Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: WG's resolutions

...

NumberLine / ReferenceProposed Change or QueryProposerAction / Decision (please leave blank)
174

The idea that asserting values on the eppn reassign also implies that eppn is unique seems unintuitive and liable for misinterpretation. I also find the statements at line 74 and at 94 to be conflicting.

74 = "if the Home organisation asserts unique and no-eppn-reassign, then the ePPN attribute value also shares the same uniqueness properties as eduPersonUniqueID (ePUID)." 

94="Finally, the reader is reminded that they should not assume any uniqueness property that goes beyond the specification of the attribute."

Unique and not-reassigned do not necessarily mean the same thing, which is implied by line 74 somehow.

Hannah Short (CERN)Reworded the section to express clearly what is required on ePPN uniqueness and reassignment.
2114It would be helpful to see examples brief examples of each Identity proofing level, without having to go through 5 clicks and a download form to get to Kantara.Hannah Short (CERN)Added an example to each ID proofing level.
3

156 

I feel like a broken record and am sure there's a reason why you have decided to be generic here, but might it be useful to reference Sirtfi?

Hannah Short (CERN)

The working group didn't change the resolution of comments #10 and #19 in the first consultation. The Assurance framework and Sirtfi are parallel and orthogonal frameworks.
462

Which are the pairwise identifiers recommended by REFEDS? persistent-id is mentioned in the footnote. What about the (proposed) SAML2 pairwise-id?

Speaking about this: why does it have to be pairwise (i.e. why would subject-id not qualify, considering it fulfills all three requirements)?

Is the reason to keep it rather vague to allow for additional identifiers in the future? If so, I still think you need some reference to these "recommended identifiers". If it's just supposed to be persistent-id, why not just name it in the table directly?

David Hübner (DAASI/DARIAH)Reformatted the list of identifiers and included a reference to the latest SAML2 Subject Identifier Attribute specification draft.
5218-234Shouldn't this be profile/espresso (in addition to profile/cappuccino)? According to the table (line 176) and with the authentication strength gone, the only difference between the profiles is IAP/high, which is asserted here.David Hübner (DAASI/DARIAH)Adopted proposal.
6237

There is no real conjunction anymore, though, is there?

While I realize, that there is no document, that really connects RAF and the authentication profiles, I still feel that Appendix C is a bit out of scope for this documents and might be better placed in the MFA and SFA profile documents.

David Hübner (DAASI/DARIAH)Dropped Appendix C.
75I'm missing something of an explicit problem description or goals that this standard seeks to accomplish. Current text is rather vague ("need to make decisions" - why, to what end, how are they going to use this info?).

Thijs Kinkhorst (SURFnet)

Reformatted the sentence in the beginning of the abstract.
8114

Hard to read and understand table, because it's constituted only of references to external documents. Propose to add concrete indications of the meaning, common denominators of the choices, or examples of expectations.

Thijs Kinkhorst
(SURFnet)
Added an example to each ID proofing level.
9114References Kantara spec which is only available should one feel inclined to fill out a form asking for all kinds of personal information and even a "reason" why one would want to read the doc. Propose to only reference open standards only.

Thijs Kinkhorst (SURFnet)

Kantara has changed its policy and made IAF-1420 publicly available.
10134

The options 1d and 1m are likely too short to allow the majority of our IdPs to assert them. The "grace period" after someone departs before their account is impacted is commonly at least a month (note that a month is >30d) and often more in the order of about 60 or 90 days.

The text itself mentions "in some organisations the student status remains effective until the end of the semester" (which hence can be up to 6m), but the standard does not provide a way to express this case; is it provided as an example of something undesirable? (maybe make that explicit then that the spec does intend to exclude these persons)

Either there need to be longer timeframe options (order of multiple months) or it's likely that hardly any of our IdPs will be able to assert it (so to enjoy either of the coffee sensations). At the very least it would be helpful to define the 1m flavour as up to 32 days to be able to assert it by those who use a month's time.

Thijs Kinkhorst (SURFnet)

Clarified the difference between "business decision" (when a person departs) and "IT practice" (how long it then takes that the person's affiliation attribute is updated).

Prolonged 1m to mean maximum 31 days.