Re: [Txauth] WG scope wrt. identity (Was: Polymorphism (Was: JSON Schema?))

Justin Richer <jricher@mit.edu> Fri, 10 July 2020 20:11 UTC

Return-Path: <jricher@mit.edu>
X-Original-To: txauth@ietfa.amsl.com
Delivered-To: txauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C77923A08FA for <txauth@ietfa.amsl.com>; Fri, 10 Jul 2020 13:11:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.895
X-Spam-Level:
X-Spam-Status: No, score=-1.895 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_FONT_LOW_CONTRAST=0.001, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id J81M-mQMr3Yu for <txauth@ietfa.amsl.com>; Fri, 10 Jul 2020 13:11:45 -0700 (PDT)
Received: from outgoing.mit.edu (outgoing-auth-1.mit.edu [18.9.28.11]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1B6DB3A08FE for <txauth@ietf.org>; Fri, 10 Jul 2020 13:11:44 -0700 (PDT)
Received: from [192.168.1.7] (static-71-174-62-56.bstnma.fios.verizon.net [71.174.62.56]) (authenticated bits=0) (User authenticated as jricher@ATHENA.MIT.EDU) by outgoing.mit.edu (8.14.7/8.12.4) with ESMTP id 06AK9V09021189 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 10 Jul 2020 16:09:40 -0400
From: Justin Richer <jricher@mit.edu>
Message-Id: <89945398-E404-4FAE-91D0-5C5E8F202CDE@mit.edu>
Content-Type: multipart/alternative; boundary="Apple-Mail=_45E34E26-28C2-4BB4-9F59-4A80DD311892"
Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.80.23.2.2\))
Date: Fri, 10 Jul 2020 16:09:40 -0400
In-Reply-To: <CAD9ie-u0Z_q7Jn-7E==qbv=KwSic=NPctMqYE2njyPieZBTcQg@mail.gmail.com>
Cc: txauth@ietf.org
To: Dick Hardt <dick.hardt@gmail.com>
References: <CAD9ie-vnA98pobbboS00SAHneEG52_8eMxh_sE3r3jg6gyooGg@mail.gmail.com> <E9EC90C9-7A9A-4909-8627-A161B33E941F@mit.edu> <CAD9ie-vyB8+5jS=K_qUHfvxsF2wPV5APRo+7WUDfJxNzJONJpg@mail.gmail.com> <8CC8B466-FD6F-4C23-8DAA-99B8A9BDF548@mit.edu> <CAD9ie-u9z7Mc-wNjztoOTy4N_Z9jFDc2Sb6quLspasMGAMKdSw@mail.gmail.com> <097FB93E-96DA-4DF6-8511-0B32FD321211@mit.edu> <CAD9ie-tpuisauOFGiUj65-RcYPtcvW_gZP1CAadqq5cE6P36HQ@mail.gmail.com> <EE4A7D91-1106-44CB-92BF-C3AA3649BDFE@mit.edu> <CAD9ie-saoc2FUm46r4h1B27iYK04j_skf5-zJR7EXLmWBzj=hA@mail.gmail.com> <F41A8F88-C1B4-4CE2-8573-7A03C086D25B@mit.edu> <CAD9ie-tHCg9Ti1xWuzUP5EGLAcU2cpFALErqq98+fPnD3enZCQ@mail.gmail.com> <820525FD-4556-4617-8D89-C600D8C90C33@mit.edu> <CAD9ie-uwz_Li7n9iuX_--YtWeE+HX5sWEe95nZ8Y0akYh8WTHg@mail.gmail.com> <A7E1F61B-78F8-4647-847A-E1C8909EA452@mit.edu> <CAD9ie-tSjEWT-+D43yKaFZmEdFcbL=fyM0kHuFX_fNa4zHdm1w@mail.gmail.com> <6D58464F-3EFA-4367-9033-91FCB9CF40AC@mit.edu> <CAD9ie-syw5YJVsJHncZ-PcLQbYC4r=4LLSQCKtMP=-hGKqT0SA@mail.gmail.com> <0905DCA3-1B30-429A-AB02-8ED27D37F6C3@mit.edu> <CAD9ie-vV-pH6oebREkfY5rZ=8vYZpD2irjyjJ=4mvfKKeKY4-A@mail.gmail.com> <974147F1-A9CE-4093-A170-9F4F9DFB3638@mit.edu> <CAD9ie-u0Z_q7Jn-7E==qbv=KwSic=NPctMqYE2njyPieZBTcQg@mail.gmail.com>
X-Mailer: Apple Mail (2.3608.80.23.2.2)
Archived-At: <https://mailarchive.ietf.org/arch/msg/txauth/2lsZfmdzyAcbSLCIvNnCdT1G7TY>
Subject: Re: [Txauth] WG scope wrt. identity (Was: Polymorphism (Was: JSON Schema?))
X-BeenThere: txauth@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <txauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/txauth>, <mailto:txauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/txauth/>
List-Post: <mailto:txauth@ietf.org>
List-Help: <mailto:txauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/txauth>, <mailto:txauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 Jul 2020 20:11:48 -0000

It seems to be pretty clear that you and I are interpreting the charter text differently, so I’d like to hear what the chairs think the best approach will be when we finally get to defining what’s included in GNAP. This should perhaps be a discussion point for the group in the upcoming meeting. Until then, I can hopefully expand on what I interpret.

