assurance - Re: [Assurance] Information Security Guide to InCommon IAP Cross Reference
Subject: Assurance
List archive
- From: Renee Shuey <>
- To: "" <>
- Cc: "" <>
- Subject: Re: [Assurance] Information Security Guide to InCommon IAP Cross Reference
- Date: Wed, 18 Jul 2012 17:56:04 -0400 (EDT)
I would caution you from heading down the path of becoming prescriptive. We
worked very hard to remove such requirements recognizing the diversity of our
environments.
Renee
Sent from my iPad
On Jul 18, 2012, at 4:39 PM, "Roy, Nicholas S"
<>
wrote:
>> I continue to be surprised/concerned that this is not explicitly addressed
>> in the Identity Assurance Profile.
>
> Now that you mention it, yeah, that does seem like a pretty big omission.
> Maybe that's assumed to be part of secure IdPO operations, but it seems
> like it's worth explicitly calling out. I don't know about use of keys in
> the other FICAM profiles, but at least for the SAML2 profile, I'd think
> this should be explicitly called out.
>
> Nick
>
> -----Original Message-----
> From:
>
>
> [mailto:]
> On Behalf Of Tom Scavo
> Sent: Wednesday, July 18, 2012 2:19 PM
> To:
>
> Subject: Re: [Assurance] Information Security Guide to InCommon IAP Cross
> Reference
>
>
>
>> I don't see anything that would apply to protecting private keys held
>> by the IdP.
>
> Thanks for checking.
>
>> Are you specifically thinking about the keys associated
>> with exchanging information with the IdP, or do you mean something
>> like key escrow for private keys associated with personal
>> certificates?
>
> The former. Proper handling of the IdP's private signing key
> (https://spaces.internet2.edu/x/E43NAQ) is critically important in a
> federated scenario. I continue to be surprised/concerned that this is not
> explicitly addressed in the Identity Assurance Profile.
>
> Tom
- [Assurance] Information Security Guide to InCommon IAP Cross Reference, Dunker, Mary, 07/18/2012
- Re: [Assurance] Information Security Guide to InCommon IAP Cross Reference, Tom Scavo, 07/18/2012
- RE: [Assurance] Information Security Guide to InCommon IAP Cross Reference, Dunker, Mary, 07/18/2012
- Re: [Assurance] Information Security Guide to InCommon IAP Cross Reference, Tom Scavo, 07/18/2012
- RE: [Assurance] Information Security Guide to InCommon IAP Cross Reference, Dunker, Mary, 07/18/2012
- RE: [Assurance] Information Security Guide to InCommon IAP Cross Reference, Roy, Nicholas S, 07/18/2012
- Re: [Assurance] Information Security Guide to InCommon IAP Cross Reference, Renee Shuey, 07/18/2012
- RE: [Assurance] Information Security Guide to InCommon IAP Cross Reference, Roy, Nicholas S, 07/20/2012
- Re: [Assurance] Information Security Guide to InCommon IAP Cross Reference, Tom Scavo, 07/20/2012
- Re: [Assurance] Information Security Guide to InCommon IAP Cross Reference, Cantor, Scott, 07/20/2012
- Re: [Assurance] Information Security Guide to InCommon IAP Cross Reference, Ian Young, 07/20/2012
- Re: [Assurance] Information Security Guide to InCommon IAP Cross Reference, Cantor, Scott, 07/20/2012
- Re: [Assurance] Information Security Guide to InCommon IAP Cross Reference, Tom Scavo, 07/22/2012
- Re: [Assurance] Information Security Guide to InCommon IAP Cross Reference, Cantor, Scott, 07/23/2012
- RE: [Assurance] Information Security Guide to InCommon IAP Cross Reference, Roy, Nicholas S, 07/20/2012
- Re: [Assurance] Information Security Guide to InCommon IAP Cross Reference, Renee Shuey, 07/18/2012
- Re: [Assurance] Information Security Guide to InCommon IAP Cross Reference, Tom Scavo, 07/18/2012
- RE: [Assurance] Information Security Guide to InCommon IAP Cross Reference, Dunker, Mary, 07/18/2012
- Re: [Assurance] Information Security Guide to InCommon IAP Cross Reference, Tom Scavo, 07/18/2012
Archive powered by MHonArc 2.6.16.