Re: [Id-event] SAML subject identifier type
Yaron Sheffer <yaronf.ietf@gmail.com> Tue, 14 July 2020 22:01 UTC
Return-Path: <yaronf.ietf@gmail.com>
X-Original-To: id-event@ietfa.amsl.com
Delivered-To: id-event@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1])
by ietfa.amsl.com (Postfix) with ESMTP id 122193A07E5
for <id-event@ietfa.amsl.com>; Tue, 14 Jul 2020 15:01:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.97
X-Spam-Level:
X-Spam-Status: No, score=-1.97 tagged_above=-999 required=5
tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1,
DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001,
HTML_MESSAGE=0.001, MALFORMED_FREEMAIL=0.116, MIME_QP_LONG_LINE=0.001,
SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_FILL_THIS_FORM_SHORT=0.01,
URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key)
header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44])
by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id xI7ZTXlkU6S0 for <id-event@ietfa.amsl.com>;
Tue, 14 Jul 2020 15:01:35 -0700 (PDT)
Received: from mail-wr1-x42a.google.com (mail-wr1-x42a.google.com
[IPv6:2a00:1450:4864:20::42a])
(using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
(No client certificate requested)
by ietfa.amsl.com (Postfix) with ESMTPS id 880A53A07F0
for <id-event@ietf.org>; Tue, 14 Jul 2020 15:01:34 -0700 (PDT)
Received: by mail-wr1-x42a.google.com with SMTP id z2so354764wrp.2
for <id-event@ietf.org>; Tue, 14 Jul 2020 15:01:34 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
h=user-agent:date:subject:from:to:cc:message-id:thread-topic
:references:in-reply-to:mime-version;
bh=xX1y911UNF7ZVkpvSmHEQ69u/ZYt/vADBMlGk6onqF8=;
b=I867I3qU1xCxXfaETg51FC0kaj2ohv3Okl1MEja0EZUcMH2PJpYE0el/1K3pEvSuuN
QWc/gYSr6n/UE0T8DxcmpUOWEbDCtyJ+sQBAGH3mYlwuBbW8/5OFlsdWt3tZlPwuEDBK
S4yybkVh6CUc3yV/W4UKIOdf9y6ADk8Xb5HgYR2DxQB0H3V1JHPvH4vVpKcj4cENipG0
WErgUxWBwmooPCrzXBYxIJuOs/1VdGViGtVXNzAnWznv8zkm8wZ04xAo1NWrTYiC76tc
9hQxJSRuaVh2JTCxYYFj4+fQ+qRxspgEy82C6EJ2iRJ+89Lu27adxqcHxs8g6SMSuEuT
Ya/Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=1e100.net; s=20161025;
h=x-gm-message-state:user-agent:date:subject:from:to:cc:message-id
:thread-topic:references:in-reply-to:mime-version;
bh=xX1y911UNF7ZVkpvSmHEQ69u/ZYt/vADBMlGk6onqF8=;
b=kz6fhQ5tHZJHY0kaQ+Btl9zKcBAlvVpIZyEC5P9RHYl7DhwAGwwJKrMGWhvY0/6rHL
6sOKU5vPF0zRGUzdNoFeUv4qp+e4XJ4/wV9KpzxgObqMr1kA33AXrXwK++3WnR8xK3B0
vZwCn9hT/1UKNklJmg+CMYFI+YyE3QVj0NqGBSJksDu316VUJ/D2f/eSn2UvDnHywkKf
xqeKAcKFao6SBRfC5p2yQMRO95YAUOMVvxQCnec3JqH8M6olALqk+s2UbPid3XnBrwAY
iZefbg9Cs/novoAAWzF9+EW9ilX1Ry9mpMmHKrysBM+GTp44pprOdU1E0DzK8/nZ8ogy
oydQ==
X-Gm-Message-State: AOAM532n7TbPmu6PgYTg2vN+ghfxFNl+BubwfELmszcWnaZRO+2zSWTy
wvgRjD/39VN4LOl+rNPExIU=
X-Google-Smtp-Source: ABdhPJxe+Dch6e25AGUHyVCT7WN+pR48RLigZxNxGCgjpDEtPVFTvOmLDm/G9hnIzEyrfBUocyHd3Q==
X-Received: by 2002:adf:c142:: with SMTP id w2mr7645434wre.337.1594764093037;
Tue, 14 Jul 2020 15:01:33 -0700 (PDT)
Received: from [10.0.0.140] (bzq-79-176-11-75.red.bezeqint.net. [79.176.11.75])
by smtp.gmail.com with ESMTPSA id l67sm300495wml.13.2020.07.14.15.01.31
(version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128);
Tue, 14 Jul 2020 15:01:32 -0700 (PDT)
User-Agent: Microsoft-MacOutlook/16.38.20061401
Date: Wed, 15 Jul 2020 01:01:31 +0300
From: Yaron Sheffer <yaronf.ietf@gmail.com>
To: Atul Tulshibagwale <atultulshi@google.com>
CC: Chris Phillips <Chris.Phillips@canarie.ca>,
"id-event@ietf.org" <id-event@ietf.org>
Message-ID: <8B77A27C-D5B3-477A-BD0D-8B3D3B818BB0@gmail.com>
Thread-Topic: [Id-event] SAML subject identifier type
References: <CAMCkG5thP1JnyBn5qAK0TLqBoa-y53Qnoq=mf-NPLfzSF2U7VQ@mail.gmail.com>
<5B3455F1-9F82-40C5-BE22-2E3B715A0CF1@canarie.ca>
<CAMCkG5uSQzTGCmFn6DLeXVbA0B0wrcPou8CEjtCQ5BCp3M+eOw@mail.gmail.com>
<CAMCkG5uff+WwMRLDr+Lph-TagtwL5jWORg5ruvWLOxkNBM2s0A@mail.gmail.com>
<E7D14134-0210-4515-ACA3-2AB5CDDCBF34@gmail.com>
