Mapping European IDABC Authentication Levels to SAML 2.0 - Gap analysis and recommendations
نویسندگان
چکیده
In 2004 the European Commission (EC) launched 1 the IDABC (Interoperable Delivery of European eGovernment Services to public Administrations, Businesses and Citizens) program to encourage and support the delivery of cross-border public sector services to citizens and enterprises in Europe by means of information and communication technologies. User identification and authentication are the cornerstones of this project. Interoperability of European eID Management (eIDM) solutions is of outmost importance for the success of the project. For this reason, IDABC conducted and report on eID Interoperability for PEGS (Pan-European eGovernment Services) in order to analyze eID and authentication interoperability requirements. One of the objectives of this analysis was to propose and study the impact of a multi-level authentication mechanism and derive common specifications for interoperable eID in the EU This effort resulted in a series of documents setting up the eID Interoperability Framework 2 .
منابع مشابه
Security Assertion Markup Language (SAML) 2.0 Profile for OAuth 2.0 Client Authentication and Authorization Grants
This specification defines the use of a Security Assertion Markup Language (SAML) 2.0 Bearer Assertion as a means for requesting an OAuth 2.0 access token as well as for use as a means of client authentication.
متن کاملRFC 6595 A SASL and GSS - API Mechanism for SAML
The Security Assertion Markup Language (SAML) has found its usage on the Internet for Web Single Sign-On. The Simple Authentication and Security Layer (SASL) and the Generic Security Service Application Program Interface (GSS-API) are application frameworks to generalize authentication. This memo specifies a SASL mechanism and a GSS-API mechanism for SAML 2.0 that allows the integration of exis...
متن کاملSATMC: A SAT-Based Model Checker for Security-Critical Systems
We present SATMC 3.0, a SAT-based bounded model checker for security-critical systems that stems from a successful combination of encoding techniques originally developed for planning with techniques developed for the analysis of reactive systems. SATMC has been successfully applied in variety of application domains (security protocols, security-sensitive business processes, and cryptographic A...
متن کاملSAML Privacy-Enhancing Profile
We present the SAML Privacy-Enhancing (PE) profile which empowers users to take control of the authentication process and their personal data. Users have the full control of the application flow and get detailed information about the involved participants and the revealed attributes. This enables users to give informed consent for the authentication. The new profile builds on well-established s...
متن کاملPrivacy in Identity & Access Management systems
This chapter surveys the approaches for addressing privacy in open identity and access management systems that have been taken by a number of current systems. The chapter begins by listing important privacy requirements and discusses how three systems that are being incrementally deployed in the Internet, namely SAML 2.0, CardSpace, and eID, address these requirements. Subsequently, the finding...
متن کامل