...
comment # | Line/Reference # | Proposed Change or Query | Proposer / Affiliation | Action / Decision (please leave blank) |
---|---|---|---|---|
1 | 150-151 | |||
2 | 77-82 | The definition of CSP in this paragraph doesn't align well with that on page 4, and (I think) page 4 better represents what this document means by "CSP" (i.e., the organization's whole technical and organizational infrastructure for IAM). I suggest removing "...the central part of..." from that paragraph. | David Walker / independent consultant | |
3 | 232 | In the definition of "low," the issue is not really when an identity is self-asserted, but rather whether it was validated and verified. I suggest rewording the first sentence to ""The bearer of this claim is a Person with an identity that has not necessarily been validated and verified (i.e., a self-asserted identity). | David Walker / independent consultant | |
4 | general | Thanks to the authors for your work to date. Overall, v2 is a big improvement and I think you've achieved the objectives outlined. This is both technical and abstract and I acknowledge that English is often not the author's native language. Great job! 👏 I'm going to add a lot of comments below but hopefully it will improve readability and clarity. Please don't take it as criticism. | John Scullen / Australian Access Federation | |
5 | comment 1 and 2 | +1. I agree with david on both of these points. | John Scullen / Australian Access Federation | |
6 | 4-10 | I'm not entirely happy with this redraft but suggest the following as an introductory paragraph: I think it's better to talk about "levels of confidence" rather than "certainty". Assurance is about collecting enough evidence to clear some threshold related to the risks in that particular situation. It's about having sufficient confidence rather than certainty. | John Scullen / Australian Access Federation | |
7 | 11 | orthogonal → independent | John Scullen / Australian Access Federation | |
8 | 16 | delete "with the arbitrary names" | John Scullen / Australian Access Federation | |
9 | 16 | cover → encapsulate | John Scullen / Australian Access Federation | |
10 | 16-18 | Revise final sentence to: This framework also specifies how to represent the defined claims using SAML 2.0 and OpenID Connect federated identity protocols. | John Scullen / Australian Access Federation | |
11 | 19-22 | Revise to: Claims made on the basis of the original REFEDS Assurance Framework (RAF 1.0) can continue under the REFEDS Assurance Framework version 2.0 (RAF 2.0) with some exceptions for IAP process-based claims. Appendix A explains these exceptions and section 4 defines how to express IAP claims under both RAF 1.0 and RAF 2.0. | John Scullen / Australian Access Federation | |
12 | 74-76 | Revise to: This document provides a framework by which a Credential Service Provider (CSP) asserts claims about identity assurance attributes in the process of authenticating to an RP's service. | John Scullen / Australian Access Federation | |
13 | 78-79 | Delete: "In a federated environment". I think we've adequately scoped this in the introduction. No need to keep repeating it. | John Scullen / Australian Access Federation | |
14 | 81 | This framework → The REFEDS Assurance Framework | John Scullen / Australian Access Federation | |
15 | 83-84 | Revise to: Identifier Uniqueness - communicates to the RP that the user’s identifier (such as a login name) is unique and is bound to a single identity in the CSP’s context. | John Scullen / Australian Access Federation | |
16 | 85-89 | Revise to: Identity Assurance - communicates to the RP how confident the CSP was at the time of enrollment, of the real-world identity of the Person to whom the account was issued. This framework specifies three levels of process-based identity assurance and authenticator management (low, medium and high) and one risk-based identity assurance claim (local-enterprise). | John Scullen / Australian Access Federation | |
17 | 90-91 | Revise to: Attribute Assurance - communicates to the RP the quality and freshness of attributes (other than the unique identifier). | John Scullen / Australian Access Federation | |
