Status:  planning draft for use by InCommon and NIH dev teams

NIH would like to have qualified InCommon IdPs put assurance labels on SAML assertions sent to the NIH federation gateway, for ultimate consumption by NIH apps that can use identity assurance in their risk processing.  InCommon is establishing an assurance program (http://www.incommon.org/assurance/) to qualify IdPs under the InCommon Identity Assurance Framework.  This Framework is being reviewed by FICAM for acceptance under its TFPAP.  Once all the approvals are worked out and the program is under way, there will need to be technical interoperability to support the program policy goals.

Issues include:

Overall technical approach:  We assume it is in everyone's interest to follow the standard described in http://wiki.oasis-open.org/security/SAML2IDAssuranceProfile . This doc, however, specifies a relatively new use of a SAML feature (AuthnContext) that has been little-used, so software support is uncertain, and usage patterns are not well-established.  A fallback approach would be to use a SAML attribute to represent the assurance qualifier in the assertion.

Will the NIH gateway request LoA? :  The SAML assurance profile permits the SP to request a particular LoA (with a choice of matching rules) in the AuthnRequest.  This is not required; the IdP can be configured to know that a particular SP needs a particular LoA, and just send it.  This however may not meet the NIH use case, because the NIH federation gateway serves many apps, some not requiring any LoA label today, some that will require (or prefer) LoA in the future.  With no request, IdPs would have to send the highest LoA on any access, which could be a burden on the user, and could set a bad precedent for LoA pricing in the future.  But it could be the easiest deployment for now.  The next issue (profile mismatch) applies to requests too.

Mismatch between FICAM profiles and InCommon profiles:  FICAM defines LoAs and identifies them with URIs (example?).  InCommon does this also (e.g. http://incommon.org/assurance/silver).  FICAM (at some point) will bless InCommon Bronze as comparable to FICAM Level 1, and Silver as comparable to Level 2.  The AuthnContext element can contain one (or more?) URI indicating the LoA relevant to the assertion.  InCommon IdPs will be certified to issue the Bronze and/or Silver URIs.  The NIH SP will presumably normally be looking for the FICAM Level 1 or Level 2 URIs.  Either the IdP or SP must deal with the mismatch.  InCommon suggests that it is the USG SP that has the policy that Silver is equivalent to Level 2 (e.g.) so the SP should receive the Silver URI and use its policy mapping to accept it.

ERA or other app requirements? :  ERA is talking about being ready to federate by Spring 2012.  Probably only some of its functions would require Level 2.  Will this mean "step-up" authentication in a single session in some fashion?  This will be discussed with ERA, later.

NIH gateway capability to send AuthnRequest on-demand, and process AuthnContexts? :  It is not clear whether the gateway product has support for configurable/dynamic AuthnRequest generation, or handling of non-built-in AuthnContext responses.  The vendor will be contacted about this.  Testing will happen at some point, probably just intra-NIH, using and NIH test Shib IdP.  It may be that a second NIH gateway SP will be needed for Level 2 to make this work.

NIH gateway capability to obtain LoA certification info from metadata? :  InC will publish Bronze and Silver certification info in its standard metadata.  It would be preferable for NIH just to use that, so they'll look into it, but it's not necessary.

Shibboleth IdP capability to respond with correct AuthnContext on-demand, and integration with backing IdMS? :  The Shib IdP can support sending different AuthnContexts, and can deal with processing incoming AuthnRequests with the exactmatch rule.  How this integrates with the local authentication process, and backend IdMS features, is a local matter, but one where advice will need to be provided.  On the InC someone will need to demonstrate the capability and document configuration steps and issues.  This can be done with InC-side resources.

NIH review of InCommon 1.1 Assurance docs for compatibility with their notions of Level 1 and Level 2 :  NIH will need to review the new InC Assurance docs separately from ICAM, since NIH probably wants to move more quickly, and InC and NIH have had a history of pairwise MoUs.  The 1.1 Assurance docs have approved by InC Steering, and are to be submitted to FICAM soon.

Use of Bronze/Level 1? :  Under the existing MoU between InCommon and NIH, all InCommon IdPs are accepted as Level 1 without needing InCommon Bronze certification.  Will this continue to be true indefinitely or will NIH be wanting Bronze certification for Level 1 equivalence at some point?

Use of SHA256:  FICAM would like its partners to move from SHA1 for signing to SHA256.  This includes both signing assertions and signing metadata.  (This is unrelated to LoA but is about InC-NIH interop.)