<CAMCkG5t+7z7OOLdsD77zj_eM7eYf2wOTGTV9tg5S01FXgcHC0w@mail.gmail.com>
In-Reply-To: <CAMCkG5t+7z7OOLdsD77zj_eM7eYf2wOTGTV9tg5S01FXgcHC0w@mail.gmail.com>
Mime-version: 1.0
Content-type: multipart/alternative;
boundary="B_3677619692_1403051929"
Archived-At: <https://mailarchive.ietf.org/arch/msg/id-event/j8mGUOpoQy4OaigMcUftwCF6i-I>
Subject: Re: [Id-event] SAML subject identifier type
X-BeenThere: id-event@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "A mailing list to discuss the potential solution for a common
identity event messaging format and distribution system." <id-event.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/id-event>,
<mailto:id-event-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/id-event/>
List-Post: <mailto:id-event@ietf.org>
List-Help: <mailto:id-event-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/id-event>,
<mailto:id-event-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 14 Jul 2020 22:01:37 -0000
Hi Atul, The ID Token subject type, as described in the document you are referencing, does not add any semantics, compared to a “phone number” or “email” subject type. So I don’t see the value in adding it. In addition, it does not, actually, describe an ID Token. In fact the text is very clear that it describes a “subject” (a durable entity) rather than a session, and does it by citing various claims included in the ID token. So as a subject identifier type, it is not at all equivalent to a SAML assertion. As to the SAML Assertion subject type, I think these use cases could be addressed by adding information to the event. Thanks, Yaron From: Atul Tulshibagwale <atultulshi@google.com> Date: Tuesday, July 14, 2020 at 23:26 To: Yaron Sheffer <yaronf.ietf@gmail.com> Cc: Chris Phillips <Chris.Phillips@canarie.ca>ca>, "id-event@ietf.org" <id-event@ietf.org> Subject: Re: [Id-event] SAML subject identifier type Hi Yaron, There are a few SSE use cases where the events are about a specific single sign-on session. You're right that this should not be limited to SAML. The RISC profile of SETs (based on which we are doing the SSE work) had the ID Token subject identifier type, which for some reason is missing in this spec (I did not realize until now). The specific events that need to refer to sessions are: Identity provider context change: The conditions under which a SAML assertion or OIDC token was generated are no longer valid. This can be due to various things, including a password change. Session property change: A session has been determined to have been compromised Revocation: The issuer of the single sign-on SAML assertion or ID Token needs to be revoke I can also add the ID Token claim from the RISC profile to my pull request. Thanks, Atul On Tue, Jul 14, 2020 at 12:32 PM Yaron Sheffer <yaronf.ietf@gmail.com> wrote: I need a lot more context here. So far, subject IDs have denoted durable entities, such as email addresses, phone numbers, account. This is adding a subject ID that denotes an ephemeral entity, basically similar to a session ID. This looks weird from an architectural point of view, and also begs the question, why specifically SAML and not other session types. Thanks, Yaron From: Id-event <id-event-bounces@ietf.org> on behalf of Atul Tulshibagwale <atultulshi=40google.com@dmarc.ietf.org> Date: Tuesday, July 14, 2020 at 00:14 To: Chris Phillips <Chris.Phillips@canarie.ca> Cc: "id-event@ietf.org" <id-event@ietf.org> Subject: Re: [Id-event] SAML subject identifier type Just clarifying the proposal as it stands today (before incorporating Chris's input): The following section should be added in the "Subject Identifier Types" section: 4.9. SAML Subject Identifier Type The SAML [SAML.REF] Subject Identifier Type describes a subject by the assertion identifier in the SAML assertion that was used to convey the subject's information to the Receiver. Subject Identifiers of this type MUST contain an ` assertion_id"claim. The