shibboleth-dev - Re: Encryption key strategies
Subject: Shibboleth Developers
List archive
- From: Chad La Joie <>
- To:
- Subject: Re: Encryption key strategies
- Date: Thu, 22 Jun 2006 09:14:00 -0400
You should probably take a look at the SAML 2 Core spec for a more in-depth description of encryption and it's usages but I'll try to give general answers to your questions.
Reimer Karlsen-Masur, DFN-CERT wrote:
Hi.
I was looking for some mail thread on this list to connect your emails topic
to to understand your issue...but could not find any...
So please let me ask some beginners questions:
What data do you want to encrypt?
Probably the most immediate thing that comes to people's mind is attributes, though, in theory, you can encryption assertions, NameIDs and other things too.
Between which parties is this data shared?
The IdP and SP but there may be intermediary systems between them and you may not want those systems reading stuff about your user.
Who is the sender, who is the receiving end?
Both the IdP and SP can send and receive encrypted data.
Is there always a https tunnel with (strong) encryption between these
parties anyway?
Nope, not in the case where there are intermediate systems between the IdP and SP.
--
Chad La Joie 2052-C Harris Bldg
OIS-Middleware 202.687.0124
- RE: Encryption key strategies, (continued)
- RE: Encryption key strategies, Scott Cantor, 06/22/2006
- Re: Encryption key strategies, Reimer Karlsen-Masur, DFN-CERT, 06/23/2006
- RE: Encryption key strategies, Scott Cantor, 06/23/2006
- Re: Encryption key strategies, Ian Young, 06/28/2006
- Re: Encryption key strategies, Alistair Young, 06/26/2006
- RE: Encryption key strategies, Scott Cantor, 06/26/2006
- Re: Encryption key strategies, Chad La Joie, 06/22/2006
- Re: Encryption key strategies, Chad La Joie, 06/22/2006
- Re: Encryption key strategies, Reimer Karlsen-Masur, DFN-CERT, 06/22/2006
- Re: Encryption key strategies, Chad La Joie, 06/22/2006
- Re: Encryption key strategies, Tom Scavo, 06/22/2006
- Re: Encryption key strategies, Reimer Karlsen-Masur, DFN-CERT, 06/22/2006
- RE: Encryption key strategies, Scott Cantor, 06/23/2006
- RE: Encryption key strategies, Scott Cantor, 06/26/2006
- RE: Encryption key strategies, Scott Cantor, 06/28/2006
- Re: Encryption key strategies, Ian Young, 06/28/2006
Archive powered by MHonArc 2.6.16.