SSO authentication: a new approach
Paul Harrison
pharriso at eso.org
Wed Mar 16 06:29:58 PST 2005
Ray Plante wrote:
> On Tue, 15 Mar 2005, Paul Harrison wrote:
>
>>I think that the distinction would have a bearing on any design -
>>instead of having different classes of CA, all CAs would be equal, but
>>the less privileged user would only be registered in a low priviledge
>>community for instance.
>
>
> I'm trying to address a very practical problem: the hassle of getting a
> certificate. I want to allow users to be able to fill out a registration
> form and begin access restricted services immediately. This is not the
> current practice with cert-based trust models. Many sites provide
> immediate restricted access without the use of certs, so why bother?
> Because we don't need to support two forms of authentication, for one;
> interoperability across sites, for two.
>
> So, do you want to see an easier way to get a certificate? If not, then
> weak certs are not useful. If so, can you really trust a process that
> cuts corners for expediancy as much as a process that takes greater care?
> When you assign lower priviledges to a user (because we're not really sure
> they are who they say they are), how do you do that? For one, how do you
> recognize that this person should get lower priviledges? You can only do
> it if you control both the granting of the certificate AND the assigning
> of priviledge. Priviledges, however, are assigned by the maintainer of
> service and not the CA.
>
>
I think that we are both looking at solving the same use case of making
it easy to get a certificate that can be in use minutes after the user
has registered.
Effectively what I am arguing for is that once an identity has been
issued to a user (in the form of a certificate) they keep that identity.
In the document that you distributed, there is a requirement 2.4-R2
'Users should be allowed to "upgrade" a weak certificate to a strong one
without loss of access to their data' - if there are different classes
of certificate, this necessarily means issuing a new certificate and
effectively changing identity, which then means that the effective owner
of all user's resources needs to be changed to maintain access
permissions - not a nice process....
What makes it a pain normally to get a certificate (in the UK at least)
is that once you have made the certificate request with the shared
secret from your private key, you are expected to turn up in person at
the CA before they will push the button to send the signed certificate
back to you - we could relax that process so that the CA always will
return the signed certificate without this human step. At which point
the identity confirmed by the certificate is effectively a member of the
anonymous community - for this identity to be admitted into other more
priviledged communities perhaps they would have to undergo some more
rigorous identity check. It means that when checking for authority to do
an operation, the priviledges will have been assigned to communities and
then a community service will have to be consulted to check it the
identity belongs to the community.
There is the other side of the coin, that the user has to trust the CA
not to allow easy identity theft - if the standard procedures are
relaxed too much then that becomes a real possibility, accidental or
malicious.
--
Paul Harrison
ESO Garching
www.eso.org
More information about the grid
mailing list