Service Providers (SPs) often find that the population they want to serve includes individuals who are not represented by campus-based or other institutional Identity Providers (IdPs). In other cases, the individual's organizational IdP can not (or will not) release attributes necessary for the operation of the SP. The two most commonly encountered accommodations for users in this situation both suffer from serious inadequacies. First, SPs can opt to issue credentials and run an authentication service for those users lacking an adequate federated solution. The drawback is that this forces the SP owners to take on the unwelcome role of issuers and managers of user credentials. It is not their core mission and it can easily become a substantial support burden. The second fallback is to accept external IdPs such as Google. This gets the SP owners out of the credential management business, but brings other issues. To take Google as an example, Google’s IdP-like service comes with several caveats: Their business model is premised on monetizing user and usage data; As a non-SAML solution, they don’t support the Enhanced Client or Proxy (ECP) Profile, a critical requirements for some key research services; They also reserve the right to throttle usage if it gets above what they consider an acceptable level of use. A different approach is clearly needed. Ideally individuals lacking a suitable IdP could be invited to register with a participating IdP that offered no-cost, easy self-registration processes.
In addition to the present report, the working group also drafted individual evaluations of a small number of candidates for an IdP of last resort service. These evaluations will be shared with InCommon after it is determined if there is interest in moving forward.
Scope and Limits of the Proposed Service
The Research & Scholarship (R&S) category of services are a class of services that are likely to require an IdP of Last Resort. However, none of the available IdPs in the InCommon Federation meet all the requirements of the R&S community. What is needed is an IdP of Last Resort specifically addressing this service gap.
Generally the user can and will use the organizational IdP for most SPs but due to attribute release policy constraints, or an unmet need for ECP or MFA, the user may find it necessary to use the IdPoLR with a few SPs. In sum, using the IdPoLR should be the exception, not the rule.
Requirements from Research and Scholarship SPs on an IdP of Last Resort
- The IdP must support the R&S entity category and be tagged as such (Note: Requirements 2, 3 and 4 are implied by the terms of R&S).
- It must have the ability to Assign/Assert ePPNs.
- It must have the ability to Assign/Assert ePTIDs or provide a SAML2 persistent NameID if ePPNs are re-assignable.
- It must accept SP requests for authentication contexts via the standard SAML2 Authentication Request Protocol.
- This is for InCommon Bronze, as well as Silver and MFA, if supported.
- It must support SAML Enhanced Client or Proxy (ECP).
- It must support user self-registration in a manner that lets the user know what, if any, further steps are required before they can authenticate to the SP they were initially trying to access.
- User sessions at the IdP should have a reasonable default duration, allowing multiple SPs to leverage the same user session when that is appropriate to the context.
- The IdP operator must address the service longevity issue (even if for now the response is "TBD").
- It must support Recommended Technical Basics for IdPs (as of May 2015, with future development of the recommendations accommodated as possible, and in negotiation with InCommon).
- It must conform to the 'Interoperable SAML 2.0 Web Browser SSO Deployment
Profile' as documented at http://saml2int.org (as of May 2015, with future development of the recommendations accommodated as possible, and in negotiation with InCommon).
- It must be certified for InCommon Bronze.
- The IdP must have no commercial interest in the use of user data.
- The IdP should, by design, be a service available to any R&S SP needing an IdPoLR, assuming the SP’s federation supports R&S and eduGAIN.
- There must be no charges to the user for use of the IdPoLR service.
- The IdPoLR service shall employ techniques to minimize system failures and ensure that any failures are not likely to result in inaccurate Assertions being sent to SPs.
The following criteria are highly desirable, but not required.
- Publishes aggregate usage statistics to give feedback to campus IT on use by their constituency (i.e., motivate campus to participate in R&S so the campus users don't need the IdPoLR anymore)
- Support for user consent
- Support for Silver credentials and authN (to be combined with local identity vetting to achieve Silver LoA)
- Low/no cost to SPs for use
- Accepts non-ASCII characters (e.g. uses UTF-8 as the default encoding) in user-entered data
- Support for some form of multi-factor authentication that is low/no cost for users
Risks and Their Mitigation
|Loss of incentive for institutions to support R&S and its associated attribute release policy.||Foster better understanding by campus leadership of how essential it is to support the research communities' needs with regard to federated identity. The Scope and Limits section above provides additional background on this topic.|
|Potential users will be unaware of the option to use IdPoLR.||Research SPs actively market the option to their users and make it easy to use|
|If InCommon launches a trial service and at the end of the trial it is decommissioned, users & SPs could be orphaned.||Lower the risk of service decommissioning by fostering adoption and use of the IdPoLR service and working together to develop a plan for service sustainability.|
|If InCommon waits until we have the perfect service, the Research SPs will have found one or more non-InCommon solutions.||Roll out an initial version of the service as soon as feasible.|
|Self-registration without additional requirements around identity proofing would not satisfy the security concerns of R&S SPs.||Add identity proofing steps to a post 1.0 version of the service. In the meantime, it is our understanding that many research organizations vet identities of their remote users through out-of-band means. In such cases the SP admins are relying only on the IdP's assertion that user x controls a set of authentication credentials (i.e. they successfully authenticated). If the SP admins have established to their satisfaction through other means that the person controlling those credentials is someone known to their community, the admins may have mitigated, to their satisfaction, the risk implied by the IdP's low/zero level of ID proofing. If the process involves some form of stronger authentication, such as the use of two factors, the risk that the credential is under the control of someone other than the original holder is mitigated to a further degree.|
Short and Long Term Recommendations
In recent years InCommon has expressed interest in offering stronger and more direct support for the research mission of member campuses and virtual organizations. One of the more concrete ways to back this up with action in the near term would be for InCommon to help bring into existence an IdP of Last Resort that meets the needs of R&S service providers. Therefore, our primary recommendation is that InCommon take steps to help make available a production IdPoLR service. An IdP meeting all these requirements is unlikely to appear through spontaneous generation. On the other hand, InCommon does not necessarily need to operate the IdP in question, it may be enough for InCommon to identify and support the launch of an independent service operator. Any near-term solution should initially offer a basic set of identity provider services. A solution meeting the requirements detailed above would provide that basic set of services The suite of services could be expected to grow over time as needs evolve and resources permit.