[openid-specs-rande] RAF expression in OIDC
Marcus Hardt
hardt at kit.edu
Mon Sep 2 13:10:13 UTC 2019
Hi There,
thanks for the answers.
I suppoose that acr and amr go into the ID-Token and eduperson_assurance
will be available via the userinfo (in some scope), right?
M.
On 08/30/19 14:10, Mischa Salle wrote:
> Hi Marcus,
>
> good that you bring this up!
> We recently figured out (thanks to Roland for pointing me to it!) that
> there is both "acr" and "amr", in addition to the REFEDS'
> eduperson_assurance. Actually I'm not sure why we did not consider amr
> during the RAF discussions. So perhaps you should produce something like
>
> "acr" : "https://refeds.org/profile/sfa",
> "amr" : [
> "https://refeds.org/assurance/ATP/ePA-1d",
> "https://refeds.org/assurance/ATP/ePA-1m",
> "https://refeds.org/assurance/IAP/local-enterprise",
> "https://refeds.org/assurance/IAP/low",
> "https://refeds.org/assurance/IAP/medium",
> "https://refeds.org/assurance/ID/eppn-unique-no-reassign",
> "https://refeds.org/assurance/ID/unique",
> "https://refeds.org/assurance/profile/cappuccino"
> ],
> "eduperson_assurance" : [
> "https://refeds.org/assurance/ATP/ePA-1d",
> "https://refeds.org/assurance/ATP/ePA-1m",
> "https://refeds.org/assurance/IAP/local-enterprise",
> "https://refeds.org/assurance/IAP/low",
> "https://refeds.org/assurance/IAP/medium",
> "https://refeds.org/assurance/ID/eppn-unique-no-reassign",
> "https://refeds.org/assurance/ID/unique",
> "https://refeds.org/assurance/profile/cappuccino"
> ],
>
> which is more or less what Nikhef is now producing.
> Additionally we also add some information such as the IGTF assurance
> profile OID (typically https://igtf.net/ap/authn-assurance/birch /
> urn:oid:1.2.840.113612.5.2.5.2) and authN type, e.g. something like
> urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport
> or
> urn:oasis:names:tc:SAML:2.0:ac:classes:TLSClient
> (btw you're missing the 'assurance' part of the $PREFIX for cappuccino)
>
> See the OIDC core spec under IDToken, one but last claim,
> https://openid.net/specs/openid-connect-core-1_0.html#IDToken
>
> amr
> OPTIONAL. Authentication Methods References. JSON array of
> strings that are identifiers for authentication methods used in
> the authentication. For instance, values might indicate that
> both password and OTP authentication methods were used. The
> definition of particular values to be used in the amr Claim is
> beyond the scope of this specification. Parties using this claim
> will need to agree upon the meanings of the values used, which
> may be context-specific. The amr value is an array of case
> sensitive strings.
>
> For your link [3], the latest version seems to be
> https://wiki.refeds.org/display/CON/Consultation%3A+SAML2+and+OIDC+Mappings
>
> Cheers,
> Mischa
>
> On Tue, Aug 27, 2019 at 02:09:48PM +0200, Marcus Hardt wrote:
> > Hi There,
> >
> > we have a use case for using the Information of the REFEDS Assurance
> > Framework (RAF)[1] via OIDC.
> >
> > I.e. my home IdP issues me
> >
> > - https://refeds.org/assurance/ATP/ePA-1d
> > - https://refeds.org/assurance/ATP/ePA-1m
> > - https://refeds.org/assurance/IAP/local-enterprise
> > - https://refeds.org/assurance/IAP/low
> > - https://refeds.org/assurance/IAP/medium
> > - https://refeds.org/assurance/ID/eppn-unique-no-reassign
> > - https://refeds.org/assurance/ID/unique
> > - https://refeds.org/profile/cappuccino
> >
> > Question is how to get these into "OIDC"?
> >
> > Now, there is already some work done in the OIDCRE[2] group, that
> > resulted in this[3] google doc.
> >
> > [1]https://wiki.refeds.org/display/ASS/REFEDS+Assurance+Framework+ver+1.0
> > [2]https://wiki.refeds.org/display/GROUPS/OIDCre
> > [3]https://docs.google.com/document/d/1b-Mlet3Lq7qKLEf1BnHJ4nL1fq-vMe7fzpXyrq2wp08/edit
> >
> >
> > Two probelms kept us from putting this information (as a list) into
> > eduperson_assurance:
> >
> > 1: Singlevaluedness (I'm not sure about this being so, but I was told)
> > 2: ID Token: Assurance might rather belong into the ID Token (while from
> > the research background we tend to put all into the userinfo endpoint.
> >
> >
> > Basically, I'm writing to find updated information, or to find a way to
> > close this item.
> >
> >
> > Cheers,
> > --
> > Marcus.
>
>
>
> > --
> > openid-specs-rande mailing list
> > openid-specs-rande at lists.openid.net
> > http://lists.openid.net/mailman/listinfo/openid-specs-rande
>
>
> --
> Nikhef Room H155
> Science Park 105 Tel. +31-20-592 5102
> 1098 XG Amsterdam Fax +31-20-592 5155
> The Netherlands Email msalle at nikhef.nl
> __ .. ... _._. .... ._ ... ._ ._.. ._.. .._..
--
Marcus.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 4805 bytes
Desc: not available
URL: <http://lists.openid.net/pipermail/openid-specs-rande/attachments/20190902/5d8dd615/attachment.p7s>
More information about the openid-specs-rande
mailing list