You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 13 Next »

On the initiation of this working group, but prior to the first meeting, Walter sent an email titled "Kicking Things Off" to the group mailing list.

The email asked:

1. From both an IdP and SP perspective, what have been the most common challenges you have encountered when attempting to interoperate with federated partners?

2. To what extent were the challenges from question one a result of operational practices of the site vs. software configuration vs. limitations in the SAML implementation used?

This table (you're welcome, Scott!) is an attempt to capture the issues listed in that thread.

Column 1 captures the identified issues.

Column 2 attempts to recast each issue as a "requirement" (note, the recasting may not work, so this column should be looked at skeptically).

Column 3 categorizes the issue per Walter's note.

Column 4 is for record keeping to identify whether/where each issue is captured and addressed in the work put forward by the working group.

 

This list will also be used ongoing as a "parking lot" for any issues that are raised in discussion that are not immediately captured in the profile documentation.

 

IssueIssue restated as requirementLimitationCaptured (By)Who's Tracking
Manual exchange of metadata or (worse) raw config intoAutomated, ongoing metadata exchange and validationSoftware/OperationalYes 
Security risk/change control risk inherent in one-time MD exchangeAutomated, ongoing metadata exchange and validationOperationalYes 
Lack of precise documentation and sloppy use of SAML constructs (in custom deployments)More specificity for use of some specific SAML featuresSoftware  
SP-initiated SSO as a "special" caseSupport for SP-initiated SSOSoftware  
Lack of deep link supportSupport for deep linkingSoftware/Operational  
Use of frames that break with 3rd party cookiesKeeping authentication screens as top level windows (not iframes)Operational  
Lack of dynamic provisioning/entitlement-like attribute based authZSupport for attributes indicating group membership/entitlements (when customers handle authZ)Software/Operational  
Lack of focus on AuthZ space and supportAs above?Operational  
Lack of clock skew allowanceSupport for clock skewSoftware  
Lack of encryption supportSupport for encryption (and current encryption, e.g., SHA256 signatures) [RH: meaning "and current signatures" or "and current algorithms"].SoftwareYes 
Requiring valid (vendor signed and/or expiring) certsSupport for non-expiring keys/certsSoftware/Operational  
Lack of discovery support/portable links (w/o hard coded IdP refs)Support for discovery servicesSoftware  
Hard coded 1:1 SP:IdP modelsSupport for multiple IdPsSoftware/Operational  
Require non-opaque, non-transient NameID (rather than attribute)Support for account identifiers in attributes (rather than NameIDs)Software/Operational  
Requiring literal account IDs be asserted by IdPSupport for identifier mapping (i.e., IdP ID is mapped to an internal account ID)Operational  
AuthnContextClass: not specifying at SP, but failing if PPT not used by IdPSpecify ACC; if unspecified, accept any ACCSoftware  
AuthnContextClass: can't handle locally defined AuthnContextClassesAllow support of extended ACC's (as part of site-specific configurationSoftware  
AuthnContextClass: no "step-up" supportSupport use of "step-up" authentication (re-auth with new ACC and poss ForceAuthnSoftware/Operation  
Assuming Logout URL existsVerify advertised IdP SLO endpoint before directing user thereSoftware  
Logoff handling???SAML  
Expectations of SLO???Operational  
Browser cookie behavior impacting functionality (sessions not clearing, etc)???SAML  
Attribute release standards for IdPs???Operational  
Attribute release: suppressing grad students (FERPA concerns)???Operational  
Privacy practices: what is actually being kept private????Tangential  
Standardized and effective workflow for dealing with attribute release???Operational  
Vendors charging fees for setup and support of SAMLSAML support should be part of base serviceOperational  
Lack of framework/contract terms; change controls, support escalation???Operational  
Lack of testing SP/IdP facilities (test SP, test IdP)Run a testing SP/IdP for validation purposes during initial integration testing?Operational  
Knowledge gaps with some vendors on how SAML works.???Operational  
Advertised but unsupported functionality in metadata (artifact endpoints, etc.)Advertise only supported endpointsOperational  
Availability of POP/mechanism for assessing riskInCommon: stronger focus on POP? [May be addressed in different workgroups]Operational  
Publishing metadata contact info for security incident responseInclude security incident response (usually security or help desk) in metadataOperational  
ForceAuthn: IdPs not ensuring user is reauthenticatedVerify function of reauth before resetting authninstantOperational  
ForceAuthn: SPs not checking authninstantVerify (or allow verification) of authninstant currencySoftware/Operational  

 

Note: not included here are some recommended reference links, as those have been captured in the working group's list of references already

  • No labels