The charter uses the term “identity information within the protocol including existing identifiers ... and assertions” and not “claims”, which I think is more precise and that GNAP should use language instead of “claims” for this reason. I think the XYZ use of the term “claims” is a mistake and it should change because it’s confusing.

The only time “claims” are mentioned in the charter is in the section about not making assumptions about the client and having a protocol “allowing for … Approval of AS attestation to identifiers and other identity claims”. To me, this does not say that the protocol should have room for more advanced identity stuff, not that GNAP should specify how it’s requested or returned.

There are use cases for getting signed assertions back from the AS as well, and so the protocol should allow for that. While assertions can often contain non-identifier claims, it’s not up to GNAP to define what those claims are, how they’re requested, or how they’re returned. There are also lots of valid use cases for the client requesting a specific set of non-identifier claims about the user. The question is, how much of that detail should we be solving directly here in GNAP? I think it’s pretty clear that the answer is “not much at all”.

My original XYZ proposal didn’t have any identity information in it, much like OAuth 2. After talking with Aaron and a few others, I was convinced that we could have a very small delta to let the client know who the user is. When writing the charter text, that’s what I originally had in mind by the “identity” language throughout. Several people spoke up and said that they would like space left to return signed assertions as well, and there seemed to be enough support to have that as an option in the charter so it was added. What I did not see support for, and in fact saw explicit pushback against, was defining ways to return additional user information in the GNAP response, at least as defined internally by GNAP. That seems to be what you’re arguing for doing here.

I think there will be room, and need, for a protocol on top of GNAP to define identity schemas, assertions, session handling, authentication contexts, and identity-based APIs in a standard way. It’s my understanding that all of this is outside of GNAP’s core focus, but that GNAP should keep this kind of work in mind in its design. So that, for instance, we don’t accidentally design a protocol that prevents an AS from tying both identity information and 

I realize that Xauth had non-identifier claims since early drafts, and I disagree with their inclusion. I think that the group is going to have to decide how far down this identity road we really want to go with GNAP, and I don’t think that’s an answered question yet. 

 — Justin


> On Jul 10, 2020, at 2:33 PM, Dick Hardt <dick.hardt@gmail.com> wrote:
> 
> Justin, your stance is surprising for the following reasons:
> 
> 1) Both XYZ and XAuth use the term claims, rather than identifiers. "A claim is a statement that one subject, such as a person or organization, makes about itself or another subject."[1]. A claim is clearly more than an identifier.
> 
> 2) XAuth has had non-identifier claims in the examples since -01 (name, photo).
> 
> 3) The charter does not state that ONLY identifiers will be returned, identifiers are one of the examples, as are OIDC ID Tokens, SAML assertions, and Verifiable Credentials. All of these often bind non-identifiers to one or more identifiers.  
> 
> [1] https://en.wikipedia.org/wiki/Claims-based_identity#Identity_and_claims <https://en.wikipedia.org/wiki/Claims-based_identity#Identity_and_claims>
> 
> Justin's stance earlier in the discussion:
> 
> My stance is that we allow the client to ask for a small set of identifiers about the user, or even just ask to “identify the user”, and leave everything else to a higher level identity protocol. I do not think that having an identity and profile query/response language at the core of GNAP is a good idea, and it’s certainly not in our charter.
> 
> On Thu, Jul 9, 2020 at 5:44 PM Justin Richer <jricher@mit.edu <mailto:jricher@mit.edu>> wrote:
> <snip> 
> I’m sorry that you are surprised by my stance, but it hasn’t changed since I helped write the section of the charter that you quoted below. A big reason that I chose that wording was to support this use case but not to go in depth with an identity protocol, which I never really wanted us to do. However, it seems as soon as “identity” was brought up previously, people immediately jumped into talking about a full stack of user attributes and profile information. That wasn’t my intent in talking about identity, and I don’t think it’s something GNAP ought to do, at least not on its own. 
> 
> I do think there’s room for us to provide identifiers alongside the access token, so that’s there. There was stated interest in providing signed assertions as well, so I made sure that was enumerated for those who want to do such work. And I think it makes sense for us to provide a way to describe what kinds of things I want to get from an access token by defining a general purpose syntax for describing those things (notably, as a combination of reference strings and multi-dimensional objects). With these two, we can get most of what we need for a basic login system. Anything beyond that is going to need user profiles, authentication contexts, session control, and a lot of other identity-protocol stuff that GNAP shouldn’t be focusing on. We should keep it in mind as we build GNAP, but I think that like OIDC all that important extra stuff should be built separately. To me, that’s what not defining schemas and formats means. 
> 
> I don’t see any conflict with the charter here, and I’m surprised that you do.
> 
> ᐧ