SSO v2.0 Proposed Recommendation: Request for CommentsPublic discussion page for the IVOA SSO 2.0 Proposed Recommendation. The latest version of the SSO Specification can be found at:Comments from the IVOA Community and TCG members during RFC period: 2015-11-01 - 2015-12-13Comment by Pierre Fernique
Reply to Pierre CommentsThans Pierre for your comments and suggestions
Comments from MarkTaylorI don't have a good enough understanding of security to assess the substance of this document, but I have some editorial comments.
Reply to Mark questionsThanks for your comments and suggestions. I correct all the typos following your suggestions. 3. Thanks, that was a typo introduced converting from word to latex. 7. I modify the text to be consistent. 9. Sorry, the URL is actually dereferenceable but there was a typo. The correct url is https://www.w3.org/Protocols/HTTP/1.0/spec.html#BasicAA 12. Appendix A: Like Pierre, I don't understand what this XML is doing here. Also, the top-level xs:schema element contains the attribute version="1.02" - what's that the version of? As I explained to Pierre that was a request from GWS WG (see the above answer).Comments from MarkusDemleitnerIn general, I have to admit I am not altogether sure what the function of this standard is -- is it intended to just list authentication methods that people should use in the VO and give them names? If so, I guess much of the prose doesn't serve much purpose, and perhaps the standard would benefit from removing them as the reader wouldn't be led to expect more than such references. If, on the other hand, the objective is to provide guidance on how to implement services requiring authentication in a VO context, I believe much more practical advice was in order. That, in particular, concerns the mechanisms involving third parties, i.e., SAML and OAuth, and to some degree TLS (insofar as certificates really only make sense with some PKI). Natural questions one might have for those are: Are there IdPs or ASes in use by VO projects? Perhaps even operated by them? What policies do those have? Are ways for discovering them being planned? Can I, as an implementor, freeride on existing authentication infrastructures, and if so, which? Such information could be given in non-normative sections, such that it wouldn't hurt if the infrastructures were taken down. Another natural question people might expect to see answered if there's "Commentary" in the first place is if, at the time of writing, there was already client support for a given protocol in some VO clients. Conversely, client authors are probably overwhelmed by the sheer number of protocols "approved" here -- are they expected to implement all of them? If not (and I sure hope there is no such expectation), is there any rational way to decide? Perhaps the document could say something like "if in doubt, implement this and this, and if you're still not satisified, our next choice would be this". This would also give some indication to service implementors which mechanism to choose if they're free to choose. More concrete issues: For reasons of nicely formatted references, I'd really prefer if there were actual author names given in the metadata. p. 6 "Services that are registered with a IVOA registry as having a em WebService type interface..." Apart from the spurious em, I believe this sentence should go in accordance with the change log ("...remove all references to SOAP..."). The WebService interface type in VOResource is annotated with "A Web Service that is describable by a WSDL document", which I take to mean "A SOAP interface" (I am fairly sure that was the intention, anyway). p. 8 "particular attention" -> ? (particular care? but care for what?) p. 11 "OAuth is related" -> ? Does Appendix A actually help? My feeling is that a chapter-exact reference into VOResource would do at least as well. Or perhaps just include generated documentation using the new ivoatex/schemadoc.xslt mechanism (cf. ivoatexDoc in volute trunk). p. 13 "...methods ad relative..." -> ? -- MarkusDemleitner - 2015-12-10Reply to MarcusThanks Markus for your suggestions The idea of this document is to provide a reference to existing standards for authentication that can be used when we require access to private “data”. Actually this SecutiryMethod is used by VOSpace services, but it is not limited to it (see. Eg. CADC services). So the VOSpace clients are using and implementing some of those protocols. As you said we can include in the Commentary if there is an implementation, I am not sure that this document is the right place to do that. I do not think that the way the authentication policies are implemented by a project (even a VO project) should be discussed in this document, it is a decision to make at a project level, even if we want to operate a IdP or just a SP, depends on project (data center) decisions. Than, the policies in fact do not affect the protocol, the once a service tells a client that it requires tls-with-password, the client should be able to start a TLS communication and send a username/password. Both of these actions are fully documented in the rfc we cite in the document. The SecurityMethod is a way to advertise the client (or other services) and it is already in place in the Registry. I agree that “ranking” the SecurityMethods could be useful for someone needs to implement a new service, so we add a final commentary with some suggestions.Comments from TCG members during the TCG Review Period: 2015-12-01 - 2016-01-15WG chairs or vice chairs must read the Document, provide comments if any and formally indicate if they approve or do not approve of the Standard. IG chairs or vice chairs are also encouraged to do the same, although their inputs are not