18 | 92-101 | Revise to: Since an RP trusts one or more external CSPs to issue and manage credentials, the RP must rely on the CSPs to help mitigate associated risks. The RP operator's assessment of the sensitivity of the data collected and processed by its information systems and infrastructure will influence how much risk is acceptable and the controls necessary to mitigate the risks. RPs need higher confidence in the quality of attributes and identities asserted by a CSP as the risk factors increase. This framework describes methods for communicating these levels of confidence in a federated login attribute assertion. | John Scullen / Australian Access Federation | |
19 | 105-107 | Revise to: authentication needs to be sufficiently strong to confirm that the claims pertain to the person logging in. For example, if an RP determines that a service requires high identity assurance, it should also require MFA from the CSP for strong authentication assurance. | John Scullen / Australian Access Federation | |
20 | 109 | transport → transit | John Scullen / Australian Access Federation | |
21 | 109-110 | Revise to: For example, the assertion response should be signed using a certificate known and trusted by the RP. | John Scullen / Australian Access Federation | |
22 | 111 | Revise to: The REFEDS Assurance Framework (RAF 2.0) has two purposes: | John Scullen / Australian Access Federation | |
23 | 112, 114 | Numbered paragraphs as 1. and 2. rather than using dot points. | John Scullen / Australian Access Federation | |
24 | 118 - meaning of Registrar | Revise to: A person carrying out the identity proofing process for the CSP organisation. | John Scullen / Australian Access Federation | |
25 | 118 - meaning of Unsupervised Remote Proofing | Revise after "Unsupervised Remove Proofing processes may be:" to:
An identity proofing process may use a combination of manual and not automated unsupervised remote proofing. | John Scullen / Australian Access Federation | |
26 | 124-125 | Revise to: A CSP is REQUIRED to conform to the following REFEDS Baseline Expectations for Identity Provider Operators in order to conform to the REFEDS Assurance Framework: | John Scullen / Australian Access Federation | |
27 | 125 | Include link/reference to [REFEDS Baseline Expectations for Identity Provider Operators](https://refeds.org/baseline-expectations) | John Scullen / Australian Access Federation | |
28 | 172 | Delete "The components are orthogonal; therefore,". Doesn't add any extra meaning. | John Scullen / Australian Access Federation | |
29 | 184 - UN3 | I'm not sure this is important, but the wording implies to me that the identifier has not been reassigned up to this point in time. There is potential that the identifier could be reassigned at some point in the future. Should this be revised to: "The identifier MUST NOT ever be reassigned"? Perhaps it doesn't matter because if the identifier is reassigned at some future time they would have to stop asserting | John Scullen / Australian Access Federation | |
30 | 188 and 195-209 | Probably not in the scope of this work, but do we need to revise [eduPerson] to address reassignment practices for ePPN? It seems a bit weird to paper over a hole in the original specification by creating what feels like a workaround in this this spec. From all the commentary it sounds like ePPN is generally not reliable as a unique identifier. Do we have any better options? | John Scullen / Australian Access Federation | |
31 | 213, 118 | I expected "Identity Assurance" to be a defined term in 118 because of the capitalisation but it doesn't appear in the table. | John Scullen / Australian Access Federation | |
32 | 215 | Delete "sets of" | John Scullen / Australian Access Federation | |
33 | 216 | Delete "set(s) of" | John Scullen / Australian Access Federation | |
34 | 244, GR3, last dot point | Space missing: "Claimantand" → "Claimant and" | John Scullen / Australian Access Federation | |
35 | 244, VA4, 2 | This seem a bit vague and open to interpretation. Maybe it needs examples or some criteria about the kinds of attributes to look for (e.g. matching name, address, or date of birth to other evidence presented) | John Scullen / Australian Access Federation | |
36 | 244, VA4, 3 | Should "person" be "Person"? | John Scullen / Australian Access Federation | |
37 | 244, VA4, 3 | "in a trusted manner". This seems open to in and could lead to practices that make this method less robust depending on what the CSP considers to be trusted. | John Scullen / Australian Access Federation | |
