shibboleth-dev - RE: OpenID2 to SAML2 to SAML1.1 ... to Shib, anyone?
Subject: Shibboleth Developers
List archive
- From: Peter Williams <>
- To: <>, <>
- Subject: RE: OpenID2 to SAML2 to SAML1.1 ... to Shib, anyone?
- Date: Thu, 20 Mar 2008 10:27:46 -0700
Let me try to be more clear: there is no Shibboleth profile anymore. We have a SAML implementation, the same as any other (well, hopefully better, but that's the goal of any product).
This message has generally failed to overcome the historical notion of what Shibboleth is, sometimes to our advantage from a marketing PoV, but for the purposes of what you're asking about, it matters a great deal that you understand this. You need do nothing specific to Shibboleth in your work.
> First, the entityIDs used in the
> bridging trial should be https URLs, at which SAML2 signed metadata should
> be present for use in auto-discovery of SAML2 metadata. Said metadata should
> contain the entity's self-signed X.509 v3 certificate.
Understood. Signed by who?
> The site's SSL
> certificate chould chain to a root present by default in common consumer web
> browsers, such as FF or IE.
I much prefer rejecting the notion that this false sense of security contributes much to the equation. I'll use my usual counter-example: anybody at OSU can get a commercial certificate for any domain name in the ohio-state.edu or osu.edu domains, whether or not they control that domain name. Ergo, they're worthless for authentication (in fact worse, since people assume things that they would not assume in the absence of a certificate).
That said, I'm sure you'll find takers for the idea.
> How does this first phase proposal sound? It feels like about like 4-8
> hours of effort.
I agree, doubt it would be much more than that. I also don't have it to give right now, but hopefully you'll find some takers. I'm just trying to provide some technical context for you in your work here and I'll continue to do so when I can.
> Note, we will have little control over where invited
> participants may choose to wander on the web, once s/he has an OpenID. The
> second phase may then consider that very issue, seeking to limit by a
> federation's trust model the behaviour of the OpenID2 gateway.
I believe Caleb mentioned the UK's work in this area. Lots of people are certainly thinking about the implications of OpenID's approach to federation (I utterly reject the view that OpenID is "different", "user-centric", or anything other than yet another federation protocol.)
-- Scott
Our Openid implementation (based on gatewaying) took about 36h of additional programming work, to map the obvious signals between the 2 stacks. Our work was architected to be a pure protocol engine, one that simply delegates to a particular (common) flow within the SAML2 protocol. This would support the position that openid2 is just another protocol/binding delivering the sp-initiated websso profile. This is particularly true if SAML entities support auto-discovery of metadata, addressing openid2 main claim to fame: the auto-discovery model. However, having now built the concept, there certainly are valid counter arguments, I've found. There are various topics worthy of formal research concerning OpenID interaction with SAML's model, above and beyond implementing bits of software.
To cite the phrasing choices of SUN Microsystems folk, openid can be described as a lightweight websso protocol. That is: lightweight OpenID2 is to SAML2 what lightweight LDAP (once) was to the X.500 Directory Access Protocol. Just as Tim Howe's first LDAP listener was nothing more than a layer 7 gateway to an actual X.500 DSA running OSI layer 4-7 protocols, so our OpenID bridge is a gateway to SAML2. One day, perhaps soon, the bridging and gateway architecture will no longer have any need to exist. With the likes of the simpleSAML2 implementation, relying parties operators may well find that native support for SAML2 is as viable and easy to provide for as is providing for openid2. Having built a network of about 25 realty players from scratch in the last year - based off of the momentum achieved by the Shib community - I can attest that SAML need be neither expensive nor difficult.
- OpenID2 to SAML2 to SAML1.1 ... to Shib, anyone?, Peter Williams, 03/18/2008
- RE: OpenID2 to SAML2 to SAML1.1 ... to Shib, anyone?, Scott Cantor, 03/18/2008
- RE: OpenID2 to SAML2 to SAML1.1 ... to Shib, anyone?, Peter Williams, 03/19/2008
- RE: OpenID2 to SAML2 to SAML1.1 ... to Shib, anyone?, Scott Cantor, 03/19/2008
- RE: OpenID2 to SAML2 to SAML1.1 ... to Shib, anyone?, Peter Williams, 03/20/2008
- RE: OpenID2 to SAML2 to SAML1.1 ... to Shib, anyone?, Scott Cantor, 03/20/2008
- RE: OpenID2 to SAML2 to SAML1.1 ... to Shib, anyone?, Peter Williams, 03/20/2008
- Re: OpenID2 to SAML2 to SAML1.1 ... to Shib, anyone?, Brent Putman, 03/21/2008
- RE: OpenID2 to SAML2 to SAML1.1 ... to Shib, anyone?, Peter Williams, 03/20/2008
- RE: OpenID2 to SAML2 to SAML1.1 ... to Shib, anyone?, Scott Cantor, 03/19/2008
- RE: OpenID2 to SAML2 to SAML1.1 ... to Shib, anyone?, Peter Williams, 03/19/2008
- RE: OpenID2 to SAML2 to SAML1.1 ... to Shib, anyone?, caleb racey, 03/19/2008
- RE: OpenID2 to SAML2 to SAML1.1 ... to Shib, anyone?, Scott Cantor, 03/18/2008
Archive powered by MHonArc 2.6.16.