SSO authentication: a new approach

John Good jcg at ipac.caltech.edu
Mon Mar 14 15:59:04 PST 2005


Ray -

I can't see that I would be willing to let
someone with one of your "weak certificates"
do much more than someone with an HTTP cookie.
I would not, for instance, let them have file
upload access (unless I wanted to be in the
business of supplying free storage to the
world).

- John


Ray Plante wrote:

> Hey Paul,
> 
> On Fri, 11 Mar 2005, Paul Harrison wrote:
> 
>>In the discussion so far of  "less-trusted" or "weak certificates" - 
>>what is actually meant is lower priviledges assigned to an identity that 
>>is still confirmed by reference to a CA signature, in just the same way 
>>that a "strong certificate" - i.e. as far as the cryptographic 
>>confirmation of the identity goes there is no difference.
> 
> 
> In my view of the idea of "weak certificates" is not simply an issue of 
> lower priviledges.  Consider your definition...
> 
> 
>>I still think that we should distinguish between trust (i.e. do we know 
>>that the entity is what it says it is - i.e. it has identity signed by a 
>>certificate authority that we know) ...
> 
> 
> With a weak certificate, we *don't* know that the entity is what it says
> it is.  We only know that the entity is the same entity as the last time
> it came around.  The point is that with a Weak CA, we cannot put full
> trust in it because it is easy for users to register false identities.
> 
> I sense that an underlying principle that you are trying to get at is that
> authentication and determining authorization are separate operations.
> If so, I agree whole-heartedly.  In the case of weak certificates, the
> CA that signs the cert can be used in part to assign priviledges.  
> 
> cheers,
> Ray



More information about the grid mailing list