Jiri Kuthan <[EMAIL PROTECTED]> wrote:
> I'm personally missing scenarios which
>
> - use redirection as opposed to proxy mode. IMO, it is beneficial to have
> the AS operated in 3xx mode for better scalability.
Perhaps you could explain a bit more what you mean here because it isn't all
that clear what the differences would be. In poking around thru, say, RFC3665
section "3.6. Session via Redirect and Proxy Servers with SDP in ACK", it
isn't clear to me that there is necessarily a salient difference between it's
scenario and the one depicted in draft-ietf-sip-saml-02 fig 1.
Here's RFC3665 Session via Redirect and Proxy Servers..
Alice Redirect Server Proxy 3 Bob
| | | |
| INVITE F1 | | |
|--------------->| | |
| 302 F2 | | |
|<---------------| | |
| ACK F3 | | |
|--------------->| | |
| INVITE F4 | |
|-------------------------------->| INVITE F5 |
| 100 F6 |--------------->|
|<--------------------------------| 180 F7 |
| 180 F8 |<---------------|
|<--------------------------------| |
| | 200 F9 |
| 200 F10 |<---------------|
|<--------------------------------| |
| ACK F11 | |
|-------------------------------->| ACK F12 |
| |--------------->|
| Both Way RTP Media |
|<================================================>|
| | BYE F13 |
| BYE F14 |<---------------|
|<--------------------------------| |
| 200 F15 | |
|-------------------------------->| 200 F16 |
| |--------------->|
| | |
..and here's -sip-saml-02 fig 1..
+--------+ +--------------+ +--------+
|Alice@ | |Authentication| | Bob@ |
|example | |Service | |example2|
|.com | |@example.com | |.com |
+---+----+ +------+-------+ +---+----+
| | |
| INVITE | |
|---------------------->| |
| From:[EMAIL PROTECTED] | |
| | |
| 407 Proxy auth. req. | |
|<----------------------| |
| Challenge | |
| | |
| ACK | |
|---------------------->| |
| | |
| INVITE w/authn creds | |
|---------------------->| |
| | INVITE |
| | w/Identity header |
| |--------------------->|
| | and Identity-Info |
| | |
| | HTTP GET SAML assn |
| |<==================== |
| | and domain cert |
| | |
| | HTTP 200 OK + assn |
| |=====================>|
| | and domain cert |
| 200 OK | |
|<----------------------+----------------------|
| | |
..so it seems that given the way in which RFC4474 works, either of the Redirect
server or Proxy 3 in the former figure could instigate authn of the user/UAC,
whereupon things would proceed more-or-less as depicted in the latter.
yes/no?
> - use SAML-by-value, in addition to SAML-by-reference. I personally find
> the SAML-by-reference quite non-real-time and harder-to-scale too.
Yes, this is not-yet-well-resolved piece of the architecture. Given present
restrictions wrt SIP intermediaries only being able to add SIP headers to a SIP
request message -- it offhand would have to be the UAC that embeds a SAML
assertion into a SIP request it is originating.
We (SIP WG) should perhaps think about this and whether we think it is a
practical use case that would indeed see some use. Below is one example of such
an approach (there's various ways to approach its details). Is this an approach
we should pursue in addition to the one presently spec'd in -sip-saml-2 ?
> Perhaps there are arguments why proxy+by/reference is the best thing, but
> if that's the case I think they should be mentioned in the document.
Yes, ok. Part of the rationale was that this sort of approach will work with
present-day unmodified UACs, and all of the workable
"include-SAML-assertion-by-value" approaches that we could think of involved
UAC enhancements to support the new funtionality (this of course skirts the
controversial sip-proxy-placing-BLOB-values-in-SIP-header approach, e.g. using
a data: URL).
So we felt that specifying the draft narrowly, and focusing on enhancements to
proxy-tier functionality was the way to go for now.
thoughts? HTH,
=JeffH
-------
Fig 4: "caller-driven, authn+attr, SAML Assertion embedded in INVITE"
Caller explicitly executes <samlp:AuthnRequest> protocol, i.e.
"caller-driven" in that caller stipulates at least some of info
that is to be embodied in resulting assertion.
Caller places SAML Assertion in INVITE msg body; Assertion has an
<saml:AuthnStatement> and optionally a <saml:AttributeStatement>.
Callee obtains SAML Assertion directly from INVITE message.
protocol message count (only include msgs w/CSeq=N+1):
Caller-to-AS: 3
AS-to-callee: 1
Protocols employed: SIP and SAML (via HTTP/SOAP)
NOTE: The interaction between caller and the AS is
in the style of the "SAML Token Service", which is
specified in draft form in section
"3.3 SAML Token Service Profile" of [9].
Caller and AS must speak at least one flavor of SAML protocol.
Relying party needs only to be capable of understanding
SAML assertion. Does not need to employ any SAML protocols.
[9] SAML 2.0 Single Sign-On with Constrained Delegation
(and SAML Token Service Proposal (Shib design note))
http://shibboleth.internet2.edu/docs/draft-cantor-saml-sso-delegation-01.pdf
Callee's UA or
Caller's Domain's Callee's Domain's
Caller AS & SIP Proxy SIP Proxy
+--------+ +--------------+ +--------+
|Alice@ | |Authentication| | Bob@ |
|example | |Service | |example2|
|.com | |@example.com | |com |
| | | (AS) | | |
+---+----+ +------+-------+ +---+----+
- - | | |
^ ^ | INVITE | |
| | |---------------------->| |
| | From:[EMAIL PROTECTED] | |
| C | To:sip:[EMAIL PROTECTED]| |
| S | | |
| e | 407 Proxy auth. req. | |
| q |<----------------------| |
| | Challenge | |
| = | | |
| | | |
| N | | |
| | | |
| | | ACK | |
| V |---------------------->| |
| - | | |
| | | |
| | [Alice marshalls | |
| | authn credentials | |
| | in resp to challenge]| |
| | | |
| | | |
| - |Request Authn+Attr Assn| |
| ^ |via Authn Request Prot | |
| . |======================>| |
| . | <samlp:AuthnRequest> | |
| . | <samlpext:RespondTo> | |
| . | [EMAIL PROTECTED] | [AS is configured |
| . | | OOB to "know" which |
| . | Assn returned | "profile attributes"|
| . |<======================| to return in Assns. |
| . | <samlp:Response> | Relying party meta- |
| . | <saml:Assertion> | data could be also |
| . | <saml:Subject> | employed. Or SAML |
| . | <saml:NameID> | request protocol |
| . | [EMAIL PROTECTED]| extension could be |
| . | <saml:AuthnStatement> used.] |
| . | <saml:AttrStatement>| |
| . | foo=bar | |
| . | | |
. | | |
D . | | |
. | INVITE + authorization| |
I | | header w/marshalled creds |
| |---------------------->| |
A | | From:[EMAIL PROTECTED] | |
| | To:sip:[EMAIL PROTECTED]| |
L | | <saml:Assertion> | |
| | <saml:Subject> | |
O | | <saml:NameID> | |
| | [EMAIL PROTECTED]| |
G | | <saml:AuthnStatement> |
| | <saml:AttrStatement>| |
| | | foo=bar | |
| | | | |
| | | | |
| | | | |
| | |INVITE + authorization|
| C | |header w/marshalled creds
| S | |--------------------->|
| e | | From:[EMAIL PROTECTED] | [this would
| q | | To:sip:[EMAIL PROTECTED] thus convey an
| | | <saml:Assertion> | "unsolicited
| = | | <saml:Subject> | response" as
| | <saml:NameID> | discussed in
| | [EMAIL PROTECTED] [5] & [3]. ]
| | <saml:AuthnStatement>
| | | <saml:AttrStatement>
| N | | foo=bar |
| | | |
| + | | |
| | | |
| 1 | | |
| | | |
| | | | |
| | | 200 OK | |
. V |<----------------------+----------------------|
. - | | |
.
.
V
-------
end
_______________________________________________
Sip mailing list https://www1.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip