Internet DRAFT - draft-wei-abfab-usecases

draft-wei-abfab-usecases



ABFAB                                                        Juan Wei
Internet Draft                                     Shenzhen University
Intended status: Informational                           Jianyong Chen
Expires: March 30, 2014                            Shenzhen University
                                                            Jun Zhang
                                                Sun Yat-Sen University
                                                      October 10, 2013



 Application Bridging for Federated Access Beyond Web (ABFAB) Use Cases
                    draft-wei-abfab-usecases-01.txt


Status of this Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six
   months and may be updated, replaced, or obsoleted by other documents
   at any time.  It is inappropriate to use Internet-Drafts as
   reference material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html

   This Internet-Draft will expire on April 10, 2014.

Copyright Notice

   Copyright (c) 2013 IETF Trust and the persons identified as the
   document authors. All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document. Please review these documents
   carefully, as they describe your rights and restrictions with
   respect to this document. Code Components extracted from this



Wei                    Expires March 30, 2014                 [Page 1]

Internet-Draft             ABFAB Use Cases                October 2013


   document must include Simplified BSD License text as described in
   Section 4.e of the Trust Legal Provisions and are provided without
   warranty as described in the Simplified BSD License.

Abstract

   Identity Management System plays an important role in Cloud
   Computing. A good Identity Management System should meet the diverse
   security requirements from both service providers and users, improve
   usability for users and protect the resources from unauthorized
   access. The goal of the document is to document two kinds of level
   of assurance, one for authentication and the other for attribute, to
   provide users with a friendly experience through the use of
   technologies based on the ABFAB architecture and specifications.

Table of Contents


   1. Introduction ................................................ 2
   2. Context of Use Cases......................................... 3
   3. Use Cases ................................................... 3
      3.1. Level of Assurance for Authentication .................. 4
      3.2. Level of Assurance for Attribute ....................... 4
   4. Contributors ................................................ 5
   5. Security Considerations ..................................... 5
   6. IANA Considerations ......................................... 6
   7. References .................................................. 6
      7.1. Normative References ................................... 6
      7.2. Informative References ................................. 6
   8. Acknowledgments ............................................. 6

1. Introduction

   Generally speaking, the higher the Level of Assurance [b-ITU-T
   X.1254] for authentication is, the safer the communication between
   principals is. However, higher LOA will compromise the usability and
   feasibility. Therefore to differentiate the assurance for
   authentication can obtain a balance between usability and strength
   of authentication. In addition, different identity providers may use
   different authentication protocols, so it can promote service
   providers to recognize identity providers to use different
   authentication protocols by classify the security strength of
   authentication protocols. In cloud computing, there are all kinds of
   services which need different authentication mechanisms. So identity
   management system with differentiated levels of assurance for
   authentication is extremely reasonable and strongly needed in cloud
   environment.


Wei                    Expires March 30, 2014                 [Page 2]

Internet-Draft             ABFAB Use Cases                October 2013


   In federated identity management, identity attributes may be
   distributed in different attribute servers that trustworthiness of
   attributes is different and furthermore the service provider needs
   attributes to grant users. However the service provider's desired
   attributes vary based on business requirements. So classifying the
   level of assurance for attributes is beneficial to improve the
   security of service distribution.

   Furthermore the identity provider, attribute service provider and
   service provider are typically independent parties, so it is
   necessary to standardize the levels of assurance for both
   authentication and attributes to achieve interoperation.

   This document enumerates two use cases, describing how technologies
   based on the ABFAB architecture [I-D.ietf-abfab-arch] and
   specifications could be used.

2. Context of Use Cases

   The use cases described in this document are a result of work led by
   Jianyong Chen, the professor of Shenzhen University and research the
   security of network, responding to requirements from its community,
   and augmented by various inputs from the IETF community.

   The ABFAB architecture and specifications enables authentication and
   authorization to occur across organizational boundaries. For many
   applications, principals need not have pre-instantiated accounts
   that their federated identity maps to before their first visit to
   that application; the application can perform this process on the
   fly. In cases where such accounts are required for particular
   applications, the pre-provisioning process is out of scope of ABFAB
   technologies, which assumes any such requirements have already been
   fulfilled. Standards-based work of note that would assist with this
   pre-provisioning of accounts includes the standards and
   specifications produced by the IETF SCIM working group.

3. Use Cases

   This section describes some of the variety of potential use cases
   where technologies based on the ABFAB architecture and
   specifications could help improve the user experience; each includes
   a brief description of how current technologies attempt to solve the
   use cases and how this could be improved upon by ABFAB
   implementations.





Wei                    Expires March 30, 2014                 [Page 3]

Internet-Draft             ABFAB Use Cases                October 2013


3.1. Level of Assurance for Authentication

   Level of Assurance for authentication describes the security
   strength of authentication. It represents the security strength
   required by target service, which may be guaranteed by many
   authentication methods.

   With differentiated level of assurance for authentication, services
   can provide users diverse services without compromising the
   usability. For instance, when a user accesses a target service from
   a public place such as airport, in order to satisfy the required LOA
   by target service, authentication server needs to use safer
   authentication methods. This way may sacrifice the usability to some
   extent, but it can guarantee the security of accessing the target
   service, especially the services that is related to privacy. However
   when accessing the target service from within a secure organization,
   it can use weaker authentication methods since the environment is
   safe enough to allow weaker authentication methods to be used to
   meet the required LOA for authentication by target service, at the
   same time to improve the user experience. In conclusion, the LOA for
   authentication can meet diverse security requirements of service
   providers and make a tradeoff between security strength and user
   usability.

