Proposed Charter: External Identities Working Group
External Identities Working Group
Group Leader (Chair)
Paul Caskey (UT System) <email@example.com>
The mission of the External Identities Working Group is to move the community of knowledge towards the goal of making external identities useful and sufficiently trusted in a variety of campus-based use cases. This group is focused on the use of external identities by individuals, rather than an enterprise using an external identity provider as their enterprise IdP.
Specific goals for the External Identities Working Group include:
- Exploring/developing deployment models for using external identities in a variety of risk profiles
- Identifying and examining the technical components that are needed to make external identities useful across a broad array of services
- Exploring the notion of account linking between a campus-issued account and an external account
- Understanding the differences between external identities and local identities
Membership in the Working Group is open to all interested parties. Members join the Working Group by subscribing to the mailing list, participating in the phone calls, and otherwise actively engaging in the work of the group.
The chair of the Working Group is appointed by the InCommon TAC and is responsible for keeping the TAC informed regarding Working Group status.
- Update (i.e., make current) the set of use cases previously developed by the Social Identities Working Group. This should include use cases for the following situations:
- Social account linked to a campus-issued account
- Social identity used by a non-community member
- Develop a set of criteria for selecting external providers in a variety of usage scenarios. Ensure that both social providers (e.g., Google, Facebook, Twitter) and non-social providers (e.g., Microsoft, PayPal, VeriSign) are included.
- Identify and document properties of external accounts that would be of interest to web application owners and other relying parties. This should include both a) how the account is managed for authentication purposes, and b) attributes asserted by the account provider.
- Define and document how a gateway would represent the properties of an external account to an application.
- Contrast a central gateway with a local gateway. List the advantages and disadvantages of each deployment model.
- Provide application owners with recommendations regarding risk profiles when using external identities. (These profiles need not be based on the traditional 800-63 categories.) Describe various approaches to risk management.
- Document various approaches to account linking:
- Accounts can be linked either centrally (in a campus Person Registry, and visible via the campus IDP), or at a specific SP (application).
- Linking a campus account to a known external account, and linking an external account to an existing campus-issued account, where both accounts are used by the same person.
- Identify the properties that an external account must/should possess that would affect its use.
- Using an external authentication provider to authenticate to a campus-based service.
- Identify ways that campus-owned attributes could be asserted following authentication with an external account (e.g., group memberships)
- Produce a set of longer-lived recommendations for practitioners, roughly comparable to the NMI-DIR documents (e.g., papers, not just wiki pages).
Potential Deliverables Considered to be Out of Scope for this Phase
- This WG will be looking at the use of personal external accounts; it will NOT be looking at situations where an enterprise is using a social provider as their IDP, for access to enterprise apps outside of google.
- Technical requirements for Interop/deployment profile for OpenID Connect (OIDC)
- Recommendations on approaches for elevating an external account authentication event to LoA 2.
- Identify and document pro's and con's of having students continue to use their social account to access campus business systems during their student days. Identify an interim step toward this milestone.
Expected End Date
The working group is expected to complete all deliverables by Dec 31, 2014.
- wiki space
- phone line for conference calls: usual Internet2 conference call line
- incommon.org group email list firstname.lastname@example.org
- FICAM Relying Party Guidance for External Credentials
- OASIS WOrking Group on Trust Elevation