2005-02-24 Yale-Rutgers video conf
Time of meeting: 12:30 - 2pm
Present:
Rutgers: Scott, Bill, Dmitriy
Yale: Andrew, Howard, Andy, Drew, Susan
WIND, SAML, M2
Columbia and WIND
Report by Andy about the Yale-Columbia meeting wrt WIND and CAS.
See also Wiki page on Columbia.
SAML
Package of schemas identifying core information and administrative stuff. Ability to sign elements. A request and response protocol for exchanging these potentially signed XML productions.
Request response protcol
I build a request (potentially signed) expressing what I want. I send it to you. You respond with a (potentially signed) response.
Assertions
Attribute assertions
Express a scope, attribute name, and attribute value.
Metadata assertions
When is this assertion valid? Advice?
Authentication assertions
Includes information about how this user was authenticated. Options include
- userid, password in the clear
- userid, password over a secure transport protocol (SSL)
- x509 in the clear
- x509 over a secure transport protocol (SSL)
- smart card
- timer card
- XML message signed
- PGP
- etc...
Assertions can be digitally signed.
There are several implementations
But let's use OpenSAML.
Shibboleth as an example of usage.
SAML as CAS 3 protocol
CAS accept SAML request as request for ticket validation. Signing the request woulda authenticate the requestor without our needing to do our callback trick. CAS responds with a SAML response including attribute assertions expressing netid, etc.
SAML as just a format for passing attribute values. We look good by using it: standards compliance, positive interaction with I2, etc.
SAML as internal CAS objects
SAML could be used as the CAS3 internal server-side representation of information about authentication. That is, SAML could be the native internal model which we translate to the CAS2 responses at the marshalling/view layer.
Decision at this video conference was not to try to do this: instead use CAS3 objects as server side representation of authentication information and translate those into SAML if desired at the view/marshalling layer.
NTLM / Cert non-interactive authentication
ACTION ITEM: Yale commitment to implement non-interactive authentication schemes to validate that support for these approaches are well-supported by CAS3.
SAML responses
ACTION ITEM: Yale commitment to implement CAS parsing SAML request for ticket validation and responding with SAML response.
Credentials and their strengths
How strongly was the user authenticated?
Is the CAS SSO cookie an authentication method? ACTION ITEM: Howard will produce diagram.
CAS3 extension points
We have on milestone 2 goal of expressing our extension points. ACTION ITEM: Transform Well Known Modifications page to express these extension points.
Other extension points:
- Rutgers select-an-authentication-method pulldown.
- CAS forwarding actual primary credentials to a portal so that the portal can use them to authenticate on behalf of the user to channel content sources.
Other M2 work todo
Improved testing, logging.
Monitoring via JMX
- What other instrumentation?