{"id":771,"date":"2007-05-06T12:46:40","date_gmt":"2007-05-06T20:46:40","guid":{"rendered":"\/?p=771"},"modified":"2007-05-06T22:27:41","modified_gmt":"2007-05-07T06:27:41","slug":"ws-federation-oasis-tc","status":"publish","type":"post","link":"https:\/\/www.identityblog.com\/?p=771","title":{"rendered":"WS-Federation OASIS TC"},"content":{"rendered":"<p style=\"margin-left: 0px\">I&#39;ll begin by quoting from <a href=\"http:\/\/connectid.blogspot.com\/2007\/05\/well-thats-it-then.html\">a&nbsp;piece<\/a> by&nbsp;<a href=\"http:\/\/connectid.blogspot.com\/\">Paul Madsen<\/a>&nbsp;after&nbsp;the <a href=\"http:\/\/xml.coverpages.org\/ni2007-03-20-a.html\">OASIS announcement&nbsp;<\/a>of a&nbsp;new working group to drive WS-Federation towards standardization.&nbsp; Paul writes:&nbsp;<\/p>\n<p style=\"margin-left: 30px\">&#8220;James McGovern <a href=\"http:\/\/duckdown.blogspot.com\/2007\/05\/links-for-2007-05-06.html\"><font color=\"#666699\">predicts<\/font><\/a>:<\/p>\n<p style=\"margin-left: 60px\"><span style=\"font-style: italic\">&#8216;I humbly predict that WS-Federation will become more important than SAML within the next two years and will invalidate all the hard work already done by the Liberty Alliance.&#8217;<\/span><\/p>\n<p style=\"margin-left: 30px\">&#8220;I guess it&#39;s over. I have to admit that I&#39;m disappointed and, to be honest, even surprised.<\/p>\n<p style=\"margin-left: 30px\">&#8220;I actually thought things were going well, you know, lots of <a href=\"http:\/\/www.projectliberty.org\/index.php\/liberty\/adoption\" class=\"broken_link\"><font color=\"#666699\">adoption<\/font><\/a>, encouraging signs of <a href=\"http:\/\/www.projectliberty.org\/liberty\/public_community\/concordia_working_group\" class=\"broken_link\"><font color=\"#666699\">convergence<\/font><\/a>, important new <a href=\"http:\/\/www.projectliberty.org\/resource_center\/specifications\/liberty_alliance_id_wsf_advanced_client_1_0_draft_specifications\" class=\"broken_link\"><font color=\"#666699\">functionality<\/font><\/a> etc.<\/p>\n<p style=\"margin-left: 30px\">&#8220;As for the <a href=\"http:\/\/www2.ottawasenators.com\/eng\/\" class=\"broken_link\"><font color=\"#6699cc\">New Jersey Devils<\/font><\/a>, it seems that the Liberty Alliance&#39;s playoff run is over. I&#39;ll be emptying my locker and signing autographs this afternoon before spending the summer golfing.&#8221;<\/p>\n<p style=\"margin-left: 0px\">Like Paul, I&#39;m surprised, if not so inspired to irony,&nbsp;by James&#8217; comment.&nbsp;<\/p>\n<p style=\"margin-left: 0px\">I do agree that WS-Federation will gain a lot of traction.&nbsp;&nbsp;But I absolutely disagree&nbsp;that it will &#8220;<em>will invalidate all the hard work already done by the Liberty Alliance.&#8221;&nbsp; <\/em><\/p>\n<p style=\"margin-left: 0px\">Liberty has contributed deeply to understanding a whole series of use cases and requirements, and the protocols, formats and concepts proposed&nbsp;by the SAML working groups have been an important step forward for all of us involved with identity.&nbsp; Nothing about WS-Federation invalidates this work.<\/p>\n<p style=\"margin-left: 0px\">On the other hand, technology doesn&#39;t stand still.&nbsp;&nbsp;Think back to the days when&nbsp;SAML was first posited as an alternative to LDAP authentication.&nbsp;&nbsp;Those of us involved in&nbsp;LDAP from the very beginning didn&#39;t for one minute take LDAP&nbsp;as&nbsp;the end of all thinking about attributes and identity.&nbsp;&nbsp; Ask LDAP guru <a href=\"http:\/\/www.ldap.com\/1\/commentary\/wahl\/\" class=\"broken_link\">Mark Wahl<\/a>, or Bob &#8220;RL&#8221; Morgan or Keith Hazelton &#8211;&nbsp;people deeply involved in Kerberos and LDAP but&nbsp;just as willing to embrace&nbsp;new technologies like SAML as&nbsp;meeting new use cases.<\/p>\n<p style=\"margin-left: 0px\">Just as SAML broke new ground, WS-Federation is intended to address a number of things that&nbsp;people working in Web Services&nbsp;want better defined&nbsp;to facilitate interoperation using WS-Security and WS-Trust.&nbsp;<\/p>\n<p style=\"margin-left: 0px\">These protocols hadn&#39;t even been invented when SAML evolved.&nbsp; <em>The idea of claims transformation&nbsp;is the most important&nbsp;technical&nbsp;advance in distributed computing&nbsp;for at least a&nbsp;decade<\/em>.&nbsp; It is so powerful that it wasn&#39;t even fully understood until we began to build things&nbsp;with it.&nbsp; So how can anyone expect&nbsp;SAML&nbsp;to deal in an optimal way with the issues that ultimately emerged?&nbsp; This doesn&#39;t detract from SAML&#39;s successes.&nbsp; That&#39;s not how&nbsp;software engineering&nbsp;works.