shibboleth-dev - Re: Encryption key strategies
Subject: Shibboleth Developers
List archive
- From: "Tom Scavo" <>
- To:
- Subject: Re: Encryption key strategies
- Date: Thu, 22 Jun 2006 09:56:12 -0400
- Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com; h=received:message-id:date:from:to:subject:in-reply-to:mime-version:content-type:content-transfer-encoding:content-disposition:references; b=cOH98MjqaRdwCQrgXuHlHSnix8/wLy6e7Lc6bcse7M3l8uHzZfc6ZgpbUJDMbQu4Twh3G2bIVSTazenUDD1rGUQjA2WDGDIlUEc7D7XQKWCBp4GD6iWW6pn9X05iX+F3sSSUgW2CjR2Eh96zJk+TXsD88HNTuk4D+IVQDlGQmzg=
On 6/22/06, Tom Scavo
<>
wrote:
On 6/22/06, Chad La Joie
<>
wrote:
>
> In theory I think this is possible, but it gets back to the question of
> interoperability that Scott mentioned. To the best of my knowledge,
> there isn't any spec for how to do this.
Is this close to what you're looking for (e.g.)?
http://www.oasis-open.org/committees/download.php/18058/sstc-saml-x509-authn-attrib-profile-cd-02.pdf
Or are you looking for something more low-level than that?
And if the answer to that last question is yes, the place to start, I
guess, is section 6 of SAMLCore and then SAMLProf, which specifies
use="encryption" in metadata and other details regarding the use of
encryption in the various profiles.
So we have
XMLEnc + SAMLCore + SAMLProf + [profile of SAML]
Is that enough to work with?
Tom
- RE: Encryption key strategies, (continued)
- RE: Encryption key strategies, Jim Fox, 06/22/2006
- RE: Encryption key strategies, Scott Cantor, 06/22/2006
- Re: Encryption key strategies, Keith Hazelton, 06/22/2006
- Re: Encryption key strategies, Tom Scavo, 06/22/2006
- RE: Encryption key strategies, Scott Cantor, 06/22/2006
- Re: Encryption key strategies, Reimer Karlsen-Masur, DFN-CERT, 06/23/2006
- RE: Encryption key strategies, Scott Cantor, 06/23/2006
- Re: Encryption key strategies, Ian Young, 06/28/2006
- Re: Encryption key strategies, Alistair Young, 06/26/2006
- RE: Encryption key strategies, Scott Cantor, 06/26/2006
- Re: Encryption key strategies, Chad La Joie, 06/22/2006
- Re: Encryption key strategies, Chad La Joie, 06/22/2006
- Re: Encryption key strategies, Reimer Karlsen-Masur, DFN-CERT, 06/22/2006
- Re: Encryption key strategies, Chad La Joie, 06/22/2006
- Re: Encryption key strategies, Tom Scavo, 06/22/2006
- Re: Encryption key strategies, Reimer Karlsen-Masur, DFN-CERT, 06/22/2006
- RE: Encryption key strategies, Scott Cantor, 06/23/2006
Archive powered by MHonArc 2.6.16.