Skip to Content.
Sympa Menu

shibboleth-dev - Re: authentication strength

Subject: Shibboleth Developers

List archive

Re: authentication strength


Chronological Thread 
  • From: Tom Scavo <>
  • To:
  • Subject: Re: authentication strength
  • Date: Thu, 16 Feb 2006 09:10:14 -0500
  • Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com; h=received:message-id:date:from:to:subject:in-reply-to:mime-version:content-type:content-transfer-encoding:content-disposition:references; b=GeyJLieBxj1+TvMzVgxyFFCnrKfuSwC7zrqCgnCE6gEM6BqoD7jpdEAqvkh7mM5G5QSPNdHJdv57o0BBdYKCa6SSpSJUb7aYSyhd1fwaGRVjW3xg9puUiZ+64CXw9V/q2kv4uoE0uJRCN5cO6jISy0ASC05A/5as8gYG4ET+Reg=

On 2/15/06, Scott Cantor
<>
wrote:
>
> The Feds use an attribute, FWIW.

Yes, thanks. Both Francisco Pinto and Nate Klingenstein suggested
this as well. Nate pointed me to the following document:

http://www.cio.gov/eauthentication/documents/SAMLspec.pdf

This is a useful starting point.

> Strong PKI + anybody gets a cert with no proof = low LOA

Key point, of course.

Thanks,
Tom



Archive powered by MHonArc 2.6.16.

Top of Page