federations as the only solution.

	

	        -- Ian

	

	P.S. no, I have no suggestions for the name...

	



Top of Message | Previous Page | Permalink

JiscMail Tools


RSS Feeds and Sharing


Advanced Options


Archives

November 2023
February 2023
January 2023
November 2022
October 2022
September 2022
June 2022
January 2022
November 2021
October 2021
September 2021
May 2021
April 2021
March 2021
February 2021
January 2021
December 2020
November 2020
October 2020
September 2020
July 2020
June 2020
May 2020
April 2020
March 2020
February 2020
January 2020
December 2019
November 2019
October 2019
September 2019
August 2019
June 2019
May 2019
March 2019
February 2019
January 2019
November 2018
July 2018
June 2018
May 2018
April 2018
March 2018
January 2018
November 2017
October 2017
September 2017
August 2017
July 2017
June 2017
May 2017
March 2017
February 2017
January 2017
October 2016
September 2016
August 2016
July 2016
June 2016
May 2016
March 2016
February 2016
January 2016
December 2015
November 2015
September 2015
August 2015
June 2015
April 2015
March 2015
February 2015
December 2014
November 2014
October 2014
September 2014
August 2014
July 2014
June 2014
May 2014
April 2014
March 2014
February 2014
January 2014
December 2013
November 2013
October 2013
September 2013
August 2013
June 2013
May 2013
April 2013
March 2013
February 2013
January 2013
December 2012
November 2012
October 2012
September 2012
August 2012
July 2012
June 2012
May 2012
April 2012
March 2012
February 2012
January 2012
December 2011
November 2011
October 2011
September 2011
August 2011
July 2011
June 2011
May 2011
April 2011
March 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
June 2010
May 2010
April 2010
March 2010
February 2010
January 2010
December 2009
November 2009
October 2009
September 2009
August 2009
July 2009
June 2009
May 2009
April 2009
March 2009
February 2009
January 2009
December 2008
November 2008
October 2008
September 2008
August 2008
July 2008
June 2008
May 2008
April 2008
March 2008
February 2008
January 2008
December 2007
November 2007
October 2007
September 2007
August 2007
July 2007
June 2007
May 2007
April 2007
March 2007
February 2007
January 2007
December 2006
November 2006
October 2006
August 2006
July 2006
June 2006
May 2006
April 2006
March 2006
February 2006
January 2006
December 2005
November 2005
October 2005
September 2005
August 2005
July 2005
June 2005
May 2005
April 2005


JiscMail is a Jisc service.

View our service policies at https://www.jiscmail.ac.uk/policyandsecurity/ and Jisc's privacy policy at https://www.jisc.ac.uk/website/privacy-notice

For help and support help@jisc.ac.uk

Secured by F-Secure Anti-Virus CataList Email List Search Powered by the LISTSERV Email List Manager