--
To unsubscribe from this group and stop receiving emails from it, send an email to transitive-identi...@spiffe.io.
I was presented with a use case for the complete call chain about a year back. It was "I only want to authorize requests to my payment processing service if I can assert that it was requested by an authorized user AND that it has transited our fraud detection service."
I do know that this was not a contrived use case, however I'm not sure how common such cases are, nor if this kind of authorization is better solved in a different way.
I think being able to reason over the entire chain across multiple organizations should be a capability. Historically, it wasn’t possible to do so due to compute and infrastructure capabilities. In today’s environment, we are very close to reaching a solution. We just need to close the gap.
I'll give you two examples:
Medical Use Case
From the healthcare/medical perspective, we want to be able to continuously audit that certain properties are true on the customer/partner side. E.g. If we have a requirement that an HTTP based Data Loss Prevention solution on the partner side of the connection, preserving intermediate identity would give us the capability to audit the path of the connection and make policy decisions based on the result. We have *no* control over the partners logging nor access to their logs to subsequently audit. In fact, logs are considered HIPAA data, so we can’t even request to review them except under very specific circumstances. HIPAA is just one among many examples of data security requirements that preclude such audits in many industries. We also have *no* control over what the partner considers a reasonable origin for the chain that leads to the request. We may decide that the intermediates connections are not important and accordingly reduce the chain, but I would prefer not to be forced into accepting this by design.
Edge Computing
Consider a non HTTP use case for transitive identity in edge computing. There is a very good chance that 5G will replace WiFi for enterprise wireless connectivity. Suppose we have a hospital with a device connected on 5G. That device doesn't connect directly to the Internet but to the on premise data center. The on premise data connects to an edge data center operated by a company like Equinix with managed 3rd party services and data stores. Once the connection has traversed through those managed services, it continues on to our AWS or GCP VPC.
In this entire chain, we have multiple organizations in your path. Simultaneously, we want to enforce that connections do indeed traverse through each of the components we have by policy and reject connections that fail to meet our requirements.
Also, take note that this is not authenticating every single request in HTTP but is strongly authenticating long living connection requests. The cost of verifying the chain when establishing these connections is low cost compared to how long the connection remains established.
If we terminate identity at the edge of each boundary, we significantly complicate this capability in edge use cases.
Net-net denying the option for selecting when, where, and how to summarize chains-of-identity and trust in favor of static one-size-fits all requirements puts a large number of transitive identity problems out of reach.