Skip to Content.
Sympa Menu

shibboleth-dev - Re: Update on AA plans

Subject: Shibboleth Developers

List archive

Re: Update on AA plans


Chronological Thread 
  • From: Von Welch <>
  • To:
  • Cc: Keith Hazelton <>,
  • Subject: Re: Update on AA plans
  • Date: Sun, 7 Nov 2004 12:25:16 -0600


To follow on to the use case Steven mentions below, as some of you may
already have heard, we have received an NMI award to instantiate the
needed modifications to Globus to bring the use case to life, a
project for which we have continued dubbing "GridShib". You can find
details at the url below.

http://grid.ncsa.uiuc.edu/GridShib/

Our project officially starts (i.e. funding arrives) December 1st. I
will be re-engaging with this group to figure out how I can help work
on the Shib details of this.

Von



writes (09:18 November 1, 2004):
> At 7:23 AM -0600 11/1/04, Keith Hazelton wrote:
> >Question about coming support in Shib AA for scenarios where user
> >presents an X.509 cert to SP and the cert contains a useful subject
> >identifier and a pointer to a corresponding IdP.
> >
> >Do I understand this centers on the addition of key holder token
> >support to the Shib AA to complement the current bearer token (if my
> >terminology is correct)? What's the priority, timeline, etc.?
> >Relevant to how we pitch Shib / PKI (user certs) here at UW-Madison
> >in the near future.
> >
> > Thanks in advance for any info, advice, --Keith
> >
>
> I've pasted in down below a description of the grid-shib use case
> that we all agreed on in feb 2004, and which I believe served as the
> basis for the recent grid-shib nsg proposal.
>
> Basically, the client presents a classic X.509 subject (or proxy...)
> cert to to the SP, the SP (using one of a variety of mechanisms)
> locates the relevant AA(s), the SP queries the AA and presents the
> cert instead of a handle.
>
> Is this close to the scenario you imagine?
>
> Supporting this use case does involve extending the AA, so that it
> can answer queries about the user referenced by the cert (rather than
> a handle). It doesn't use the Holder-of-Key confirmation method that
> I think you're referencing. I don't think we've yet worked thru the
> details of *exactly* how this would work.....
>
> Our current plan is to include this support in Shib v1.3, due in march
> 2005.
>
> At 5:51 PM -0600 2/11/04, Von Welch wrote:
> >Here's the Grid use case we agreed as being most reasonable during on
> >last discussion a month or so ago. It's one of the three I originally
> >proposed. I've added some more detail and fulled out the preconditions
> >of the use case.
> >
> >Von
> >
> >====================
> >
> >Setting the stage - preconditions for use case:
> >
> >a) There exists some mechanism for canonicalizing a X.509 subject name
> >that Grid middleware and the Shib AA service agree on.
> >
> >b) Shib Attribute Authority is aware of X.509 subject names for (some of,
> >at least) its users.
> >
> >c) There is no session concept in this model. By that I mean nothing
> >like the current handle which essentially lets the AA know that the
> >user has contacted a target resource in the recent past.
> >
> >d) There is a standardized X.509 extension indicating how a relying
> >party may contact one (or more?) AAs services which can issue
> >attributes for the subject inthe X.509 certificate of which the
> >extension is a part.
> >
> >====================
> >
> >The use case: Use connects to a Grid resource using standard Grid
> >credentials, clients, protocols. Resource contacts a Shib AA which is
> >authoritative for the user and makes an access control decision based
> >on one or more attributes (or lack there of) from the AA.
> >
> >Steps:
> >
> >1) User acquires Grid credentials (Proxy Cert or EEC and associated
> >private key) through a normal mechanism - e.g. proxy certificate
> >generated from long-term X.509 credentials or certificate from
> >KCA. These credentials MAY have a non-critical X.509 extension which
> >indicates one Shib AAs which are authoritative for the user.
> >
> >2) The user (or process running on the user's behalf with delegated
> >credentials from the user) authenticates to target service with normal
> >Grid credentials (EEC or Proxy Certificate and associated private
> >key).
> >
> >3) Through this authentication the target service established the
> >subject name of the user (as well as a information about Shib AA which
> >can speak about the user, if contained in their credentials).
> >
> >4) Either through information contained in the user's credentials or
> >through some local policy, the target service consults local
> >configuration which maps the subject name of the user to a particular
> >Shib AA.
> >
> >5) The target service contacts the AA over a SSL protected
> >channel. Local, trusted copy of certificate of Shib AA is used to
> >verify that the correct AA is being communicated with. Target service
> >performs mutual authentication with shib AA using it's own X.509 EEC &
> >private key. From this authentication Shib AA acquires subject name of
> >target service.
> >
> >6) Target service presents user subject name and requests some set of
> >attributes (possibly all) for user.
> >
> >7) Shib AA consults ARPs to determine target service's right to access
> >attributes for user (based on its subject name from
> >authentication).
> >
> >8) Shib AA delivers list of attributes to target service over
> >SSL-encrypted link. Link integrity checking allows attributes to be
> >unsigned.
> >
> >9) Target service uses attributes along with local policy to make
> >access control decision(s).



Archive powered by MHonArc 2.6.16.

Top of Page