--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups "ICF-WG-Schemas" group.
To post to this group, send email to icf-wg-...@googlegroups.com
To unsubscribe from this group, send email to icf-wg-schema...@googlegroups.com
For more options, visit this group at http://groups.google.com/group/icf-wg-schemas?hl=en
-~----------~----~----~----~------~----~------~--~---
I am hesitant to make these clams part of the set that normal RP's might use.
## defining normal will be hard :)
These really are for a local client to use with a selector doing something outside the existing information card specification.
## sounds like you’re suggesting that the ICF Schemas WG should only propose claims that are compatible with existing specifications. This is a bad idea because we’ll be right back where we were with folks making up claims in their own private namespaces. I (and IBM) lobbied Kim hard to move the original p-card claims from a Microsoft namespace to the current xmlsoap namespace and Microsoft graciously did so even at the cost of interop problems in the field for a time.
## It is better to be “proactive” about working towards claims interop. The cost of standardizing on some common claims that end up never being used is nearly zero. The cost of not standardizing on some claims that become established is enormous. To give an example, we all knew that the only way to handle the existing 14 p-card claims was to “grandfather them” by calling them “well known claims.” The cost to make them “ICF-defined” claims is a million times the benefit at this point.
I understand the Higgins desire to create an password card standard.
## No, Higgins just wants to make something that leverages i-card infrastructure, UX, etc. and works no worse than the 50 or so password managers out there in the market.
However Higgins is a Open Source project and not a SDO, I am unsure of the IPR generated there. I am certain that you or Marry can answer that question.
## Higgins is not an SDO and this is the very reason that it would RATHER NOT use the eclipse higgins namespace for these claims. [Though I think this is where we’re headed since nobody is voting in favor here]
These claims require some new selector functionality. I would like to see IPR guarantees on that work before the claims become part of the ICF information-card claims.
## Any code developed under the EPL falls under the EPL’s rather mature IPR regime (including patents). It is similar to the Apache 2.0 license if you’re familiar with that.
I would have less of a problem if we had a separate namespace for vendor proposals that may be on a standards trac, but wanted someplace to document themselves.
## I think what you propose here is a good fallback that may be acceptable to many on the Schemas group. This is effectively what we’ve done with the “well known claims” section of the claims catalog. These are claims that the ICF didn’t define, but that are out there in the wild. Having this visibility to them in a central place WILL help interoperability. [I have a feeling this is where we’re going to end up on the un/pw claims]
I think these claims are qualitatively different from the other ones we have discussed.
## True, but they are just claims. And we’re not supposed to be police. We’re not supposed to be passing judgement here.
I will be hard pressed to vote in favor of this.
## Yeah and nobody else has either.
However I want to hear other peoples opinions before I make a final decision on this.
## Me too.
John B.
On 7-Apr-09, at 8:25 PM, Paul Trevithick wrote:
OK some questions
Are these claims for a managed card?
## The proposal [1] doesn’t say, because they can be used for either personal or managed cards (in different ways)
Is the STS required to audience restrict what parties it will return these claims to.
That is return the claim values only to a RP that the STS is configured to know may receive the values.
## Yes, see the “Notes” section here [1]
## [1] https://informationcard.net/wiki/index.php/Claim_Catalog#New_Requests
Infocard adheres to the principle that the user choses what information is sent to the RP. They have the ability to review the identity of the requester and get a display token showing what is being returned.
If the identity of the requester is being hidden in a claim request, and the user is prompted for a generic card that can return multiple values for these claims, are we properly giving the user the information they need?
## Well, that’s a fair question. I’ve been thinking for a few weeks now about another selector enhancement wherein an additional “on behalf of” parameter can be passed along with the request from the RP to the selector for the token. This “OBO” parameter would be displayed in the UI of the selector to give the use a sense of where their claim data was going to be forwarded to by the RP.
If where this is going is password manager functionality built in to the selector, and these claims are for that purpose then I would feel better if we identified them as such.
## I (and Higgins) have been focused on a password manager browser extension [2] talking to an enhanced selector. However Ian Hummel at Azigo and Uppili and others have mentioned of use cases for these same claims being used in RP’s that are web services acting as proxies, and they have run into use cases where these same claims are needed.
## [2] http://wiki.eclipse.org/Password_Cards
Perhaps there should be a class of claims that are for the selectors use only.
## Well, by “selectors” I unpack this to mean what I wrote above (see [2])
As an example:
http://schemas.informationcard.net/@ics/selector/password/2009-03
Then a selector could tell that claim requests coming in from third parties for those claims need to be inspected in some way.
I think username and password are too generic for the intended use.
I really don't want to give people the idea that it is OK to put usernames and passwords in regular m-cards.
So I prefer to qualify the claim URI in some way with passwordcard or selector or internal. If they involve special selector logic to use in the intended way.
## The special antiphishing logic mentioned in note#1 in [1] is: selector’s self-issued STS will have a whitelist that is exactly one entry in length (a short list indeed); the user will explicitly permission some special RP (e.g. the browser password manager) as this one and only whitelisted RP; and the selector will only release un/pw claim values to this RP.
## I don’t understand what additional protection adding the “/selector” string in the claim URI adds. A malicious RP can always add that substring too. I must be missing something in what you’re saying.
I vote +1.
Per the discussion, I’m satisfied with the note about requiring use in a phishing-resistant manner. Also, per the discussion, I can easily imagine lots of different parties using these claims, so I don’t see them as being vendor specific.
I’d rather we approve claims that we may not use than become the “claims police” and thus drive the claims definitions elsewhere and into non-interoperable namespaces.
-- Mike
Two members approved (+1)
No members disapproved (-1)
+1
If the vote is still continuing, +1.
=Drummond
Six members approved (+1) see [2]
No members disapproved (-1)
Per our process [1], this email is to call for a vote on the proposed
username and password claims here [2].
On this list and on our calls we have had discussions related to these pair
of claims. Topics have included:
* How these claims could be requested by Information Card compatible proxy
servers or by form filling “password manager” browser extensions acting as
an RP (from the selector¹s POV)
* How they should be used such that the values returned by selectors are
site/app-dependent and further that the password values are different for
each site or app to encourage the highest security. In some use cases this
requires the RP passing a URL of the un/pw login form to the selector as a
parameter, and there is no general agreement on the best way to do this.
* How selectors and password manager plugins need to exercise special care
to prevent phishing attacks. It isn¹t entirely clear how best to do this as
it usually involves authentication of the password manager to the selector
and the mechanisms for doing this (e.g. The browser plugin having its own
cert, etc.) are not yet clear.
Despite the controversy swirling around the outside, there remains the need
for username and password claims. In recognition of the surrounding
uncertainty, I propose that these two be voted as “provisional”--thus
allowing us to update the descriptive text based on what we learn as we
implement systems that use them. The Higgins project, for example, has a
Password Cards [3] project that needs these claims at the least.
My vote is +1. (We are voting here for username and password
simultaneously).
--Paul
+1 (again)
From: icf-wg-...@googlegroups.com [mailto:icf-wg-...@googlegroups.com] On Behalf Of Ian Hummel
Sent: Monday, May 18, 2009 5:53 AM
To: icf-wg-...@googlegroups.com
+1.
=Drummond
From:
icf-wg-...@googlegroups.com [mailto:icf-wg-...@googlegroups.com] On Behalf Of Paul Trevithick
Sent: Sunday, May 17, 2009 12:25
PM
To: ICF.WG.Schemas
Subject: [ICF.WG.Schemas] CLAIM
VOTE (provisional) username & password
Several days ago I
summarized the (failed) results of the voting on un/pw claims (see [4]). But
since then a number of folks have chimed in an said that they didn’t realize
that the voting period was over and/or hadn’t remembered to vote, etc.
This is a request for the Schemas WG to add the following claims to the Claim Catalog:
http://schemas.informationcard.net/@ics/icam-assurance-level-1/2009-06
http://schemas.informationcard.net/@ics/icam-assurance-level-2/2009-06
http://schemas.informationcard.net/@ics/icam-assurance-level-3/2009-06
Details have been added to the Proposed Claims table at:
http://wiki.informationcard.net/index.php/Claim_Catalog
The purpose is to enable RPs to request security tokens issued according to the requirements of the U.S. federal Identity Credential and Access Management (ICAM) Assurance Levels 1, 2, and 3 by an identity provider certified to do so. Note that the claim itself does not verify that identity provider is certified; verification is a separate step that is out of scope. (One option is for the value of the claim to be a URI that an RP can check for signed metadata verifying that the IdP is certified by a trust framework the RP trusts. Another is for the claim value to be a signed object. There are other options as well, which is why verification is out of our scope.)
=Drummond
Schemas WG Members:
In adding the proposed ICAM assurance level claims, I noted that the last approved claim:
http://schemas.informationcard.net/@ics/resource-udi/2009-3
…does not in fact conform to the ABNF we require – posted at:
http://wiki.informationcard.net/index.php/Claim_URI_Syntax
The problem is the date. The ABNF requires two-digit months. So the above claim URI SHOULD be:
http://schemas.informationcard.net/@ics/resource-udi/2009-03
We either need to amend our ABNF, or revise the resource-udi claim.
Our date format is modelled on the one used by OASIS for its specification dating, and it keeps all dates in a fixed YYYY-MM format. So I would prefer that we just amend the one claim above to conform to the ABNF, and not make that mistake again in the future.
(Note that the username and password proposed claims also have this error, but they have not yet been approved, so they can be fixed. Right now it appears that only resource-udi has this issue. The rest of our claim work was done in late 2008 in months that had two digits, so this was not an issue.)
To make this simple: are there any objections to just revising the resource-udi claim to conform to the ABNF? If no objections are filed in the next week, I will revise it.
=Drummond
From: icf-wg-...@googlegroups.com [mailto:icf-wg-...@googlegroups.com] On Behalf Of Drummond Reed
Sent: Thursday, May 21, 2009 7:21
PM
To:
icf-wg-...@googlegroups.com
Yes we should just fix it.. I know of only one instance where this claim is already in use, and it will be easy to change there.
Markus
On Fri, Jun 12, 2009 at 4:09 AM, Drummond Reed <drummo...@cordance.net> wrote:
Schemas WG Members:
?
In adding the proposed ICAM assurance level claims, I noted that the last approved claim:
?
??????????? <http://groups.google.com/group/icf-wg-schemas/msg/4f0d1350087b4949> http://schemas.informationcard.net/@ics/resource-udi/2009-3
?
…does not in fact conform to the ABNF we require – posted at:
?
??????????? http://wiki.informationcard.net/index.php/Claim_URI_Syntax
?
The problem is the date. The ABNF requires two-digit months. So the above claim URI SHOULD be:
?
??????????? <http://groups.google.com/group/icf-wg-schemas/msg/4f0d1350087b4949> http://schemas.informationcard.net/@ics/resource-udi/2009-03
?
We either need to amend our ABNF, or revise the resource-udi claim.
?
Our date format is modelled on the one used by OASIS for its specification dating, and it keeps all dates in a fixed YYYY-MM format. So I would prefer that we just amend the one claim above to conform to the ABNF, and not make that mistake again in the future.
?
(Note that the username and password proposed claims also have this error, but they have not yet been approved, so they can be fixed. Right now it appears that only resource-udi has this issue. The rest of our claim work was done in late 2008 in months that had two digits, so this was not an issue.)
?
To make this simple: are there any objections to just revising the resource-udi claim to conform to the ABNF? If no objections are filed in the next week, I will revise it.
?
=Drummond
?
?
From: icf-wg-...@googlegroups.com [mailto:icf-wg-...@googlegroups.com] On Behalf Of Drummond Reed
Sent: Thursday, May 21, 2009 7:21 PM
To: icf-wg-...@googlegroups.com
Subject: [ICF.WG.Schemas] Re: CLAIM VOTE (provisional) username & password
?
+1.
?
=Drummond
?
From: icf-wg-...@googlegroups.com [mailto:icf-wg-...@googlegroups.com] On Behalf Of Paul Trevithick
Sent: Sunday, May 17, 2009 12:25 PM
To: ICF.WG.Schemas
Subject: [ICF.WG.Schemas] CLAIM VOTE (provisional) username & password
?
+1
Yes, please fix.
-- Mike
--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups "ICF-WG-Schemas" group.
To post to this group, send email to icf-wg-...@googlegroups.com
To unsubscribe from this group, send email to icf-wg-schema...@googlegroups.com
For more options, visit this group at http://groups.google.com/group/icf-wg-schemas?hl=en
-~----------~----~----~----~------~----~------~--~---
Paul, I’m fine with just fixing it, i.e, changing udi --> udr and 2009-3 --> 2009-03, but with two changes, I’m wondering if for our own process integrity we need to revote.
Your call as chair.
=Drummond
From: icf-wg-...@googlegroups.com
[mailto:icf-wg-...@googlegroups.com] On
Behalf Of Markus Sabadello
Sent: Friday, June 12, 2009 11:48
AM
To: Paul Trevithick
Cc: ICF.WG.Schemas; John Bradley;
Drummond Reed
Subject: [ICF.WG.Schemas] Re:
ISSUE: Claims ABNF not followed
Yes, fine with me.
Markus
Okay, because there appears to be consensus, I’m calling for a vote on the claims below.
I vote +1.
Paul, note that several others (Mike, John, Ian, and yourself) have “pre-voted” +1.
=Drummond
From:
icf-wg-...@googlegroups.com [mailto:icf-wg-...@googlegroups.com] On Behalf Of Paul Trevithick
Sent: Friday, June 12, 2009 7:37
AM
To: ICF.WG.Schemas
Cc: Tebo, Matt (10421); McBride,
Terry (10421)
Subject: [ICF.WG.Schemas] Re:
CLAIM REQUEST - icam-assurance-levels
Agree that we should add
these.
Von: icf-wg-...@googlegroups.com [mailto:icf-wg-...@googlegroups.com] Im Auftrag von Drummond Reed
Gesendet: Samstag, 13. Juni 2009 08:18
An: icf-wg-...@googlegroups.com
Cc: 'Tebo, Matt (10421)'; 'McBride, Terry (10421)'
Betreff: [ICF.WG.Schemas] CLAIM VOTE - icam-assurance-levels
Gesendet: Samstag, 13. Juni 2009 08:15
An: icf-wg-...@googlegroups.com; 'Paul Trevithick'
Cc: 'John Bradley'; 'Drummond Reed'
Betreff: [ICF.WG.Schemas] Re: ISSUE: Claims ABNF not followed
I think Charles was referring to the Claims URI Syntax spec:
http://wiki.informationcard.net/index.php/Claim_URI_Syntax
It already has all portions of the claim syntax structure specified, so we just need to audit the claims that are submitted against this spec from now on.
=Drummond
From: icf-wg-...@googlegroups.com
[mailto:icf-wg-...@googlegroups.com] On
Behalf Of Paul Trevithick
Sent: Monday, June 15, 2009 8:13
AM
To: Charles Andres
Cc: ICF.WG.Schemas
Subject: [ICF.WG.Schemas] Re:
ISSUE: Claims ABNF not followed
Hi Charles,
So, Paul, as chair, is the decision here to “just fix it” (udi --> udr and 2009-3 --> 2009-03), in which case I’ll “just do it”, or do we need a revote?
=Drummond
From: Paul Trevithick
[mailto:ptrev...@gmail.com]
Sent: Friday, June 12, 2009 5:42
AM
To: Markus Sabadello
Cc: ICF.WG.Schemas; John Bradley;
Drummond Reed
“Just fixed.” See https://wiki.informationcard.net/index.php/Claim_Catalog#2009.
BTW, the status of this claim URI is still provisional, so IMHO that makes it even more acceptable to make necessary revisions such as this.