Soft Personal Digital Certificates project meeting
Tuesday, September 27, 2011; 2:00 p.m.; AISB-208
Invited
Ismael Alaoui, Marc DeBonis, Mary Dunker, Daniel Fisher, Frank Galligan, Dave Hawes, Karen Herrington, Greg Kroll, Ken McCrery, Kevin Rooney
Agenda
- SoftPDCs will be published to ED-ID and Active Directory.
- User attributes appearing in SoftPDCs include, Name, eMail Address, and UID. If there are privacy issues, visibility of these attributes should be managed by the user and by default published with visibility turned off.
- SoftPDCs will be published directly to directory considered to be the authoritative source(ED-ID?) using the native EJBCA publication facility at the time a SoftPDC is issued.
- To help avoid confusion, only the most current certificate issued off a user’s active key pair will be stored in the directory.
- SoftPDC updates will be propagated to the secondary directory (Active Dir) from the primary. What is the current process for keeping ED-ID and Active Directory in sync?
- When an active key pair is revoked, its SoftPDC will be removed from the directory.
- Is there a test directory system that can be used by SIES for ED-ID? For Active Directory?
- Next steps?
Attended
Ismael Alaoui, Marc DeBonis, Mary Dunker, Daniel Fisher, Frank Galligan, Dave Hawes, Karen Herrington, Greg Kroll, Ken McCrery, Kevin Rooney
Meeting Notes
- SoftPDCs will be published to ED-ID and Active Directory.
- No problems or concerns were voiced.
- User attributes appearing in SoftPDCs include, Name, eMail Address, and UID. If there are privacy issues, visibility of these attributes should be managed by the user and by default published with visibility turned off.
- If email address is pid@vt.edu the publishing these with visibility turned on may be a problem for those suppressing their pid.
- It was agreed that the preferred email address would be used with the understanding that this must match the email address on the certificate. If the user changes their preferred email address they will have to get a new certificate.
- There are issues with suppressing information in the Active Directory. We can probably make it visble or not but not sure how apps would take that.
- SoftPDCs will be published directly to directory considered to be the authoritative source(ED-ID?) using the native EJBCA publication facility at the time a SoftPDC is issued.
- The authoritative source is the Registry.
- Data is propagated from the Registry to the Enterprise Directory (ED).
- Daniel's team will design a web service for Frank & Ismael to use.
- To help avoid confusion, only the most current certificate issued off a user’s active key pair will be stored in the directory.
- Not a problem for ED. We can make it work how ever we want.
- May be a problem for the Active Directory (AD) as users can insert a certificate into their AD record several different ways. Can be controlled/prevented on the server side (but its all or nothing).
- Marc will analyze the production AD and see if any users have published a certificate. (If not then this issue may be mute.)
- It was agreed that the simplest/best approach would be to only store the most current certificate. Overwrite any existing certificate with a newly issued certificate.
- SoftPDC updates will be propagated to the secondary directory (Active Dir) from the primary. What is the current process for keeping ED-ID and Active Directory in sync?
- See https://www.middleware.vt.edu/doku.php?id=middleware:ed:architecture
- Basically data flows from Banner -> Registry -> ED -> AD
- When an active key pair is revoked, its SoftPDC will be removed from the directory.
- All agreed that this was a good idea and probably a best practice.
- Is there a test directory system that can be used by SIES for ED-ID? For Active Directory?
- SIES should already have access to a develop instance because of work with eTokens.
- Access to a develop instance of the Registry will be needed.
- Once requirements are completed Daniels team can put web services into develop within one week. A November/December timeframe was mentioned and Daniel said that should not be a problem.
- M:SIS have a dev VT AD for SIES to work in.
- Next steps?
- Schedule another meeting of this group next week or later to review action items.
- Frank will plan to give an overview and demonstrate a working prototype at next meeting.
3 Comments
Greg Kroll
Sep 27, 2011If you get an error when trying to post a comment, ignore the error message and post it again. The admin's of this wiki are aware of the problem.
Greg Kroll
Oct 10, 2011- 34 users in the production VT AD have data in the userCertificate attribute of their user objects
Mary Dunker
Oct 11, 2011Per Marc DeBonis, the certificate is not an attribute that is sent to hte OFfice 365 directory. Here is Microsoft documentation on these attribtes http://support.microsoft.com/kb/2256198
Marc will discuss passing the certificate to Office 365 with Microsoft.