lists3.sunet.se
  • Sign In
  • Sign Up
  • Sign In
  • Sign Up
  • Manage this list

Keyboard Shortcuts

Thread View

  • j: Next unread message
  • k: Previous unread message
  • j a: Jump to all threads
  • j l: Jump to MailingList overview

2025

  • May
  • April
  • March
  • February
  • January

2024

  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January

2023

  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January

2022

  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January

2021

  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January

2020

  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January

2019

  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January

2018

  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January

2017

  • December
  • November
  • October
  • September
  • August
  • July
  • June

List overview

Download

thread

None

None
1 Jun 2022 1 Jun '22
12:31 p.m.
Thanks! Heather ---------- Forwarded message ---------- From: Mario Loffredo <mario.loffredo at iit.cnr.it> Date: Nov 8, 2021, 12:59 PM -0800 To: Hollenbeck, Scott <shollenbeck=40verisign.com at dmarc.ietf.org>, regext at ietf.org <regext at ietf.org> Subject: Re: [regext] I-D Action: draft-ietf-regext-rdap-openid-08.txt
...
Hi folks, I think the first point we need to discuss is if we should introduce two conformance tags for this extension: - "rdap_openidc_level_0" used by RDAP servers to signal that they implement SSO through the OIDC services provided by a local OP - "rdap_federation_level_0" used by RDAP servers to signal that they implement SSO through the OIDC services provided by a set of trusted external OPs To start a SSO session with a server that is rdap_openidc_level_0 conformant, an end user operating through a web browser: - sends a query to /tokens endpoint of the RDAP server without the id parameter - is authenticated by the local OP (i.e. by filling out the login form) - receives the access_token and uses it as either bearer or query parameter for submitting requests towards standard endpoints of the RDAP server - requests for token refreshment and revoking without including the id parameter In this scenario, the id parameter is ignored. To start a SSO session with a server that is rdap_federation_level_0 conformant, an end user operating through a web browser: - sends a query to /tokens endpoint of the RDAP server including the id parameter - is authenticated by the OP discovered through the OpenID Discovering process (i.e. by filling out the login form) - receives the access_token and uses it as either bearer or query parameter for submitting requests towards standard endpoints of the RDAP server - requests for token refreshment and revoking including the id parameter In this scenario, the id parameter is required. Some futher considerations support my proposal of splitting the conformance in two: 1) AFAIK, the available OPs provide built-in OIDC features supporting the implementation of the Authorization Code Flow. But this doesn't apply for the features required to implement federation such as OP discovery and dynamic client registration. Therefore, while SSO could be implemented without knowing OIDC in depth, RDAP developers on server side should tackle the implementation of a federation at a lower level. 2) Joining a federation doesn't only imply the implementation of such additional OIDC features but also an agreement between all the parties involved as it is described in https://openid.net/specs/openid-connect-federation-1_0.html <https://openid.net/specs/openid-connect-federation-1_0.html>. For this reason, it seems to me that a federation represents a layer upon the implementaion of OIDC to support authentication and SSO. 3) Currently, some OPs provide support external authentication through other mechanisms (e.g identity brokering, social login). Briefly, instead of discovering the OP from a user identifier, the user is directly requested to select in a list of trusted OPs the one which will be in charge of the authentication. Hope it could be helpful to move the discussion forward. Best, Mario Il 08/11/2021 13:54, Hollenbeck, Scott ha scritto:
-----Original Message----- From: I-D-Announce <i-d-announce-bounces at ietf.org> On Behalf Of internet-drafts at ietf.org Sent: Monday, November 8, 2021 7:45 AM To: i-d-announce at ietf.org Cc: regext at ietf.org Subject: [EXTERNAL] I-D Action: draft-ietf-regext-rdap-openid-08.txt Caution: This email originated from outside the organization. Do not click links or open attachments unless you recognize the sender and know the content is safe. A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Registration Protocols Extensions WG of the IETF. Title : Federated Authentication for the Registration Data Access Protocol (RDAP) using OpenID Connect Author : Scott Hollenbeck Filename : draft-ietf-regext-rdap-openid-08.txt Pages : 25 Date : 2021-11-08 Abstract: The Registration Data Access Protocol (RDAP) provides "RESTful" web services to retrieve registration metadata from domain name and regional internet registries. RDAP allows a server to make access control decisions based on client identity, and as such it includes support for client identification features provided by the Hypertext Transfer Protocol (HTTP). Identification methods that require clients to obtain and manage credentials from every RDAP server operator present management challenges for both clients and servers, whereas a federated authentication system would make it easier to operate and use RDAP without the need to maintain server-specific client credentials. This document describes a federated authentication system for RDAP based on OpenID Connect.
[SAH] Folks, this update includes some significant changes that were designed to align the specification more closely with both OpenID Connect and the web services architecture. For example, the ID of the query requestor can now be sent to the server in an HTTP authorization header OR a query parameter. The token management bits were also changed to include a refresh token in the /tokens response. Thanks to Mario Loffredo for the suggestions included in this update. Mario had some other suggestions that I haven't yet implemented. I encouraged him to share them with the list so we could have a broader discussion. Mario, please start that discussion at your convenience. Direct link to diff: https://www.ietf.org/rfcdiff?url2=draft-ietf-regext-rdap-openid-08 Scott _______________________________________________ regext mailing list regext at ietf.org https://www.ietf.org/mailman/listinfo/regext
-- Dr. Mario Loffredo Technological Unit “Digital Innovation” Institute of Informatics and Telematics (IIT) National Research Council (CNR) via G. Moruzzi 1, I-56124 PISA, Italy Phone: +39.0503153497 Web: http://www.iit.cnr.it/mario.loffredo _______________________________________________ regext mailing list regext at ietf.org https://www.ietf.org/mailman/listinfo/regext
0 0
Reply

Back to the thread

Back to the list

Powered by HyperKitty version 1.3.2.