You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 7 Next »

Status:  planning draft for use by InCommon and NIH dev teams

NIH would like to have qualified InCommon IdPs put assurance labels on SAML assertions sent to the NIH federation gateway, for ultimate consumption by NIH apps that can use identity assurance in their risk processing.  InCommon is establishing an assurance program (http://www.incommon.org/assurance/) to qualify IdPs under the InCommon Identity Assurance Framework.  This Framework is being reviewed by FICAM for acceptance under its TFPAP.  Once all the approvals are worked out and the program is under way, there will need to be technical interoperability to support the program policy goals.

Technical issues include:

Overall technical approach:  We assume it is in everyone's interest to follow the standard described in http://wiki.oasis-open.org/security/SAML2IDAssuranceProfile . This doc, however, specifies a relatively new use of a SAML feature (AuthnContext) that has been little-used, so software support is uncertain, and usage patterns are not well-established.  A fallback approach would be to use a SAML attribute to represent the assurance qualifier in the assertion.

  • Yes, we'll use the Assurance Profile doc methods.  Note that this is SAML2-only.

Will the NIH gateway request LoA? :  The SAML assurance profile permits the SP to request a particular LoA (with a choice of matching rules) in the AuthnRequest.  This is not required; the IdP can be configured to know that a particular SP needs a particular LoA, and just send it.  This however may not meet the NIH use case, because the NIH federation gateway serves many apps, some not requiring any LoA label today, some that will require (or prefer) LoA in the future.  With no request, IdPs would have to send the highest LoA on any access, which could be a burden on the user, and could set a bad precedent for LoA pricing in the future.  But it could be the easiest deployment for now.  The next issue (profile mismatch) applies to requests too.

  • Yes, the NIH gateway will request LoAs using AuthnRequest as needed.

Mismatch between FICAM profiles and InCommon profiles:  FICAM defines LoAs and identifies them with URIs (example?).  InCommon does this also (e.g. http://incommon.org/assurance/silver).  FICAM (at some point) will bless InCommon Bronze as comparable to FICAM Level 1, and Silver as comparable to Level 2.  The AuthnContext element can contain one (or more?) URI indicating the LoA relevant to the assertion.  InCommon IdPs will be certified to issue the Bronze and/or Silver URIs.  The NIH SP will presumably normally be looking for the FICAM Level 1 or Level 2 URIs.  Either the IdP or SP must deal with the mismatch.  InCommon suggests that it is the USG SP that has the policy that Silver is equivalent to Level 2 (e.g.) so the SP should receive the Silver URI and use its policy mapping to accept it.

  • The NIH gateway will use the InCommon LoA URIs when making requests of InCommon IdPs, and accept them in responses.  Requests will use the "exact match" matching rule, which is supported in the current Shibboleth IdP.

Use of Bronze/Level 1? :  Under the existing MoU between InCommon and NIH, all InCommon IdPs are accepted as Level 1 without needing InCommon Bronze certification.  Will this continue to be true indefinitely or will NIH be wanting Bronze certification for Level 1 equivalence at some point?

  • Level 1 will continue to be qualifier-free as it is now.  LoA will only be required for Level 2 / Silver.

Use of SHA256:  FICAM would like its partners to move from SHA1 for signing to SHA256.  This includes both signing assertions and signing metadata.  (This is unrelated to LoA but is about InC-NIH interop.)

  • It may be acceptable to produce a separate InCommon metadata file signed by SHA256.  Unfortunately that algorithm isn't supported in OSes known to be in use in InCommon, so moving off of SHA1 will take a couple of years most likely.
  • Is signing assertions with SHA256 possible from InCommon IdPs? Yes, but not with a simple configuraton option right now. Even if that were possible, IdPs would have to special-case that option for now, because some SPs won't handle it. In the V3 timeframe, we should have support for the algorithm extension in metadata, so as sites move to V3, we should be able to drive traffic to SHA-256 on a per-SP basis.
  • No labels