Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

 

Proposed

Charter:

PKI Review

  Certificate Service Review Working Group

Name

Final Report

 

 PKI Review Working Group


Sponsor

--Ann West

Group Leader (Chair)

-- 

 

Christopher Bongaarts, University of Minnesota

Working Group Flywheel: Paul Caskey, Internet2The text below is copied from the External Identities WG charter and needs to be updated as of July 30, 2015

Mission/Goals

The mission of the PKI Review the Certificate Service Review Working Group is to move the community of knowledge towards the goal of making external identities useful and sufficiently trusted in a variety of campus-based use cases. This group is focused on the use of external identities by individuals, rather than an enterprise using an external identity provider as their enterprise IdP.

Specific goals for the PKI Review Working Group include:

  • Exploring/developing deployment models for using external identities in a variety of risk profiles
  • Identifying and examining the technical components that are needed to make external identities useful across a broad array of services
  • Exploring the notion of account linking between a campus-issued account and an external account
  • Understanding the differences between external identities and local identities

review and provide input on matters pertaining to the next generation InCommon Certificate Service.  This group will represent the InCommon community and will serve as the advice and consent function for directions pertaining to the next generation service.

Membership

Membership in the Working Group is open to all a limited number of interested parties. Members join the Working Group by subscribing expressing an interest to participate to the mailing list, participating in the phone calls, and otherwise actively engaging in the work of the groupeither the chair or the Program Manager for Community Trust (pcaskey@internet2.edu).

The chair of the Working Group is appointed by the InCommon TAC and is responsible InCommon Program Manager for Community Trust. The chair is responsible for keeping the TAC InCommon Steering and Technical Advisory Committees informed regarding the Working Group's status.

Deliverables

  1. Update (i.e., make current) the set of use cases previously developed by the Social Identities Working Group. This should include use cases for the following situations:
    1. Social account linked to a campus-issued account
    2. Social identity used by a non-community member
  2. Develop a set of criteria for selecting external providers in a variety of usage scenarios. Ensure that both social providers (e.g., Google, Facebook, Twitter) and non-social providers (e.g., Microsoft, PayPal, VeriSign) are included.
  3. Identify and document properties of external accounts that would be of interest to web application owners and other relying parties. This should include both a) how the account is managed for authentication purposes, and b) attributes asserted by the account provider.
  4. Define and document how a gateway would represent the properties of an external account to an application.
  5. Contrast a central gateway with a local gateway. List the advantages and disadvantages of each deployment model.
  6. Provide application owners with recommendations regarding risk profiles when using external identities. (These profiles need not be based on the traditional 800-63 categories.) Describe various approaches to risk management.
  7. Document various approaches to account linking:
    1. Accounts can be linked either centrally (in a campus Person Registry, and visible via the campus IDP), or at a specific SP (application).
    2. Linking a campus account to a known external account, and linking an external account to an existing campus-issued account, where both accounts are used by the same person.
    3. Identify the properties that an external account must/should possess that would affect its use.
    4. Using an external authentication provider to authenticate to a campus-based service.
    5. Identify ways that campus-owned attributes could be asserted following authentication with an external account (e.g., group memberships)
  8. Produce a set of longer-lived recommendations for practitioners, roughly comparable to the NMI-DIR documents (e.g., papers, not just wiki pages).

Potential Deliverables Considered to be Out of Scope for this Phase

  • This WG will be looking at the use of personal external accounts; it will NOT be looking at situations where an enterprise is using a social provider as their IDP, for access to enterprise apps outside of google.
  • Technical requirements for Interop/deployment profile for OpenID Connect (OIDC)
  • Recommendations on approaches for elevating an external account authentication event to LoA 2.
  • Identify and document pro's and con's of having students continue to use their social account to access campus business systems during their student days. Identify an interim step toward this milestone.
    • Address short-term tactical issues
      • Review/approve revised domain activation process
      • Address the issue of the base domain and wildcarded base domain being treated separately?
      • Identify any issues around offering a private CA option
    • Community survey
    • List of desired features for the 'next-generation' InCommon Certificate Service
    • Gap analysis between new features and existing service
    • Recommendations for next steps

    Expected End Date

    The working group is expected to complete all deliverables by xx6/30/2016.

    Required Resources

    • wiki space 
    • phone line for conference calls: usual Internet2 conference call line
    • incommon.org group email list

     

    WG Resources Page (restrictred to WG members)

    https://spaces.at.internet2.edu/x/lIDuBQ

     

    ================

    See Also

    InCommon Working Groups Home

     

     

     

     

    Recent space activity

    Recently Updated
    typespage, comment, blogpost
    max5
    hideHeadingtrue
    themesocial

    Space contributors

    Contributorsmodelistscopedescendantslimit5showLastTimetrueorderupdate