Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Abstract

This document is a product of the FI Work Group, but strongly related to the IAWG as well. It defines the constellations and use cases of Identity Federations to have a good understanding of the system under discussion when refining the scope.

Status and open issues

This document is currently under active development. Its latest version can always be found here. See the GI:Change History at the end of this document for its revision number.

  1. Incomplete constellations: C21, C22, C30, C70, C90, C100
  2. Discussion, if abuse-cases (C99) add value in this context, or should be moved elsewhere.
  3. Align UMA Scenarios and Use Cases
Editors

Rainer Hörbe

Intellectual Property Notice

The FI Work Group operates under Creative Commons Share-Alike Attribution IPR Option and the publication of this document is governed by the policies outlined in this option.

...

Table of Contents
maxLevel3
minLevel1
outlinetrue
indent20px

...

Introduction

Excerpt
hiddentrue

Change the status keyword in each scenario and use case title as appropriate, linking to the meeting minutes page explaining the status change:

  • Pending: Initial status when first submitted
  • Accepted: Needs to be accounted for in UMA V1 and/or its associated compliant implementations
  • Deferred: Relevant to the problem space; may be considered in future versions
  • Rejected: Out of scope
    Edit the descriptions of technical issues and scope questions to reflect (or point to) group decisions about how to handle them.

...

  1. Completeness of trust model: Trust establishment, subject life cycle management
  2. Actor centricity: Depending on the background, users, service providers or network operators might shape the constellation.
  3. Jurisdictional structure:
    • Intra-organizational (single policy authority, centralized enforcement)
    • Cross-organizational (single policy authority, negotiated between autonomous actors)
    • Federation (shared or external policy authority)
    • Cross-border (across multiple national legislations)
    • Grid/cloud: is it a different structure?
  4. AA (Attribute Authority) different from IdP
  5. Organizational context: Enterprise user vs. consumer/natural person
  6. Subject class: human user vs. device/service
  7. Trust type: peer to peer, hierarchy/trust anchor, reputation based.
  8. Type of communication payload: document-centric vs. session-centric (or both in case of messaging)
  9. Restriction to electronic communication vs. physical access
  10. Off-line mapping of EAA policies vs. automated policy negotiation in real-time
  11. Relation of verifier to other actors

...

Anchor
trustrel
trustrel
Trust Relationships in Federated Identity Management (Pending)

A common interpretation of trust in an identity federation is that a RP trusts the IdP to provide entity authentication at an expected assurance level. However, this view is provider-centric and incomplete, as there are several trust relationships involved:

...

The second and third column show how unidirectional trust relationships are defined in between actors. Not all of these trust relationships are usually associated with the term Identity Management, but are required to fulfill the complete set of security and privacy requirements by all actors.

...

Constellations

Anchor
C01
C01
Constellation C01: Delegated Authentication (Pending)

This view primarily shows the separation of identity services from the RP’s service.

Prerequisite
  • Subject is subscribed to IdP service
  • RP delegated subject authentication (including registration) to IdP

Description
  • A subject is requesting access to a resource owned by RP
  • RP is delegating authentication to IdP
  • IdP will require authentication from subject, or use a valid previously authenticated session
  • IdP will assert the authentication event, and possibly include subject attributes for the RP
  • IdP will deliver the assertion to the RP
  • RP will grant subject access to the requested resource
Trust Relationships

Even though this constellation has a minimalistic view on identity management, most trust relationships can be shown:

  • TR-1-EntityAuthN
  • TR-2-IdPAvailibility
  • TR-3-3rdPartyDP
  • TR-4-UserSec
  • TR-5-PII@IdP-Prot
  • TR-6-IDM-PII@RP
  • TR-7-Service-DP@RP
  • TR-8-RP-Maleware
Actors

IdP (Identity Provider), RP (Relying Party), Subject
Any one of these actors can be primary actor.

...

Anchor
C10
C10
Constellation C10: Delegated Identity Management (Pending)

Extends and completes Constellation C01

This constellation is more complete as it includes the registration of the subject to the IdP and the establishment of trust by the RP.

Actors

Inherited: IdP, RP, Subject
Subscriber, Registration Officer

...

Anchor
C20
C20
Constellation C20: Service Provider Centric model (Pending)

Extends Constellation C01, shows aspect of actor centricity

...

This view works well for the case when enterprise work on data owned by third parties and end user privacy is of little concern, like in typical B2B and G2G constellations.

Actors

RP (primary actor), IdP, subject

...

Anchor
C21
C21
Constellation C21: User Centric model (to be completed)

Extends Constellation C01, shows aspect of actor centricity

...

The desired result is, that users can control and enforce various privacy and security policies governing the exchange of identity information and PII person-to self-type applications.

Actors

Subject (primary actor), IdP, RP

...

Anchor
C22
C22
Constellation C22: Network-centric RP (to be completed)

Extends Constellation C01, shows aspect of actor centricity

...

  • TR-1-EntityAuthN and
  • TR-2-IdPAvailibility
Actors

Inherited: IdP, RP, Subject

...

Anchor
C22
C22
Constellation C23: IDP+SP-centric Federation Platform (to be completed)

Extends Constellation C01, shows aspect of IDP centricity

...

  • TR-1-EntityAuthN and
  • TR-2-IdPAvailibility
Actors

Inherited: IdP, RP, Subject

...

Anchor
C30
C30
Constellation C30: Intra-organizational IDM, loosely coupled units (to be completed)

Extends Constellation C01, shows jurisdictional structure aspect

...

This constellation blends the S32 Federation S31 Ruling Party constellations.

...

Anchor
C31
C31
Constellation C31: Ruling Party IDM (pending)

Extends Constellation C01, shows jurisdictional structure aspect

...

Actors:
Service Provider (acting both as IdP and RP) is primary actor; Subject
Secondary RPs (with less important services) may join, but are subject to the governance of the primary RP.

...

Anchor
C32
C32
Constellation C32: Identity Federation (Pending)

Extends Constellation C10, shows aspect of jurisdictional structure

...

  1. Identity life cycle management (attribute updates, credential revocations)
  2. Trust management (policy implementation, maintenance and enforcement)
Trust Relationships

As this federation makes the concepts of trust anchor, meta data and audit explicit, additional trust relationships are introduced:

  • TR-9-RP2FO
  • TR-10-IdP2FO

Actors

Inherited: IdP, RP, Subject, Subscriber, Registration Officer
Auditor, FO (Federation Operator), PMA (Policy Management Authority)

...

Anchor
C33
C33
Constellation C33: Cross Border Identity Federation (pending)

Extends Constellation C32, shows aspect of jurisdictional structure

...

Sample case: the epSOS project, which provides health care professionals access to patient summaries and prescriptions across borders of European countries. The core system consists of a set of national gateways forming a circle of trust. At the point of care a query is sent to the national gateway, which brokers trust to the gateway of the country the patient is affiliated with.
above: picture from the epSOS architecture document D3.3.2 Abbreviations use: PoC: Point of Care; NCP: National Contact Point (gateway)
Trust replationships are the same as in C32 if no trust broker is used.

...

Anchor
C35
C35
Constellation C35: 4-Corner Model (pending)

Extends Constellation C32. Federation contracts are between the IdP and Service Broker. Users contract with the IdP, and Relying Parties with the Service Broker.

...

Anchor
C40
C40
Constellation C40: Attribute Provider separate from IdP (pending)

Extends Constellation C01, shows aspect where AA is different from IdP

...

RP might need a trust relationship that is a subset of type TR-1. However, it is quite likely that contracts between RP and AA are different from those between RP and IdP, because if the AA is the only source of authority, there is no lever for the RP to require more than best effort. E.g. national law in most countries regulates the qualification of a medical doctor, so the attribute “ophthalmologist” can only be provided by the organization defined by law. Hence trust is based on the fact that the AA operates with due diligence and could be sued in case of a negligence, but there is no legal basis to require audits or other safeguards to prevent damages beyond unsolicitous agreements.

