Dick Hardt <[EMAIL PROTECTED]> @ Wed, 25 Jan 2006 00:13:31 -0800 wrote:
> On 24-Jan-06, at 9:23 AM, Tom Doman wrote:
>
> > Yes, Leslie, taking your thought further, it makes me wonder, how
> > does the DIX protocol end up being much different from SAML? Dick,
...
> > but I'd like to have you weigh in
...
> > where
...
> > SAML is lacking or perhaps inappropriate for digital identity
> > information exchange?
> >
NR: I think this is an important question to answer with specifics,
as best as one can in the moment, before we dedicate a lot of
energy and resources -- if we're going for an improvement in
some dimension(s), then it serves us to be clear about it.
>
> Hey Tom
>
> I think the SAML authors did a great job of standardizing a language
> to represent assertions to be moved between systems, and was driven
> by vendors wanting to enable interop with between their enterprise
> solutions.
NR: Um, was driven ^in part^ by such vendors. In this forum, in the
inclusive fashion marking this and other SDO, let's be straight
about this, or be silent. Self-interest has many guises.
[
> I think it is/was difficult from that point of reference
> to think of how to move digital identity around at Internet
> scale, or to scale down the required technological footprint for
]
...
> low risk, low value identity transactions.
NR: Seems a reasonable use case. But not one exclusive of SAML, right?
Possibly also the case, in the least, that relying parties might
be served by being able to easily distinguish among, and even have
granular mechanisms for selecting the 'level' of, the footprint
(and security). Which suggests certain mechanisms as valued in
each of the protocols -- but which might not be strictly
necessary in any of them alone.
> Processing digitally signed XML is much harder then fetching
> an HTML page and working with name/pairs.
NR: This is a non-sequitor to your claim, below. If it's possible in
some future for DIX to handle the 'SAML token', well then you're
suggesting inclusion of precisely this sort of thing within DIX
(the processing digital sigs).
And, OTOH, within the SAML (i.e., v2.0) WebSSO, the "fetching"
(assuming from this para and by the below you mean the transport
part) can be precisely just dealing in straightforward REST.
[
> SAML is pretty heavy to move my name, email address and blog URL.
> It also does not integrate well into existing applications. The ID
> submitted allows an existing form to use DIX with the addition of HTML,
]
...
> and no change to the existing form processing code (assuming the
> required fields are available)
NR: Well, not quite. The minimal change is the required change:
to make the application aware of identity attestations of a
trusted third party.
So far I'm not convinced by your characterization, Dick.
Let's take a "what if".
Let's create a SAMLv2.0 "SAML-LowLow" profile, a sort of reduction
to SAMLv2.0 WebSSO HTTPPost, that removes any signature requirement
(even tho that's token, not necssrly transport), and assumes some
of the party/counterparty status that's assumed in the ID (leaving
any transport-related digest or dsig to the same discussion needed
in dix).
Here's a rough of the "heaviness" of such a speculative profile (of
which obvious parts can appear in htmlforms, and for which I've
ignored the trivial serialization into url form):
Request (by relying party):
@ID of the request
@Version of the protocol
@IssueInstant of the request
Issuer UID
Subject identifier related to the request
Response (by authority):
@ID of the resp
@Version of the protocol
@IssueInstant
@InResponseTo the RequestID
Status for request
Assertion (unsigned in this SAML-LowLow profile):
@ID of the assertion
@Version of the protocol
@IssueInstant
Issuer UID
Subject's ID
Authentication Statement
@AuthnInstant
AuthnContext
NR: Right off this is indeed heavier. But what's the *objective* bar?
Some of the extras are probably unnecessary for the "low risk, low
value" use case, sure. Unfortunately, or not, using SAMLv2 you
can't really shed yourself of those attributes on the base
request and response elements. But these particular 'extras' are
trivial capabilities inherent in any forms generation and
processing engine, right?
Beyond that this "SAML-LowLow" profile could even be lighter,
if thatÂ’s what's required. Such as removing the Authentication
statement ... although I'm at a loss for why that would save
significant resources when doing so would remove some valuable
*optional* capabilities for the requester.
Of course a further simplified version of this could be had by
profiling the Liberty ID-FF1.2 standard.
And, more, this doesn't handle capability discovery. But that's
not DIX's raison d'etre as of yet, right?
...
>
> Summary: The token part of the SAML specs map to a type of
> thing that can be moved around DIX, the protocol part is missing
> chunks
NR: I didn't deal with this, but it would be good to be
more specific here.
> and is not light enough.
>
> -- Dick
>
--Nick
_______________________________________________
dix mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/dix