   At present, it already has some protocols to support multiple
   authentication mechanisms. For instance, in the Simple and Protected
   GSS-API Negotiation Mechanism (SPNEGO) [RFC2478], the initiator
   propose one security mechanism or an ordered list of security
   mechanisms, the target then make a decision depend on the proposed
   security mechanism (list) by negotiating with the initiator. Though
   these mechanism protocols can satisfy the requirement, the
   scalability is not good.

   The use of ABFAB technologies in this case via the EAP framework
   would enable identity providers provide many flexible authentication
   mechanism including the simple and the complex, which would meet the
   service providers' diverse requirements and it also has a
   scalability to support more authentication mechanisms.

3.2. Level of Assurance for Attribute

   Attribute service is a fine-grained service in identity management.
   Identity attributes are used to assist service providers to make
   fine-grained authorization. But as in the real world, the identity
   attribute information may be not true and fabricated. When granting
   access protected resources, some services may do not make a
   mandatory requirement on the trustworthiness of information. For


Wei                    Expires March 30, 2014                 [Page 4]

Internet-Draft             ABFAB Use Cases                October 2013


   example, when an authenticated person want to buy a bottle of wine
   in online store, the store need to certify the attribute value of
   age exceed 18. But if he wants to play game online, he may not be
   required to be an adult. So a classified level of assurance for
   attributes can enable service providers to authorize appropriate
   protected resources to users. When the level of assurance for
   attributes could not match the required from the service providers,
   the service providers can give a Denial of Service to the users so
   that it can prevent unauthorized or illegal accesses to the
   protected important resources.

   At present, there are many application protocols support identity
   attributes exchange between SPs and attribute servers or IdPs. They
   provide SPs with all the required attribute information to make
   authorization decision such as SAML [OASIS.saml-profiles-2.0-os]
   which support arbitrary set of attributes transportation within SAML
   assertions. But they do not classify the trust of attributes which
   can give a hand to service providers to provide safer services and
   improve the user experience at the same time.

   Federated identity management via ABFAB technologies would enhance
   the user experience of accessing different protected resources
   hosted in servers as well as protect resources from unauthorized
   access. The Authentication, Authorization and Accounting framework
   of ABFAB architecture provides transport for attributes. The AAA
   framework already has an extensible architecture allowing for new
   attributes to be defined and transported. With the AAA framework in
   this case context, we can define the levels of assurance for users'
   identity attributes, and transport them to the service provider then
   the SP can determine whether the users can get authorization of
   resources or not according to them.

4. Contributors

   The following individuals made important contributions to the text
   of this document: Juan Wei (Shenzhen University), Jianyong Chen
   (Shenzhen University) and Jun Zhang (Sun Yat-Sen University).

5. Security Considerations

   This document contains only use cases and defines no protocol
   operations for ABFAB. Security considerations for the ABFAB
   architecture are documented in the ABFAB architecture specification,
   and security considerations for ABFAB technologies and protocols
   that are discussed in these use cases are documented in the
   corresponding protocol specifications.



Wei                    Expires March 30, 2014                 [Page 5]

Internet-Draft             ABFAB Use Cases                October 2013


6. IANA Considerations

   This document does not require actions by IANA.

7. References

7.1. Normative References

   [I-D.ietf-abfab-arch]  Howlett, J., Hartman, S., Tschofening, H.,
                         Lear, E. and J. Schaad, "Application Bridging
                         for Federated Access Beyond Web (ABFAB)
                         Architecture", draft-ietf-abfab-arch-07 (work
                         in progress), July 2013.

7.2. Informative References

   [b-ITU-T X.1254] Recommendation ITU-T X.1254(2012), Entity
                    authentication assurance framework.

   [RFC2478] Baize, E. and D. Pinkas, "The Simple and Protected GSS-API
             Negotiation Mechanism", RFC2478, December 1998.

   [OASIS.saml-profiles-2.0-os] Hughes, J., Cantor, S., Hodges, J.,
                                Hirsch, F., Mishra, P., Philpott, R.
                                and E. Maler, "Profiles for the OASIS
                                Security Assertion Markup Language
                                (SAML) V.20", OASIS Standard
                                OASIS.saml-profiles-2.0-os, March 2005.

8. Acknowledgments

   These use-cases have been developed and documented using significant
   input from Juan Wei (Shenzhen University), Jianyong Chen (Shenzhen
   University) and Jun Zhang (Sun Yat-Sen University).

   This document was prepared using 2-Word-v2.0.template.dot.












Wei                    Expires March 30, 2014                 [Page 6]

Internet-Draft             ABFAB Use Cases                October 2013


Authors' Addresses

   Wei Juan
   Shenzhen University
   Dept. of Computer Science and Technology
   China

   Phone: +86 13751039454
   Email: juanwei2012@gmail.com

   Prof. Jianyong Chen
   Shenzhen University
   Dept. of Computer Science and Technology
   China

   Phone: +86 13823278100
   Email: jychen@szu.edu.cn

   Prof. Jun Zhang
   Sun Yat-Sen University
   College of Advance Computing
   China

   Phone: +86 13570277588
   Email: junzhang@ieee.org























Wei                    Expires March 30, 2014                 [Page 7]