Here is the rationale for my answer

1. the user types in the name of the remote realm to the RP
2. the RP trusts the trust router to set up the DH keys with some remote entity that purports to answer for this realm 3. This remote entity authenticates the user and sends the answer to the RP along with unsigned SAML assertions about the same user in a Radius response 4. Since the SAML assertions are unsigned the RP has no PKI to rely on. It only has the trust router. Consequently it is the responsibility of the trust router (admin) to check that this remote entity:
a) is the correct one to answer requests for this realm
b) does authenticate it users correctly
c) does issue correct SAML assertions for its users, regardless of the IDP name that accompanies the assertion

This implies that the trust router (admin) should publish the IDP name that is used by the realm when issuing its SAML assertions i.e. the trust router publishes realm name to IDP name mappings. An RP can then use this information to compare the names in SAML metadate.

regards

David

On 10/11/2013 22:17, Leif Johansson wrote:
On 11/10/2013 10:55 PM, David Chadwick wrote:
In a PKI this is the responsibility of the CA. In the case of ABFAB,
its the responsibility of the trust router.
The latter statement doesn't make sense. There is no trust router when
you use SAML metadata to manage trust in abfab which is what this
discussion is about.

_______________________________________________
abfab mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/abfab

Reply via email to