-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Brainstorming outcomes for IPSIE #2
Comments
Mechanism to enable SSO login/access compliant with NIST levels (IAL and AAL) |
More streamlined user lifecycle management and entitlement management |
|
|
As a B2B SaaS vendor (HPE GreenLake), our goal is to simplify support for our customers by addressing a basic set of common use cases. Additionally, we want to establish a unified integration paradigm for our ecosystem of downstream apps that connect to HPE GreenLake. We believe it is crucial to enable "table stakes" use cases easily while progressively enhancing security and compliance across different aspects of the IPSIE profile. Given our experience with multiple apps, we understand that securing business approval for large-scale projects can be challenging. However, breaking these projects into smaller, manageable increments makes it easier to achieve incremental compliance. Table Stakes (in order of priority):
Extended Capabilities:
API Security:
|
@ttripp Note that the SCIM WG in IETF is working on multiple items to address scalability, including cursor based pagination, delta queries, and SCIM profile for Security Event Tokens. Each of these should address some part of the scalability issues in the current SCIM protocol set. https://datatracker.ietf.org/group/scim/documents/ Having said that, SCIM is not the only way to provision/deprovision users. It is an option that may be used. |
Things related to SSO
|
Exchange of location awareness for users behind a cloud proxy or secure service edge.(SSE) This could replace using X-Forwarded-For and will enable IDP identity protection mechanisms. |
@ttripp as a PM at a B2B SaaS vendor I agree with you. What is your perspective on signals upstream from you vs downstream? Is it your responsibility to aggregrate and normalize signals before passing them downstream, or are you just repeating the signals and letting the downstream systems make their own decisions? |
I'm interested in this use case: For SSO flows, an OP might want/need to delegate authn to a another OP (i believe auth0 calls this a connection), whether for the first factor of auth or for a higher level. In these cases, the client may want to specify which provider the OP should delegate auth to. I'd like to prescript how this could be specified. |
A higher-level outcome, related to the discussion on IPSIE "levels": I want to be able to have a label such as "IPSIE Level 1" and know that two products with that label are guaranteed to interoperate for the given features defined in that level, without special-casing for individual providers. |
@ttripp can you help explain why you think the fingerprinting belongs in IPSIE? I understand the usefulness of the data, but I'm trying to understand why IPSIE should take a stance on this specific signal. |
It will have to be NIST level by revision number as well, i.e. Rev 3 vs. Rev 4 I've also been seeing government orgs (like login.gov) needing to implement vectors of trust on top of the IAL levels to get the levels of precision (wrong word, I'm tired) across agencies. |
I would highly like to see the ability from day 1 for each service to indicate what Entity Categories they support as part of the service, similar to what REFEDS has defined: https://wiki.refeds.org/display/ENT/Entity-Categories+Home Additionally, I would like to see a functional requirement that severs and clients must support 2 or more concurrent signing and encryption certificates. Both of these would highly reduce operational burdens across the board. |
You'd get a strong second from me on this. Flag day certificate rotations become impossible once you've reached a certain scale. And the lack of support for multiple certs is both an operational impediment and a security risk/vuln. |
Standardized mechanism, perhaps based on OIDC, to communicate the results of an identity verification or identity proofing event. This would allow for drop-in integration of ID verification/proofing vendors into enterprise systems to enable onboarding/recovery flows. |
+1 from me on this! There's already an OpenID spec for this too! https://openid.net/wg/ekyc-ida/specifications/ |
IdP support of being able to assert IAL similar or equivalent to as documented and adopted in the R&E space as part of the Assurance Framework. RAF |
This should already be possible in SAML. At least the pieces should be there. whether or not RPs support it is another question. RP invalidates session, sends AuthN Request to IdP with forceAuthN set. Whether or not the IdP respects it is another discussion. Most of the non-commercial IdPs in use in my ecosystem DO support it. |
In the OIDC realm, this is RFC9470. |
The P0 interoperability step-up MFA gap is around ACRs as previously discussed in https://github.com/pamelatech/ACRminprofile/blob/main/MinACRProfile-0.2.md. Is there a reason we are not brining this draft into the WG? |
If I remember correctly, there was something about it Pam wanted to change still. But that draft in particular is generic enough to OIDC that it should probably live in the A/B Connect WG rather than the IPSIE WG, then we can reference it in the IPSIE OIDC profile. |
One thought I had for an outcome for IPSIE. I'd like to see IPSIE provide guidance on authentication and authorization recommendations for SCIM. While SCIM is highly flexible the lack of prescribed recommendations leave a gap in standardization that results in inconsistency across the industry. So recommendations around the primary authentication mechanism (i.e. OAuth) and discouraged authentication methods (basic), authorization recommendations (use of RBAC, use of standardized scopes) and possibly even deployment recommendations (rate limiting). |
Please use this issue to brainstorm outcomes you would like to be able to achieve with IPSIE. We will collect and discuss these on the next working group call.
What outcomes are important to you and your organization or customers?
The text was updated successfully, but these errors were encountered: