Skip to Content.
Sympa Menu

assurance - Re: [Assurance] Renewing an Expired authentication secret: 4.2.4.3

Subject: Assurance

List archive

Re: [Assurance] Renewing an Expired authentication secret: 4.2.4.3


Chronological Thread 
  • From: David Walker <>
  • To:
  • Subject: Re: [Assurance] Renewing an Expired authentication secret: 4.2.4.3
  • Date: Fri, 11 Jan 2013 10:20:04 -0800

Jeffrey,

The theory is that an expired password cannot be trusted sufficiently to authenticate the subject; it is no longer considered "current."  (Otherwise, why would you have expired it in the first place?)  So, yes, under the Silver profile, 4.2.4.3 requires use of one of the other methods to renew / re-issue a credential with an expired password.

David Walker

On Thu, 2013-01-10 at 15:09 +0000, Capehart,Jeffrey D wrote:
Based on your reading of 4.2.4.3 for credential renewal…

 

I am interpreting that changing your password after it expires (i.e. 90 days) would be considered a “renewal”.

 

According to 4.2.4.3 prior to renewal, subject must prove possession of an unexpired current authentication secret (i.e. password).

 

With that requirement, it would appear that you shouldn’t be able to reset/change your password after it is expired.  However, if your account is not administratively disabled, and it is just your expired password that is denying you access to services (email, network, ERP), would it not be OK to be able to do a self-service change password even after it expired, as long as you know the old password?

 

Where I get hung-up in reading this is the case where the subject CAN prove possession of the current (although expired) Authentication Secret, but the methods #1 and #2 do not apply since the secret CAN be supplied.

 

Is the wording vague or am I reading this incorrectly?

 

4.2.4.3 CREDENTIAL RENEWAL OR RE-ISSUANCE

Appropriate policy and process must be in place to ensure that any new Credential

and/or new Authentication Secret is provided only to the actual Credential Subject

should it be necessary to reissue an Authentication Secret, e.g., due to suspected

compromise or the Subject having forgotten the Secret, or to reissue a Credential due to

expiration. This process must be at least as trustworthy as the process used for initial

issuance of the Credential.

Prior to the IdPO allowing renewal or re-issuance of a Credential, the Subject must

prove possession of an unexpired current Authentication Secretor, if the Subject cannot

supply the current Authentication Secret, one of the following methods may be used:

1. The Subject must supply answers to pre-registered personalized questions designed

to be difficult for any other person to know;

2. A short-lived single use Secret sent to the Address of Record that the Subject must

submit in order to establish a new Authentication Secret.

Replacing a forgotten Authentication Secret can be accomplished at any time using the

above methodology. Authentication Secrets shall not be recovered; new Secrets shall

be issued.

After expiration of the current Credential or Authentication Secret, or if none of the

alternative mechanisms specified above are successful, renewal and re-issuance shall

not be allowed. The Subject must re-establish her or his identity with the IdPO as

defined in Section 4.2 above.

All interactions conducted via a shared network shall occur over a Protected Channel

such as SSL/TLS.

 

 

Jeff Capehart, CISA
IT Audit Manager
University of Florida - Office of Internal Audit
(352) 273-1882


http://oia.ufl.edu

 






Archive powered by MHonArc 2.6.16.

Top of Page