Minutes: Assurance Implementers Call of 7-Aug-2013
Ann West, InCommon/Internet2
Dave Langenberg, U. Chicago
Ron Thielen, U. Chicago
David Walker, Independent
Dedre Chamberlin, UCSF
Mark Rank, UCSF
Sharon Welna, University of Nebraska Medical Center
Steve Devoti, University of Wisc.
Jon Miner , University of Wisc.
Michael Hodges, Univ of Hawaii
Eric Goodman, UC Office of the President
Jeff Kaphart, University of Florida
Emily Eisbruch, Internet2
Migration of Certified IdPOs from 1.1 to 1.2
Steve Devoti reported that the AAC has developed an upgrade process that will serve for the current upgrade from 1.1 to 1.2, and will also provide the framework for future upgrades to the assurance spec. The migration process currently only applies to Virginia Tech, but the expectation is that a greater number of IdPs will be impacted by future upgrades. Since the change from 1.1 to 1.2 is not considered a major change, no audit is required. What is required for this upgrade is a written statement attesting to compliance with each criterion that is highlighted yellow in Substantive DIF: IAP v1.1 versus v1.2.
-The approach for future upgrades to the spec will be:
-AAC identifies the extent of the changes
-AAC decides on what is appropriate (attestation?, audit? Etc) given the extent of the changes
Ann noted that the 1.2 spec laid out the process for handling alternative means. Virginia tech will be submitting their alternative means as part of the upgrade.
Shib IdP Enhancements Progress
As reported in July, the Assurance and MFA Enhancements to Shibboleth Identity Provider RFP was awarded to Paul Hethmon. Paul has started work on the design documents, and progress can be review at:https://spaces.at.internet2.edu/display/InCAssurance/Shibboleth+Enhancements+-+Project+Status
Campuses doing acceptance testing will include U. Chicago, U. Florida and Brown. The project is on schedule to finish by the end of the year (or possibly sooner). Paul Hethmon has been communicating with the Shib developers to align his work with their Shibboleth UI work.
Q: Is SHA-2 going to be part of the Shib Enhancements?
A: There is going to be a plug in for SHA-2. There is also a different group (led by Tom Barton under the auspices of the InCommon TAC) looking specifically at SHA-2.
Assurance Advisory Committee Update
SteveD reported that a major focus area for the AAC has been about the POP.
-some IdP's never published an initial POP
-other IdP's have an outdated POP
The AAC has heard from InCommon Service Providers that the current system makes it difficult to evaluate risk of working with an IDP. The AAC has looked at whether it might be reasonable to require IdP's to assert a bronze level of assurance.
-Dedre: it makes sense to require that campuses maintain an up-to-date POP.
-Michael: Perhaps the POP should have a life span, with a requirement the IdPs do an update at a certain interval.
-Ann: Every six months, InCommon does remind IdPs without a POP that they need to provide one.
It was noted that even if every IdP had a POP, this would not address all the concerns that are being raised by the Service Providers. Enforcement of the current POP requirement may be a logical first step, but the problem would still exist that SP 's with high requirements would still need a lot of staff to check every POP. Ann suggested a scenario (being brainstormed), where IdP's are required to use an online checklist or series of checklists to describe their practices. There could be bundles of questions around categories such as credentialing, identity management, interoperability, etc. AuthNContext might be expressed in some of the bundles. Numeric values could be assigned to an IdP based on their self-assertions on these checklists. The numerical score could be asserted as an attribute, to allow an SP to decide whether to federate with a given IDP. This would be an informal program, separate from Assurance, but it might somehow feed into Assurance.
Dedra commented that the simplicity of this checklist approach is appealing and could provide important benefits, and it would be especially helpful if there was also more detailed documentation available describing each IdP's practices. One approach might be to have a field where the IDP provides the URL where one finds more detailed documentation
Q: Would this checklist approach be flexible enough to reflect how a campus uses an alternative practice (such as using MFA instead of password reset)?
A: There could be registered, community-defined standards (apart from the FICAM standards) expressed via AuthNContext.
-It's important to use password protected transport, and to avoid bilateral handshakes.
-We should look at solutions that feed into the assurance program. Do not want people to be asking "why am I doing this if I must also be doing that?"
Counting Failed Login Attempts
Benn was not able to join the call to report on the Counting Failed Login Attempts work.
Dedra stated that UCSF is interested in working with another campus as partners in this area.
Brett Bieber at Nebraska might be a good partner.
AD Alternative Means Update
The group is working with Microsoft and also looking at possible interim approaches. The issues include a couple of the encryption algorithms that are not NIST compliant. One action item for the AD Alternative Means group may be to update the AD Cookbook.
Dedre reported that UC Trust Federation had a goal of moving towards InCommon Silver, but that was found very challenging. The new target is to get the UC Trust campuses to comply with the assurance requirements of the local federation by the end of the year. This will move the campuses part of the way towards Incommon bronze or silver.
Michael reported that at U Hawaii they have set up an AD instance. The work being done by the AD Alternative Means group has become of great interest.
University of Wisconsin and University of Florida have been focusing heavily on implementing Office365 and this has detracted to some extent on ability to work on assurance.
Cohort Group on Bronze Implementation
Ann Is putting together a plan for a bronze implementation cohort group. This will involve walking through the bronze spec. The group will most likely talk about entropy issues, controlling access to your password store, interpreting the spec, old clients, and other issues.