UMA telecon 2011-06-23

Date and Time

Agenda

Attendees

As of 2 Jun 2011 (pre-mtg), quorum is 6 of 11.

  1. Mohammad, Alam
  2. Catalano, Domenico
  3. D'Agostino, Salvatore
  4. Fletcher, George
  5. Hardjono, Thomas
  6. Machulak, Maciej
  7. Maler, Eve
  8. Moren, Lukasz
  9. Morrow, Susan
  10. Wolniak, Maciej

Non-voting:

Regrets:

Minutes

New AI summary

Roll call

Quorum was reached.

Approve minutes of 2011-06-16 meeting

Minutes of 2011-06-16 meeting were APPROVED.

Action item review

Sal and Eve are planning to create a few slides he can present at next week's NSTIC workshop. He and Mark Lizar got the idea to ensure UMA gets some appropriate attention there. There's also a new Kantara NSTIC Discussion Group that has started. Its first call is tomorrow.

Schedule gut check

Let's meet next Monday, June 27, at 9am PT. Eve will ask Anna to set up a calendar entry and advertise the meeting to our list.

Susan is working on a social media-enabled PR/marketing plan for our activities over the next month. She'll work on this with Dervla, including a press release.

Discuss discovery and hData implications for UMA ('pad)

John comments that the Simple Web Discovery protocol gives simple, unconstrained access to a discovery service; probably this wouldn't be suitable for hData. OpenID Connect gets more sophisticated, helping to give back a claim to a deserving requester by giving an access token to get into that service. Would an hData "Discovery and Authorization Service" (DAS) want to be OpenID Connect-enabled in order to get the extra layer of permission that it offers? We had sketched a potential scenario for applying UMA to hData where both potential requesters could approach the DAS to get the locations of health data, and also potential hosts could approach the DAS to try and put their own metadata into the DAS. In that latter case, it's more like an "introduction service".

We discuss the issues raised during the earlier ad hoc call. Thomas comments on every issue and discusses what has been already addressed and has changed within the specification:

-> DONE. Paragraph fixed and pointer added to UMA use-cases doc.

-----------------

-> DONE. Eve's diagram added.

-----------------

-----------------

Terminology:

-> DONE. Added some brief text to explain.

-> DONE. New subsection 1.3 on "End point Names"

1.3. End-Point Names

Host Registration Endpoint
This is the end-point at the AM to which the host register resources which the AM needs to protect.

Protected Resource Endpoint
This is the end-point at the host to which a requester accesses resources.

Token Validation Endpoint
This is the end-point at the AM to which the host submits tokens to be validated by the AM.

Scope Registration Endpoint
This is the end-point at the AM to which the host registers scopes pertaining to resources under the hosts's protection.

Authorization Endpoint
This is the end-point at the AM to which the requester submits requests for authorization tokens.

-----------------

Getting Authorization and Accessing a Resource section (currently 2):

-----------------

Requester's request is ambiguous section (currently 2.1.1):

-----------------

Requester-AM: Requester Obtains Access Token section (currently 2.2):

-----------------

Host-AM: Validate Requester's Presented Access Token section (currently 2.3):

Also we discuss the necessity to include the resource set within the validation. This is because otherwise the reply from the AM may contain too much information not necessary for the host to make the access control decision. This is the performance issue, not a security issue. We decide that the Host may send this new parameter optionally. If this parameter is within the request then the AM will reply only with the set of actions that are valid for this particular resource set.

-----------------

-> DONE. term "validation" used throughout.

-----------------

----------------
AM returns a token valid response section (currently 2.3.2):

Host-AM: Register a Requested Scope section (currently 2.4):

Requester-AM: Request Authorization for Scoped Access section (currently 2.5):

----------------------

Next Meetings