[Openid-specs-risc] Initial status check is not part of the OpenID SSF CAEP or RISC protocols
Peter Bjork
pbjork at vmware.com
Mon Jun 19 09:20:53 UTC 2023
Hi all
I’ve not been very active on the OpenID SSF working group meetings, but I have stayed very close to OpenID SSF and followed the development. With that I would like to propose a topic for discussion.
My understanding of the protocols (CAEP & RISC) is that they are mostly focusing on communicating changes that has happened. But what about the initial state check? E.g. a user requests access to a target without an access token, user is sent to an IdP. Now the IdP performs user AuthN and checks if the device is compliant before the IdP issues an assertion. In this flow, for example checking the device compliance, would the IdP and device MGMT system use CAEP/RISC?
My understanding, so far, has been that this initial flow would use something (not CAEP/RISC), but if the IdP learned about a change in device compliance the IdP would then send a CAEP/RISC signal to the target.
Here’s a picture I hope visualizes the gap.
[A diagram of a target Description automatically generated with medium confidence]
Obviously, this initial status check can be regarding anything, e.g. user risk level. In above example device compliance status is just an example.
Peter Björk
Product Manager, Workspace ONE Access
pbjork at vmware.com<mailto:pbjork at vmware.com>
Twitter: @thepeb
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs-risc/attachments/20230619/91966601/attachment-0001.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image001.jpg
Type: image/jpeg
Size: 121077 bytes
Desc: image001.jpg
URL: <http://lists.openid.net/pipermail/openid-specs-risc/attachments/20230619/91966601/attachment-0001.jpg>
More information about the Openid-specs-risc
mailing list