Team

Ismael Alaou (tick) i, Phil Benchoff (tick) , Susan Brooker-Gross (tick) , Al Cooper, Mary Dunker (tick) , Frank Galligan (error) , Karen Herrington (tick) , Greg Kroll (error) , Randy Marchany (error)
((tick) present, (error) absent)

Agenda

  1. Continue discussion of InCommon Silver profile started at last week's meeting.
    1. Review "Meeting Notes" from August 5, 2010  for previous discussion.

Notes:

From August 5, 2010 meeting,
 
2. h. Perhaps a "layered approach" to issuing soft PDCs could be employed. With the first layer being easily obtained "regular" certs perhaps without in-person identity proofing and the next layer being a "silver" cert with all the required identity proofing.

      1. Ismael commented that this is "technically" possible but would caution against "closing the door" on those that get regular certs.
      2. Ismael also commented that technically it would not be a problem to issue both types of certs to the same user so they would have a mixture of "regular" and "silver" certs, however, this may be a usability issue for the user.
      3. If a user's role changes they may need to change the type of cert they have. They could either have a mixture or certs or revoke the old cert and get a new one.
      4. What roles would benefit form a silver cert?
      5. Kevin commented that making InCommon Silver a goal for this project would make these certificates less desirable because they would be more difficult to get.
      6. Al commented that the goal should be to get as many certs, into as many users hands as possible, i.e., easy dissemination.
      7. Identity proofing is a barrier to wide dissemination of soft certs.
      8. Perhaps we could issue different "level of assurance" (LOA) certs???
      9. If we issue different LOA certs, different workflows would be required. Also, we would need an upgrade path from LOA 2 to LOA 3 certs.

New questions (and perhaps some answers) from August 12, 2010, meeting:

  1. Would a person be able to have both LoA 2 and LoA 3 certificates at once?
  2. What LoA would be required for the Self Service PWd reset? Kevin: A LoA 2 certificate that was obtained by authenticating with PID/password and another factor such as SMS/OTP to a cell phone would be sufficient to have the certificate used during the self-service password reset process. The implication (Mary's interpretation) is that authenticating with PID and password alone to request and remotely obtain a soft PDC would not give a high enough level of trust in the PDC to use it to reset a PID (or Hokies or Oracle) password.
  3. Password discussion:
  4. Key pair discussion:
  5. When the user requests a Loa 3 cert, if they already have a LoA 2 cert, the appplication that handles the requests will let the user know they have a LoA 2 cert and will tell them their LoA 2 cert will be revoked when their LoA 3 cert is issued to them. The approver should not have to do anything special; the revocation will happen in the background.
  6. We have encryption, authentication, signing, with 2 levels of assurance. This makes a matrix:

    LoA

    authentication

    signing

    encryption

    2

     

     

     

    3

     

     

     

What are the use cases and the combinations we need?