Image Modified
Actors

Inherited: IdP, RP, Subject
AA (Attribute Authority)

...

Anchor
C41
C41
Constellation C41: Attribute Provider with RP

Extends Constellation C40, shows specific variant of C40, without introducing new actors.

...

This constellation is implemented in Canada to conform with Canadas privacy law.

...

Anchor
C50
C50
Constellation C50: Enterprise user (pending)

Extends Constellation C01

Description

Primary Stakeholders in this constellation are the RP and UHO (User Home Organization, like an enterprise). The key difference to Constellation C20 (Service Provider Centric model) is that the subject is part of an organization with multiple roles. The legal counterpart to the RP is the UHO.
Identity management in the pure sense of authenticating a named subject may be delegated to an external entity, such as a CA, or can be part of the UHO.
Policy management in the sense that roles or more complex policies are assigned to subjects is best executed within the UHO, because it has the responsibility and knowledge to do this.

...

Trust Relationship TR-3-3rdPartyDP is extended to cover the trust in policy management by the UHO.

Actors

Inherited: IdP, RP, Subject
UHO (User Home Organization), Subscriber, Policy Manager, Policy Decision Point, Registration Officer

...

Anchor
C60
C60
Constellation C60: Subject Types (pending)

Extends C10 shows aspect of subject type

There are no new trust relationships. However, specific rules need to address the security challenges of autonomous devices, such as management of key material.

Actors

Inherited: IdP, RP, Subject, Subscriber;
Human subject, device/service

...

Anchor
C70
C70
Constellation C70: Reputation-based Trust (t.b.d.)

Extends C32, shows aspect of trust type

The standard model is hierarchical trust. It requires some root authority, like a body issuing a self-signed trusted certificate. In most cases there are hidden or unspecified root authorities, like browser vendors with their pre-installed root certificates, or operating system vendors with preinstalled DNS root zone files.
Reputations-based systems have a process that will compute trust based on behavior of claimants and rating of members. This is not necessarily limited to humans, but could be used for IdPs and other roles in federation as well.

Actors

...

Anchor
C80
C80
Constellation C80: Document-centric Transaction (pending)

Extends C01, showing aspect of payload type

...

No additional trust relationships need to be added to the basic constellation.

Actors

Inherited: IdP, RP, Subject

...

Anchor
C90
C90
Constellation C90: Physical Access (tbd)

Extends UC01, shows aspect of access type

...

  • Physical access is usually in the scope of a single enterprise, and
  • Physical access might need a combination of electronic authentication and local supervision or check.

...

Anchor
C100
C100
Constellation C100: Inter-Federation requiring automated policy negotiation (t.b.d.)

Extends C32, shows aspect of method of policy mapping

Actors

Inherited: IdP, RP, Subject

...

Anchor
C110
C110
Constellation C110: Verifier with Relying Party (pending)

Extends C01, shows aspect of method of policy mapping

...

TR-11-RP2Ver is now explicit, but it would have been there in C02 already, if the role of the verifier would have been shown. It is always the RP who finally trusts the Verifier. If the Verifier is part of the IdP, it is a brokered trust with the IdP as intermediary.

Actors

Inherited: IdP, RP, Subject
Verifier

...

Anchor
C99
C99
Constellation 99: Abuse Cases (pending)

Not sure if this document is a good place for this constellation. It shows typical attacks on trust relationships.

Extends Constellation C32

Actors

(Inherited) + Internal and external attackers

TO DO

Compare this document with OASIS Identity in the Cloud Use Cases.

Extend with PKI-Federation use cases.

Abbreviations

Key

Description

AA

Attribute authority

B2B

Business to business

CA

Certificate authority

DNS

Domain name service

EAA

Entity authentication assurance

FO

Federation operator

G2G

Government to government

IAF

Identity assurance framework

IDM

Identity management

IdP

Identity provider

PII

Personal identifiable information

PMA

Policy management authority

RP

Relying party

UHO

User home organization

...