ad-assurance - RE: [AD-Assurance] Interpretation of IAP requirements for AAC verification
Subject: Meeting the InCommon Assurance profile criteria using Active Directory
List archive
- From: Eric Goodman <>
- To: "" <>
- Subject: RE: [AD-Assurance] Interpretation of IAP requirements for AAC verification
- Date: Fri, 6 Sep 2013 17:34:22 +0000
- Accept-language: en-US
Typo noted: Interpretation of IAP
Section 4.2.5.2 Resist Eavesdropper Attack
Because this section refers specifically to traffic between the Subject and the Verifier (not just the IDP), this section would apply to all authentication traffic
The correction is noted here, and I’m fixing it on the web page. Incomplete data noted: Interpretation of IAP
Section 4.2.8.2.1 - Network Security
"Network communications supporting IdMS operations" is interpreted to mean communications between the actual software elements of the IDMS operation or administrative traffic to the IDMS. The italic section was added on the website right at the end of the call, and probably just after David made this copy. --- Eric From: [mailto:]
On Behalf Of David Walker Ann, Interpretation of IAP Section 4.2.3.4 - Stored Authentication Secrets
These requirements apply when AD DS is used as the IDP's Verifier. Interpretation of IAP Section 4.2.3.6.1 - Strong Protection of Authentication Secrets (subsection .1)
This requirement applies when IDP Verifier passwords are provisioned into an AD DS store, whether or not the AD DS store being provisioned to is the actual IDP Verifier. Interpretation of IAP Section 4.2.3.6.2 - Strong Protection of Authentication Secrets
Authentication Secrets[1] in the context of this requirement is interpreted to mean those secrets (passwords, Kerberos session keys, NTLM challenge responses, etc.) that can be used to directly authenticate to
the IDP, to modify authentication credentials (i.e., can be submitted directly to a change my password page) or to practically[2] determine a user’s password. Interpretation of IAP Section 4.2.5.1 Resist Replay Attack
This section applies only to communication between the Subject and the IDP itself. Interpretation of IAP Section 4.2.5.2 Resist Eavesdropper Attack
Because this section refers specifically to traffic between the Subject and the Verifier (not just the IDP), this section would apply to all authentication traffic between to the AD DS, not just Subject to IDP
authentication. Any eavesdropper who records all the messages passing between a Subject and a Verifier or relying party must find that it is
impractical to learn the Authentication Secret or to otherwise obtain information that would allow the eavesdropper to impersonate the Subject
Interpretation of IAP Section 4.2.8.2.1 - Network Security
"Network communications supporting IdMS operations" is interpreted to mean communications between the actual software elements of the IDMS operation or administrative traffic to the IDMS. |
- [AD-Assurance] Interpretation of IAP requirements for AAC verification, David Walker, 09/06/2013
- RE: [AD-Assurance] Interpretation of IAP requirements for AAC verification, Eric Goodman, 09/06/2013
- Re: [AD-Assurance] Interpretation of IAP requirements for AAC verification, Ann West, 09/08/2013
- RE: [AD-Assurance] Interpretation of IAP requirements for AAC verification, Eric Goodman, 09/06/2013
Archive powered by MHonArc 2.6.16.