You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 2 Next »

On the initiation of this workgroup, but prior to the group's first meeting, Walter sent an email titled "Kicking Things Off" to the group mailing list.

The email asked:

1. From both an IdP and SP perspective, what have been the most common challenges you have encountered when attempting to interoperate with federated partners?

2. To what extent were the challenges from question one a result of operational practices of the site vs. software configuration vs. limitations in the SAML implementation used?

This table (you're welcome, Scott) is an attempt to capture the issues listed in that thread.

Column 1 captures the identified issues.

Column 2 attempts to recast each issue as a "requirement" (note, the recasting may not work, so this column should be looked at skeptically).

Column 3 categorizes the issue per Walter's note.

Column 4 is for record keeping to identify which of these issues is captured/addressed in the work put forward/discussed by the workgroup so far.

 

IssueIssue restated as requirementLimitationCaptured?
Manual exchange of metadata or (worse) raw config intoAutomated, ongoing metadata exchange and validationOperational, SoftwareYes
Security risk/change control risk inherent in one-time MD exchangeAutomated, ongoing metadata exchange and validationOperationalYes
Lack of precise documentation and sloppy use of SAML constructs (in custom deployments)More specificity for use of some specific SAML featuresSoftware 
SP-initiated SSO as a "special" caseSupport for SP-initiated SSOSoftware 
Lack of deep link supportSupport for deep linkingSoftware/Operational 
Use of frames that break with 3rd party cookiesKeeping authentication screens as top level windows (not iframes)Operational 
Lack of dynamic provisioniong/entitlement-like attribute based authZSupport for attributes indicating group membership/entitlements (when customers handle authZ)Software/Operational 
Lack of focus on AuthZ space and supportAs above?Operational 
Lack of clock skew allowanceSupport for clock skewSoftware 
Lack of encryption supportSupport for encryption (and current encyption, e.g., SHA256 signatures)SoftwareYes
Requiring valid (vendor signed and/or expiring) certsSupport for non-expiring keys/certsOperational 
Lack of discovery support/portalble links (w/o hard coded IdP refs)Support for discovery servicesSoftware 
Hard coded 1:1 SP:IdP modelsSupport for multiple IdPsSoftware/Operational 
Require non-opaque, non-transient NameID (rather than attribute)Support for account identifiers in attributes (rather than NameIDs)Software/Operational 
Requiring literal account IDs be asserted by IdPSupport for identifier mapping (i.e., IdP ID is mapped to an internal account ID)Operational 
AuthnContextClass: not specifying at SP, but failing if PPT not used by IdPSpecify ACC; if unspecified, accept any ACCSoftware 
AuthnContextClass: can't handle locally defined AuthnContextClassesAllow support of extended ACC's (as part of site-specific configurationSoftware 
AuthnContextClass: no "step-up" supportSupport use of "step-up" authentication (re-auth with new ACC and poss ForceAuthnSoftware/Operation 
Assuming Logout URL existsVerify advertised IdP SLO endpoint before directing user thereSoftware 
Logoff handling???SAML 
Expectations of SLO???Operational 
Browser cookie behavior impacting functionality (sessions not clearing, etc)???SAML 
Attribute release standards for IdPs???Operational 
Attribute release: suppressing grad students (FERPA concerns)???Operational 
Privacy practices: what is actually being kept private????Tangential 
Standardized and effective workflow for dealing with attribute release???Operational 
Vendors charging fees for setup and support of SAMLSAML support should be part of base serviceOperational 
Lack of framework/contract terms; change controls, support escalation???Operational 
Lack of testing SP/IdP facilities (test SP, test IdP)Run a testing SP/IdP for validation purposes during initial integration testing?Operational 
Knowledge gaps with some vendors on how SAML works.???Operational 
Advertised but unsupported functionality in metadata (artifact endpoints, etc.)Advertise only supported endpointsOperational 
Availability of POP/mechanism for assessing riskInCommon: stronger focus on POP? [May be addressed in different workgroups]Operational 
Publishing metadata contact info for security incident responseInclude security incident response (usually security or help desk) in metadataOperational 
ForceAuthn: IdPs not ensuring user is reauthenticatedVerify function of reauth before resetting authninstantOperational 
ForceAuthn: SPs not checking authninstantVerify (or allow verification) of authninstant currencySoftware/Operational 
  • No labels