60 likes | 185 Views
Security Token. Brief Profile Proposal for 2009/10 presented to the IT Infrastructure Planning Committee Rob Horn, Agfa Healthcare 28 September 2009. The Problem. From the Access Control Whitepaper:
E N D
Security Token Brief Profile Proposal for 2009/10 presented to the IT Infrastructure Planning Committee Rob Horn, Agfa Healthcare 28 September 2009
The Problem • From the Access Control Whitepaper: • IHE should define a framework for the definition of interoperable “get X-Assertion” and “provide X-assertion” transactions. This framework should consider two different levels of trust: direct trust (X-Service User consumes X-Assertion) and brokered trust (X-Service User as intermediary between X-Service Provider and Security Token Provider).
Use Case • Access control information (e.g., subject attributes, policies) which is exchanged between ACSs, must be safeguarded by encapsulating them into security tokens. Encapsulation enables any involved ACS to attest the trustworthiness of each piece of information.
Fuller Use Case scope XUA Provide X-Assertion X-Service Provider X-Service Provider Other Actor Other Actor Validate X-Assertion Get X-Assertion New STS WS-Trust transactions STS
Proposed Standards & Systems • SAML • WS-trust
Discussion • This profile is similar to some other ITI profiles in that it defines abstract actors that encapsulate and exchange information. Specific concrete actors and profiles will specify precise details regarding the attributes needed ina specific situation. • Limit initial scope to XDS environment • What level of effort do you foresee in developing this profile? • Medium • Should this combine with PEP/PDP cookbook or be separate? • Co-editor: Rob Horn – Agfa Healthcare