Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Migrated to Confluence 4.0

...

  • The NIH gateway will use the InCommon LoA URIs when making requests of InCommon IdPs, and accept them in responses.  Requests will use the "exact match" matching rule, which is supported in the current Shibboleth IdP.
  • InCommon should notify FICAM as to the Assurance URIs that InCommon IdPs will send in this process.

ERA or other app requirements? :  ERA is talking about being ready to federate by Spring 2012.  Probably only some of its functions would require Level 2.  Will this mean "step-up" authentication in a single session in some fashion?  This will be discussed with ERA, later.

  • Discussion with ERA on dates and transition process needs to happen at some point.
  • Are there other apps with LoA2 requirements sooner than ERA?  Probably, but likely other agencies than NIH.  Debbie will investigate and report back.

NIH gateway capability to send AuthnRequest on-demand, and process AuthnContexts? :  It is not clear whether the gateway product has support for configurable/dynamic AuthnRequest generation, or handling of non-built-in AuthnContext responses.  The vendor will be contacted about this.  Testing will happen at some point, probably just intra-NIH, using and NIH test Shib IdP.  It may be that a second NIH gateway SP will be needed for Level 2 to make this work.

  • Investigation of gateway capability to generate AuthnContext-requesting-LoA needs to happen.  The installed CA product (as of 4-Aug-2011) does not appear to do this.

NIH gateway capability to obtain LoA certification info from metadata? :  InC will publish Bronze and Silver certification info in its standard metadata.  It would be preferable for NIH just to use that, so they'll look into it, but it's not necessary.

  • Investigation of gateway LoA-certification-in-metadata capability needs to happen.

Shibboleth IdP capability to respond with correct AuthnContext on-demand, and integration with backing IdMS? :  The Shib IdP can support sending different AuthnContexts, and can deal with processing incoming AuthnRequests with the exactmatch rule.  How this integrates with the local authentication process, and backend IdMS features, is a local matter, but one where advice will need to be provided.  On the InC someone will need to demonstrate the capability and document configuration steps and issues.  This can be done with InC-side resources.

  • Investigation of Shibboleth 2.x IdP AuthnContext-handling capabilities needs to happen.

NIH review of InCommon 1.1 Assurance docs for compatibility with their notions of Level 1 and Level 2 :  NIH will need to review the new InC Assurance docs separately from ICAM, since NIH probably wants to move more quickly, and InC and NIH have had a history of pairwise MoUs.  The 1.1 Assurance docs have approved by InC Steering, and are to be submitted to FICAM soon.

  • NIH needs to review InCommon 1.1 Assurance docs, or decide to defer to FICAM review.

Use of Bronze/Level 1? :  Under the existing MoU between InCommon and NIH, all InCommon IdPs are accepted as Level 1 without needing InCommon Bronze certification.  Will this continue to be true indefinitely or will NIH be wanting Bronze certification for Level 1 equivalence at some point?

...

  • It may be acceptable to produce a separate InCommon metadata file signed by SHA256.  Unfortunately that algorithm isn't supported in OSes known to be in use in InCommon, so moving off of SHA1 will take a couple of years most likely.
  • Is signing assertions with SHA256 possible from InCommon IdPs? Yes, but not with a simple configuraton option right now. Even if that were possible, IdPs would have to special-case that option for now, because some SPs won't handle it. In the V3 timeframe, we should have support for the algorithm extension in metadata, so as sites move to V3, we should be able to drive traffic to SHA-256 on a per-SP basis.
  • Strategy needs to be nailed down on this issue.