<\/p>\n<p style=\"margin-left: 0px\">WS-Federation&nbsp;will provide new options for people who want to build on the web services architecture, evolving their current web technology <em>in an incremental way<\/em> to be consistent with that architecture.&nbsp;&nbsp;To do this,&nbsp;no one will have to throw out their existing&nbsp;SAML deployments.&nbsp; Many of the SAML producers will include support for WS-Federation so that interconnectivity will be a given.<\/p>\n<p style=\"margin-left: 0px\">A lot of&nbsp;WS-Federation&nbsp;editorial work has been done by my&nbsp;friend <em><a href=\"http:\/\/identity-des.com\/author\/\" class=\"broken_link\">DES<\/a><\/em> (Don Schmidt).&nbsp; This guy has paid his dues &#8211;&nbsp;triple dues&nbsp;&#8211; and works from a deep experience in security.&nbsp; After some badgering he has&nbsp;just started to <a href=\"http:\/\/identity-des.com\/\">blog&nbsp;his ideas<\/a>.&nbsp; Here&#39;s part of how he explains his goals:&nbsp;<\/p>\n<blockquote>\n<p style=\"margin-left: 0px\">WS-Federation enables development and deployment of advanced federation services (e.g. Authentication, Authorization, Attribute and Pseudonym Services) as special purpose variations of the WS-Trust STS claim transformation model.&nbsp; Managing, discovering and accessing such services can be simplified when they are all based on a common processing model and speak the same protocol. Further, reusing an established processing model and protocol can simplify the threat model for implementers and should lead to more robust code.<\/p>\n<p>Customers have indicated that manually configuring federation trusts \u00e2\u20ac\u201c particularly exchanging signing keys and specifying service endpoints and access policies \u00e2\u20ac\u201c is an onerous process when they have many partners. WS-Federation defines a <em>Federation Metadata <\/em>format to identify services, including the communication and security policies which must be satisfied for accessing them. This enables much of the configuration to be automated.<\/p>\n<p>Another significant benefit of WS-Federation is improved security through \u00e2\u20ac\u0153automated de-provisioning\u00e2\u20ac\u009d of external user access. If a Relying Party issues local accounts for external users from its partners, it may not immediately learn when those users have changed responsibilities or been terminated. Such accounts could be misused to obtain unauthorized access. WS-Federation enables a Federated Identity relationship wherein a user can no longer access a partner\u00e2\u20ac\u2122s resources as soon as he is unable to obtain a valid security token from his own organization.<\/p><\/blockquote>\n<p>Microsoft is actually pretty typical of many other companies in that it will have to support a whole spectrum of deployments reaching from simple, restful apps at one end to transactionally guranteed high security applications at the other.&nbsp; The ability to support the whole spectrum consistently is the key.<\/p>\n<p>We don&#39;t want to&nbsp;build two parallel infrastructures in order to do this.&nbsp; We don&#39;t want to deploy everything twice.&nbsp; Test everything twice.&nbsp; Secure everything twice.&nbsp;&nbsp; Does anyone?&nbsp;<\/p>\n<p>So&nbsp;we need a technology that takes&nbsp;everything learned while elaborating&nbsp;SAML&nbsp;&#8211;&nbsp;plus new features &#8211; and&nbsp;allows them to be composed and managed&nbsp;within the WS framework as well as used in conventional web sites.&nbsp;That&#39;s what&nbsp;I understand this TC to be&nbsp;about.<\/p>\n<p>It remains&nbsp;a personal hope that those who have been involved with SAML will adopt this larger goal as part of what needs to be achieved.&nbsp; That really will make convergence possible.<\/p>\n<p>And I also expect everyone to give them credit for all they have done, which will not be lost if WS-Federation continues to gain momentum, but will rather be extended.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>DES explains the advantages of making authentication, authorization, attribute and pseudonym services special purpose variations of the WS-Trust STS claim transformation model.  <\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[10,8,4],"tags":[],"_links":{"self":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/771"}],"collection":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=771"}],"version-history":[{"count":0,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/771\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=771"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=771"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=771"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}