assurance - Re: [Assurance] Monthly Assurance Call Focusing on Password Reset Topic: Wed. April 1, 2015 at noon ET, 0129048#
Subject: Assurance
List archive
Re: [Assurance] Monthly Assurance Call Focusing on Password Reset Topic: Wed. April 1, 2015 at noon ET, 0129048#
Chronological Thread
- From: Emily Eisbruch <>
- To: "" <>
- Subject: Re: [Assurance] Monthly Assurance Call Focusing on Password Reset Topic: Wed. April 1, 2015 at noon ET, 0129048#
- Date: Wed, 8 Apr 2015 17:55:11 +0000
- Accept-language: en-US
- Authentication-results: incommon.org; dkim=none (message not signed) header.d=none;
Hi Steven,
Yes, the recording is linked from here. Best regards, Emily Emily Eisbruch, Technology Transfer Analyst Internet2 office: +1-734-352-4996 | mobile +1-734-730-5749 ________________________________________ From: <> on behalf of Steven Carmody <> Sent: Wednesday, April 8, 2015 12:50 PM To: Subject: Re: [Assurance] Monthly Assurance Call Focusing on Password Reset Topic: Wed. April 1, 2015 at noon ET, 0129048# by any chance, is there a recording of this call available anywhere ? a great topic -- several people here couldn't make it to the call, but are very interested. On 3/26/15 8:35 AM, Emily Eisbruch wrote: > > Greetings, > > Please mark your calendar for the next Monthly Assurance Call, > Wed., April 1, 2015 at noon ET. > > Connection Info: > +1-734-615-7474 > +1-866-411-0013 (toll free US/Canada Only) > Access code: 0129048# > > This call will feature a discussion on *Password Reset*, led by Eric > Goodman, Identity and Access Management Architect, University of > California Office of the President. > > We will start with a short introduction laying out the issues, followed > by open discussion. During the discussion, we will consider questions > such as: > > * What is your policy and what is working / not working about it ? > * Is it worth codifying password reset procedures? > * Any recommendations to modify the language in the IAP for InCommon > to consider? > > > For reference, below Eric's January 2015 summary of an email thread on > the password reset topic. > > Thank you and we look forward to your participation on the call. > Emily > > > ===================== > FOR REFERENCE: > EMAIL THREAD SUMMARIZED BY ERIC GOODMAN AS OF JAN. 2015 > > Hello and Happy New Year! > > At the end of last year I started a thread on the InCommon Participants > mailing last year discussing account recovery/password reset and the > Bronze IAP. It was pointed out (offline) that the InCommon Assurance > mailing list is probably a more appropriate place for the discussion, so > I’m posting a follow-up summary of that thread here instead of on the > Participants list. > > My original message was asking about section 4.2.4.3 of the > Bronze/Silver IAP. That section provides a list of approved password > change methods, followed by the statement “if none of these methods is > successful then the Subject must re-establish her or his identity with > the IdPO per Section 4.2.2 before the Credential may be renewed or > re-issued.” Because the section 4.2.2 applies only to Silver IAQ > accounts, there’s ambiguity about what is acceptable for recovery of a > Bronze IAQ account when the explicitly allowed mechanisms fail. > > In that thread, I asked for examples of processes campuses actually use > to recovery Bronze IAQ accounts when the allowed methods in 4.2.4.3 > fail, and specifically how campuses that have certified/self-asserted > compliance with Bronze determined/justified that such processes met the > IAP requirements in this section. > > There was a good theoretical discussion of the requirements -- and I did > even get one response (off-list) with an actual Bronze process example > :). Reading between the lines of the theoretical discussion, I want to > make some concrete statements and see if they capture what people are > thinking and doing: > > How people interpret the IAP requirements: > > · For Silver: The list of allowed methods in 4.2.4.3 combined > with the identity proofing processes defined in 4.2.2 comprise a > complete list of allowed password change methods. > > · For Bronze: The list of allowed methods in 4.2.4.3 provide an > incomplete list of allowed password change methods. Other methods would > be considered to be acceptable/compatible if they meet the general > Bronze IAP criteria outlined in section 3.1 that: > > o “Assertions under this [Bronze] profile are likely to represent the > same Subject each time a Subject identifier is provided” and > > o “it is expected that IdPOs use reasonable care when [re-]issuing > Credentials to confirm that a single individual applies for and receives > a given Credential and its Authentication Secret.” > > How people apply this requirement (for recovery of Bronze accounts): > > a) Users provide information that loosely (i.e., not Silver > verified) binds their account to known, valid identity data. E.g., A > user provides information that matches them to an employee or student > record as part of creating/updating their account profile. > > b) Account operators presume that (unverified), completely > self-asserted information registered by a user in their profile > accurately describes the real world owner of the account. > > If either are true, then we can use whatever mechanisms we see as > meeting the “reasonable care” guideline to verify a real life person’s > identity against the (a) referred to source system record or (b) the > (unverified) profile data registered on the account, to perform account > recovery operations. > > Implications: > > · Account operators presume that people provide accurate > information as part of their account profiles, even if there’s no > mechanism whatsoever to positively validate that presumption. > > o E.g., if I registered an account using a fake name and other data, I > wouldn’t be able to recover that account (if 4.2.4.3 methods fail), but > some real person who happens to match the false information I provided > could potentially take possession of the account. In this case, we fail > the “it’s the same person each time” test, but arguably not in a way > that violates the “reasonable care” metric. > > · For truly anonymous accounts (no name or other data that can > be verified against externally), there is no recourse; if the 4.2.4.3 > methods fail the account is forever unrecoverable. > > · It’s arguable that the additional processes (beyond 4.2.4.3) > account operators use for of recovery Bronze accounts should (must?) be > registered as Alternative Means with InCommon. > > o This contradicts the interpretation (above) that section 4.2.4.3 is > an incomplete list of allowed methods for both Bronze. > > o Alternative Methods processes are likely similar enough across > campuses that relatively few would need to be created to cover most use > cases . > > Is this a reasonable summary of how people look at account recovery for > Bronze accounts? > > Thanks for your time, especially if you’ve read this far! > > --- Eric > > > > > Emily Eisbruch, Technology Transfer Analyst > Internet2 > > office: +1-734-352-4996 | mobile +1-734-730-5749 > |
- Re: [Assurance] Monthly Assurance Call Focusing on Password Reset Topic: Wed. April 1, 2015 at noon ET, 0129048#, Steven Carmody, 04/08/2015
- Re: [Assurance] Monthly Assurance Call Focusing on Password Reset Topic: Wed. April 1, 2015 at noon ET, 0129048#, Emily Eisbruch, 04/08/2015
Archive powered by MHonArc 2.6.16.