-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Authentication Context with IDP Federation #3
Comments
Hi Ram; This is one of those use-cases where CATS 2.0 shows it's age. It actually has a constraint that "Cyber-Auth Deployments MUST discard unsolicited saml2p:Response messages" which was justified at the time for no reason other than "No Cyber-Auth use case has been identified which requires these". Obviously this is no longer appropriate, so we should fix this in CATS 3. To answer your question: while there is no Authentication Request and associated I think it also wold make sense that the IdP Metadata should still follow the Identity Assurance Certification Attribute Profile and list the all of levels of credential assurance that it provides. E.g.
|
Hi Doug,
Thanks for the response.
Has it (what you have referred below) been added to CATS 3.0 officially? Or is it a recommendation at this point?
Currently we are trying to comply on CATS 2.0. From time lines point of view I am not sure when CATS 3.0 will be enforced?
Thanks,
Ram
|
We are just starting to work on CATS 3.0 here. A first draft of a new SAML profile is still a few months away. |
Another question to ponder: Am I correct in my understanding that the assertions your IdP is issuing provides identity assurance instead of credential assurance? I wonder if we should be defining new URIs to distinguish between credential LoA and identity LoA? There are use cases where some IdPs may provide identity-based credentials (e.g. My Alberta Digital ID, in which case a single assertion would provide both identity and credential assurance. To include both in a single Alternatively, such an IdP could issue a The challenge with these sorts of problems is that, while all of these approaches may be legal SAML, there could be very few software implementations around capable of actually supporting this. |
I have a question about enabling Authentication Context for CATS 2.0 standards.
I know it is required between CP and RP in case of SP initiated federation sending AuthNContext in SAMLRequest and expecting a response in SAMLResponse.
What about the requirement in IDP initiated federation.
For example, currently CRA and ESDC use identity federation (IDP initiated) without the use of SAML Request. I was wondering if LOA2 Authentication Context is required in this scenario.
Thanks,
Ram
The text was updated successfully, but these errors were encountered: