At 2:40 PM -0800 2/8/12, Bill Frantz wrote:
On 2/7/12 at 11:55, k...@bbn.com (Stephen Kent) wrote:

Keys are not really great identifiers; they change,

Keys don't change. People or programs may wish to change the keys they are using, but keys themselves are constant.

Touche! You're right, but since people do change keys, and using an
old key to represent a user would be confusing at best, I thought that I could get away with the shortcut statement.

they are not human meaningful (and thus there has to be another layer of mapping between key and human-readable IDs, which creates more vulnerabilities), etc.

It the key represents an authorization, it may not need to be human meaningful.

Authorization is managed by people; keys are not meaningful to people.
So, to use keys to represent authorization, one has to add a layer of mapping, which creates more opportunities for errors. Hence, not a great idea.

We get a lot of comments wanting to achieve some level of assurance about identification. For most uses, we are more interested in authorization than in identification. (If we need identification for auditing purposes, it can be included in the the authorization. For example:

 Authorization to deposit to account 123456 as Joe User.

I agree that authorization is the primary motivation for identification,
but, since people manage authorization, we generally want to bind keys to IDs. When IDs are not central to authorization, certs with random names can be used, e.g., see RFCs 6480 & 6487.

Steve
_______________________________________________
therightkey mailing list
therightkey@ietf.org
https://www.ietf.org/mailman/listinfo/therightkey

Reply via email to