compulsory.TCG Chair & Vice Chair ( _Matthew Graham, Pat Dowler )Applications Working Group ( _Pierre Fernique, Tom Donaldson )There are still few typos: - author list- §2.2 "securityMethod" (strange font) - §12 "user?s", "user?given", "don?t" => quotes wrongly replaced by question mark character Apart from these details, I approve this new release of SSO PR. -- PierreFernique - 2016-10-15 I also approve this new release. -- TomDonaldson - 2016-10-21 Data Access Layer Working Group ( François Bonnarel, Marco Molinaro )Apart from some typos (author names Brian Majour and Andrè Schaaff fro example or the recurrent "Interfaces using this mechanism SHALL be be registered with the security method ....." ....) and the use of VODataservice-1.0 instead of last Rec version VODataservice-1.1 in the example (page 5) we see no issues to have this specification becoming a REC. FrancoisBonnarel MarcoMolinaro - 2016-10-14Data Model Working Group ( _Mark Cresitello-Dittmar, Laurent Michel )I can't speak too much to the content itself. This topic is outside my expericence, but it seems like a good summary of the various mechanisms which have been reviewed by the community and what the expectations are when being used within the community. If that is the intent, then yea!. With these addressed, I would be comfortable approving the document. Here are my comments/impressions.. mostly typo-s, some of which have already been mentioned by others. These are on the 2016-05-01 document. Front page: I'm not sure if we have a convention for 'Previous versions', but it looks odd to have WD and PR versions of V1.0 in the list, and not the WD of V2.0. I would expect to see the V1.0 REC, plus maybe the earlier drafts of the V2.0 listed. "Brian Majour" => Brian Major Acknowledgements: "working-group of IVOA" => "working-group of the IVOA" S2.1: "Is a service does not provide" => "If a service does not provide" S2.2: "More than one security Method can be specificed" .. format of "s" in security is different than the rest. S2.2: "and finally if the other are not available" => "and finally, if the others are not available," S3.0: It is not clear to me what the author list/reference on pg 6 is associated with. I don't see a document title or tag (like, for example, RFC7235) S3.0: Table1 caption is wrapped oddly S7.1: "should be used with particular attention." ... to what? If there is a concern about using the HTTP basic authentication, it should be made clear. S9.2: "In this way" ==> the rest is cut off in PDF as well. S12: "a list of existing security standards. to implement" ==> remove '.' S12: This section has several apostrophy-s showing as '?' (eg: user?s) S12: "need to store and manage credential." => should be "credentials." S12: "More complex projects/services that needs to offer" => should be "need" Appendix B: "security methods ad relative discussion sessions:" => should be "and relative discussion sections:" References: The reference for "Hardt, D (2012)". Title has "RFC 6742" but the text and URL indicate this to be "RFC 6749" -- MarkCresitelloDittmar - 2016-09-27 One other thing.. I'm not sure what the "implementation" requirements are for this document, but this page should have a section with statement regarding the impelementations. -- MarkCresitelloDittmar - 2016-09-28Grid & Web Services Working Group ( Brian Major, Giuliano Taffoni )
Registry Working Group ( _Markus Demleitner, Theresa Dower )In addition to Markus' prior comments: 9.2: I'd like to see the revised text with response to Mark Taylor's comments before signing off. At least in the HTML version, the last paragraph is cut off completely. And while I've worked with SAML enough to kind of understand "SAML2.0 protocol allows also to implement authentication service discovery mechanisms", it still could be a bit more clear. 10.2 I'm more confused by the wording in "OAuth is related to delegate credential from an application to another." Typos: 7.1: User-name vs user name elsewhere 2.1: that service's resource (add apostrophe) B.1: new security methods and relative discussion sections ("and", "sections") -- TheresaDower - 2016-09-21Semantics Working Group ( _Mireille Louys, Alberto Accomazzi )Education Interest Group ( _Massimo Ramella, Sudhanshu Barway )Time Domain Interest Group ( _John Swinbank, Mike Fitzpatrick )Data Curation & Preservation Interest Group ( Françoise Genova )Operations Interest Group ( _Tom McGlynn, Mark Taylor )From the perspective of the OIG is would be desirable if there was some mention of how one might validate the various sign-on mechanisms. Since these are all non-IVOA standards one might hope that such facilities have been built.
| ||||||||
Deleted: | ||||||||
< < | ||||||||
More generally, as far as I can understand this document the content could be more clearly summarized in a single table with three columns: A label for the allowed sign-oon mechanism, the standard associated with that label, and the IVOID to be used to identify that approach. If such a table could be added (perhaps as an appendix), I believe it would be extremely useful. | ||||||||
Added: | ||||||||
> > |
| |||||||
I am unclear as to the role this standard plays in the IVOA. It does not seem to discuss or reference any mechanism by which mulitople services would be accessible. I.e., different services can use different sign on mechanisms and there appears to be no mention of a broker that ties such services together. | ||||||||
Changed: | ||||||||
< < |
| |||||||
> > |
| |||||||
Deleted: | ||||||||
< < | ||||||||
-- TomMcGlynn - 2016-10-19
Knowledge Discovery in Databases Interest Group ( George Djorgovski )Theory Interest Group ( _Franck Le Petit, Carlos Rodrigo )Standards and Processes Committee ( Françoise Genova)<--
|