value of this claim is a string that is equal to the Assertion Identifier in the SAML assertion. The SAML Subject Identifier Type is identified by the name "saml`. Below is a non-normative example Subject Identifier for the SAML Subject Identifier Type: { "subject_type": "saml", "assertion_id": "_f551d88963ab4e3decb7cfe8f4dcc3f5", } Figure 8: Example: Subject Identifier for SAML Subject Identifier Type. On Mon, Jul 13, 2020 at 1:22 PM Atul Tulshibagwale <atultulshi@google.com> wrote: Hi Chris, I was proposing using the "assertion id" (SAML Core spec, line 553) in the proposal, not the "subject-id" as defined in SAML (spec section 3.3). The main reason was to be able to refer to a session that was established using a specific assertion. If it's useful, we could perhaps extend the SAML subject identifier type in this spec to include either the assertion_id or the subject_id claim. Thanks, Atul On Mon, Jul 13, 2020 at 10:30 AM Chris Phillips <Chris.Phillips@canarie.ca> wrote: Hi. Quiet lurker observing.. Thanks for consider the SAML elements.. Atul, are you referring to the actual session identifier that someone may have where the Subject-Id was exchanged OR the actual Subject-id itself in your reference in the proposal with the github link? I’m trying to square what I see on the git delta on line 294-296 in https://github..com/richanna/secevent/pull/1/commits/b20b6692eb50628927476ca78f9be077ace88994 And a Subject-id as shown in the example in 3.3.3 here: https://docs.oasis-open.org/security/saml-subject-id-attr/v1.0/cs01/saml-subject-id-attr-v1.0-cs01.html#_Toc536097229 What you offered in the example is not a Subject-id per the OASIS SAML spec as written in section 3.3.1 Am I mis-interpreting something? C From: Id-event <id-event-bounces@ietf.org> on behalf of Atul Tulshibagwale <atultulshi=40google.com@dmarc.ietf.org> Date: Monday, July 13, 2020 at 12:17 PM To: "id-event@ietf.org" <id-event@ietf.org> Subject: [Id-event] SAML subject identifier type Hi all, Based on the discussions in the SSE working group within the OpenID Foundation, we would like to propose that the subject identifier specification include a SAML subject identifier type. This is so that sessions established across peers using SAML may be identified in events that include the subject identifier. A SAML subject identifier has only one claim within it, the assertion id of the SAML assertion used to establish the single sign-on session. This change is also included in my proposal here. Thanks, Atul _______________________________________________ Id-event mailing list Id-event@ietf.org https://www.ietf.org/mailman/listinfo/id-event _______________________________________________ Id-event mailing list Id-event@ietf.org https://www.ietf.org/mailman/listinfo/id-event
- [Id-event] SAML subject identifier type Atul Tulshibagwale
- Re: [Id-event] SAML subject identifier type Chris Phillips
- Re: [Id-event] SAML subject identifier type Atul Tulshibagwale
- Re: [Id-event] SAML subject identifier type Atul Tulshibagwale
- Re: [Id-event] SAML subject identifier type Yaron Sheffer
- Re: [Id-event] SAML subject identifier type Atul Tulshibagwale
- Re: [Id-event] SAML subject identifier type Yaron Sheffer
- Re: [Id-event] SAML subject identifier type Brian Campbell
- Re: [Id-event] SAML subject identifier type Atul Tulshibagwale
- Re: [Id-event] SAML subject identifier type Atul Tulshibagwale
- Re: [Id-event] SAML subject identifier type Richard Backman, Annabelle
- Re: [Id-event] SAML subject identifier type Atul Tulshibagwale
- Re: [Id-event] SAML subject identifier type Richard Backman, Annabelle
- Re: [Id-event] SAML subject identifier type Mike Jones
- Re: [Id-event] SAML subject identifier type Dick Hardt
- Re: [Id-event] SAML subject identifier type Atul Tulshibagwale
- Re: [Id-event] SAML subject identifier type Brian Campbell
- Re: [Id-event] SAML subject identifier type Mike Jones