- From: Sverdlov, Yakov <Yakov.Sverdlov@ca.com>
- Date: Mon, 15 Jan 2007 15:44:08 -0500
- To: "Hal Lockhart" <hlockhar@bea.com>, "Mary Ellen Zurko" <Mary_Ellen_Zurko@notesdev.ibm.com>
- Cc: <public-wsc-wg@w3.org>
- Message-ID: <ACE36C31EA815A4CBA7EBECA186C0D4101066796@USILMS13.ca.com>
I would not claim that the difference is critical either. Regards, Yakov Sverdlov CA ________________________________ From: Hal Lockhart [mailto:hlockhar@bea.com] Sent: Monday, January 15, 2007 3:37 PM To: Sverdlov, Yakov; Mary Ellen Zurko Cc: public-wsc-wg@w3.org Subject: RE: Updated SSO & Federated Identity use cases The trust relation MUST be between the relying party and the signature on the card, i.e. the Issuer. When the information is vouched for solely by the User, we are talking about personalization. The term Security (as in Web Security Context) does not apply. I still do not see the critical difference. Hal ________________________________ From: Sverdlov, Yakov [mailto:Yakov.Sverdlov@ca.com] Sent: Monday, January 15, 2007 3:31 PM To: Mary Ellen Zurko; Hal Lockhart Cc: public-wsc-wg@w3.org Subject: RE: Updated SSO & Federated Identity use cases Yes, the identity "cards" may be stored locally and there is a trust relationship between a card (a certain representation of a digital identity) and the relying party. The collection of cards represents multiple and different trust relationships between a user and relying parties. The user is responsible for picking the appropriate identity when challenged by a relying party. I agree with Hal that after that the sequence is very similar to the use cases 1-3 i.e. a token request is issued to IdP, etc. I think the following link explains one of the implementations (CardSpace) better than I do: http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dnlong/ html/IntroInfoCard.asp <http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dnlong /html/IntroInfoCard.asp> Regards, Yakov Sverdlov CA ________________________________ From: public-wsc-wg-request@w3.org [mailto:public-wsc-wg-request@w3.org] On Behalf Of Mary Ellen Zurko Sent: Monday, January 15, 2007 11:52 AM To: hlockhar@bea.com Cc: public-wsc-wg@w3.org Subject: RE: Updated SSO & Federated Identity use cases Another difference is the authority (the user, vs some third party). Mez Mary Ellen Zurko, STSM, IBM Lotus CTO Office (t/l 333-6389) Lotus/WPLC Security Strategy and Patent Innovation Architect "Hal Lockhart" <hlockhar@bea.com> Sent by: public-wsc-wg-request@w3.org 01/08/2007 10:49 PM To "Sverdlov, Yakov" <Yakov.Sverdlov@ca.com> cc <public-wsc-wg@w3.org> Subject RE: Updated SSO & Federated Identity use cases I guess I don't get the point of Case 4. There are literally scores of variations on the cases 1-3 which I did not mention because the details may or may not matter. Certainly the systems mentioned allow the Subject Name identifier to be the same. Having them be different is the more interesting case because: A. It is more general B. It can preserve privacy. C. In the real world people actually possess ids with different Subject Name Identifiers. In your mind what is the critical difference in case for, other than being yet another data flow? Hal ________________________________ From: member-wsc-wg-request@w3.org [mailto:member-wsc-wg-request@w3.org] On Behalf Of Sverdlov, Yakov Sent: Monday, January 08, 2007 8:49 AM To: member-wsc-wg@w3.org Subject: Updated SSO & Federated Identity use cases Hi, I added Identity 2.0 section to the SSO & Federated Identity Wiki page. After looking at the REST use cases, I don't think they are distinct enough from the security context perspective, so I didn't add them to the Wiki. Regards, Yakov Sverdlov CA
Received on Monday, 15 January 2007 20:44:18 UTC