38 | 244, VA4, 3 | I'm not sure how comfortable I am with vouching as validation check for IAP high. For access to identifiable human genomic data I'm not sure this is robust enough. Maybe there is a case for IAP very high in a future RAF version. | John Scullen / Australian Access Federation | |
39 | 244, AB3 | Is it worth making explicit that evidence of delivery to the Claimant should be recorded (e.g. signature)? | John Scullen / Australian Access Federation | |
40 | 244, UR1 | "trusted source is defined in VA4". I don't think it's defined very well though (see also comment 37). Trusted sources seem very open to interpretation. Maybe adding some example use cases of sources that may be trusted in different contexts might help. This could probably go in an appendix with reference from the main part of the document. | John Scullen / Australian Access Federation | |
41 | 278-279 | Why are the attribute values limited to faculty, student, and member? Faculty is rarely asserted in Australia but we almost always see staff and often employee too. Universities here understand who their staff are but have a harder time distinguishing between faculty vs general / professional roles. I would like to see RAF broadened to include staff and employee. I acknowledge definitions vary between countries (highlighted in section 2.2.1 of the eduPerson spec but descoping staff and to a lesser extent, employee, substantially diminishes the value of RAF in the Australian context. | John Scullen / Australian Access Federation | |
42 | 330-332 | Add: For further information see the REFEDS Must-Factor Authentication Profile and REFEDS Single Factor Authentication Profile. (and include links to the specs) | John Scullen / Australian Access Federation | |
43 | 373-374 | Revise to: RAF 1.0 is not deprecated. However, some RPs may require assurance using RAF 2.0 criteria over RAF 1.0 criteria. | John Scullen / Australian Access Federation | |
44 | 377 | below → following | John Scullen / Australian Access Federation | |
45 | 380 | "find itself having" → need | John Scullen / Australian Access Federation | |
46 | 474-477 | Revise to: Identity evidence is any artefact that a Claimant presents to prove their identity. This includes: documentation such as a government- issued physical or digital identification document or record, and the ability to be validated and verified through a national registrar, or similar means. | John Scullen / Australian Access Federation | |
47 | 474-484 | Should these definitions be moved to the Terms and Definitions table (118)? They are used throughout the document and might be better placed there since they are used more widely than in the context of Appendix B. For this reason I think section 2 is a better home for them. | John Scullen / Australian Access Federation | |
48 | 525-528 | Revise complete sentence to: The identity evidence presented must be valid at the time of identity proofing (e.g., unexpired), and the evidence must be: issued by a nationally recognized source; nationally recognized as valid evidence for identification purposes; or is a documented attestation of knowledge of the Claimant's identity from an authority recognized by the CSP | John Scullen / Australian Access Federation | |
49 | 540 | delete "its" | John Scullen / Australian Access Federation | |
50 | 550-551 | replace: with: | John Scullen / Australian Access Federation | |
51 | 560 | Revise: To: | John Scullen / Australian Access Federation | |
52 | 560-562 | Revise: To: | John Scullen / Australian Access Federation | |
53 | 562-563 | Revise: To: | John Scullen / Australian Access Federation | |
54 | 567 | "check for Personhood" → "confirm the Claimant is a Person" | John Scullen / Australian Access Federation | |
55 | 573-575 | Same comments apply as for comment 35. | John Scullen / Australian Access Federation | |
56 | 580 | "." → ":" at the end of the line | John Scullen / Australian Access Federation | |
57 | 581 and 584 | Number these paragraphs as 1. and 2. | John Scullen / Australian Access Federation | |
58 | 585 and 588 | Change (1) to (a) and (2) to (b) if you add numbers as recommended in comment 57. It would be a less dense paragraph if these were formatted as sub-points too. | John Scullen / Australian Access Federation | |
59 | 588 | Revise to: | John Scullen / Australian Access Federation | |
