Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

The question becomes, given a SAML-based approach to Identity Provider/Service Provider (IdP/SP) interactions, how will the profile of identity assurance that applies in a given transaction be communicated from the IdP to the SP. David Wasley, as a member of the InCommon Technical Advisory Committee, has promoted the use of the concept of "identity assurance profiles."  This terminology, he argues, will provide a better fit for the situation defined above than the more common term, "level of assurance."  The document you are now reading adopts the identity assurance profile model and proposes a way to codify any number of such proposed InCommon profiles in SAML assertions.

It seems likely that different federations will define different profiles for identity assurance. InCommon , for one, has stated that it will define "bronze" and "silver" profiles, and will certify particular IdPs to be in conformance with a named profile provided their operations and infrastructure meet the associated criteria.  It is the intention of InCommon that an institution with an identity assurance profile of bronze could reasonably be mapped to what NIST SP 800-63 defines as level of assurance one.  Silver is intended to map to NIST level two.  The ultimate arbiter is the SP that receives assertions from an IdP.  They may well want to do a risk assessment of their applications and then decide which identity assurance profiles are appropriate for each.

...

In other cases, it is possible that the SP would like a finer level of detail, with information on multiple aspects of the authentication present in the IdP assertion.  Here, too, information on which profile applied would often be of interest to the SP, either as an overall qualification as above or as applied to various elements of the authentication event.  The SAML Authentication Context element would be the appropriate means of conveying this information.

In both the simpler and more complicated cases, it would be useful to have globally unique attribute/value pairs to represent a given identity assurance scheme and the particular profile within it.  Properly constructed URIs provide global uniqueness without the need for a global registry.  This document recommends that federations wishing to express federation-defined identity assurance profiles adopt a convention for URI-based representations of those profiles.  To illustrate with an example, InCommon could opt to We recommend that InCommon assign uris to the profiles it defines, specifically, that they assign "urn:mace:incommon:iap:bronze" to the bronze identity assurance profile, and "urn:mace:incommon:iap:silver" to the silver profile.  To continue with this example, in the simpler scenario outlined above, MACE-Dir might could define an attribute, identityAssuranceQualifier, whose value would be one of the two URIs defined above (or the value"urn:mace:dir:constant:test").  This attribute could be one element of a SAML attribute assertion, and the SP would then have information on the identity assurance of the assertion as a whole.