60 | 596-597 | Revise from the comma to: "but instead articulates functional requirements in that are relevant across international contexts and as technologies evolve." | John Scullen / Australian Access Federation | |
61 | 598-601 | Revise to: "This section is intended to provide illustrative examples and discussion illustrating how to implement RAF. These examples and discussion points show how to interpret the normative criteria for implementation, but are not intended to be exhaustive." | John Scullen / Australian Access Federation | |
62 | 605 | "a known and" → "an" | John Scullen / Australian Access Federation | |
63 | 606 | "and" → "if" | John Scullen / Australian Access Federation | |
64 | 607-608 | Revise: To: | John Scullen / Australian Access Federation | |
65 | 610-611 | Revise: to: | John Scullen / Australian Access Federation | |
66 | 633-634 | Revise to: | John Scullen / Australian Access Federation | |
67 | 642 | Delete: "each of" | John Scullen / Australian Access Federation | |
68 | 652 | Add comma after "proofing process" | John Scullen / Australian Access Federation | |
69 | 653 | "each such service" → "these services" | John Scullen / Australian Access Federation | |
70 | 653-657 | Revise: To: | John Scullen / Australian Access Federation | |
71 | 659-660 | Revise first sentence to: "This framework does not explicitly require a government-issued photo ID." | John Scullen / Australian Access Federation | |
72 | 660 | "simply because" → "that" | John Scullen / Australian Access Federation | |
73 | 664-665 | "do not implement things in the same way" → "use different approaches and standards" | John Scullen / Australian Access Federation | |
74 | 666-668 | Revise second sentence to: "The easiest way to meet IAP medium in-person requirements is to compare a photo on the identity evidence with the Person." | John Scullen / Australian Access Federation | |
75 | 669-671 | Revise to: "For nations that do not have robust national-level identity infrastructure, a government-issued photo ID may be the only evidence that enables the Registrar to meet all the validation and verification requirements." | John Scullen / Australian Access Federation | |
76 | 672-673 | Revise to: ' "Presented evidence" implies the Claimant must present the evidence themselves.' | John Scullen / Australian Access Federation | |
77 | 674 | "have implemented" → "adopt" | John Scullen / Australian Access Federation | |
78 | 676 | Revise heading to: " Appendix C: Example assurance values" | John Scullen / Australian Access Federation | |
79 | 690 | In the "Reason" column it might be a good idea to cross referencing 5.2 to also include references to the GR, IE, VA, VF, AB and UR criteria where appropriate. | John Scullen / Australian Access Federation | |
80 | 19 | "IAP" Spell out on first use then abbreviate. | Nick Rossow / Australian Access Federation | |
81 | 244/GR1 | GR1 requires that "The CSP takes measures to ensure that the Claimant accomplishing each step of the identity proofing and authenticator issuing process is the same Person throughout the process" It is not clear how that can be fully achieved - there could be steps where another person could act on behalf of the Claimant - if they shared credentials, this would be impossible to detect. | Vlad Mencl / Tuakiri/REANNZ | |
82 | 244/UR1 | It is not clear what it means for contact information to "belong to the Claimant". Would it be stronger then being "in control" of the contact channel. Such as for a phone number, not only to be able to receive messages, but also be listed in a public phone directory as the owner? Or for email, having it listed in institutional directory as belonging to the user? Perhaps this should be made clearer. | Vlad Mencl / Tuakiri/REANNZ | |
83 | 244/UR3 + 394-397 | I'm not sure if eIDAS is really built around an ‘in-person’ principle. If a claimant is identified by an (eGov-approved) eID-Server using an eID Token which is notfied as eIDAS LoA 'high', why would a CSP ever require an additional in-person check? Such a requirement would run completely counter to the basic idea of eIDAS (IMHO, of course). I doubt that any German university would ever be able to assert IAP high... | Wolfgang Pempe / DFN-AAI | |
84 | 244/GR3 | Are there any means by which the records can be requested in case of an incident? | Anders Sjöström NeIC/Puhuri |