Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Table of Contents

Check for SWAMID Assurance Profiles

SWAMID has three defined levels of assurance, SWAMID AL1 (http://www.swamid.se/policy/assurance/al1), SWAMID AL2 (http://www.swamid.se/policy/assurance/al2) and SWAMID AL3 (http://www.swamid.se/policy/assurance/al3).

All by SWAMID approved assurance levels for an Identity Provider are defined in the SAML metadata as a SAML extended attribute urn:oasis:names:tc:SAML:attribute:assurance-certification. The assurance certfication certification attribute in metadata defines what assurance profiles the Identity Provider and it's its home organisation has been approved for or has declared that ther they fulfill.

The Identity Provider uses the attribute eduPersonAssurance to assert the logged in user's assurance profleprofile. Please observe that the Identity Provider must not indicate any other assurance profile than it's approved for. Signaling the user's assurance profile via the attribute eduPersonAssurance means that the user verfication validation fulfills all parts of the asserted assurance profile. Attribute mapping for eduPersonAssurance is defined as assurance in 3.2 Configure Shibboleth SP - attribute-map.xml.

  • An Identity Provider that has an assurance certfication certification in metadata for SWAMID AL3 (http://www.swamid.se/policy/assurance/al3is allowed to assert that a user is approved for SWAMID AL3.
  • An Identity Provider that has an assurance certfication certification in metadata for SWAMID AL2 (http://www.swamid.se/policy/assurance/al2is allowed to assert that a user is approved for SWAMID AL2.
  • An Identity Provider that has an assurance certfication certification in metadata for SWAMID AL1 (http://www.swamid.se/policy/assurance/al1is allowed to assert that a user is approved for SWAMID AL1.An Identity Provider that has no assurance certfication in metadata is not allowed to assert that a user is approved for a SWAMID assurance profile.

To check a user's assurance profile, you need to check that the Identity Provider is approved for the same assurance profile as it has asserted for the user. To do this you need to activate extendend extended functionality in the Shibboleth Service Provider. This extension is available since version 2.2.

Expected Web Application behavior for SWAMID Assurance Profiles

If the web application need needs to check if a user is approved for an SWAMID Assurance Profile the application needs to check approved assurance profiles for both the user and the used Identity Provider as described in the bullet list in this document.

Please note that this approach only checks that the Identity Provider and the user fulfills the checked assurance profile. To check that the credentials used to log in fulfills the assurance profile is more advanced and needs more configuration of both Service Provider and Identity Provider.

Check for REFEDS SIRTFI

"The Security Incident Response Trust Framework for Federated Identity (Sirtfi) aims to enable the coordination of incident response across federated organisations. This assurance framework comprises a list of assertions which an organisation can attest in order to be declared Sirtfi compliant.The purpose with REFEDS SIRTFI (https://refeds.org/sirtfi) framework is to add trust based on a defined Best Current Practice on incident response and operational security.

All Identity Providers that has declared that they follow the REFEDS SIRTFI framework are defined in the SAML metadata as a SAML extended attribute urn:oasis:names:tc:SAML:attribute:assurance-certification. The assurance certfication certification attribute in metadata defines what assurance profiles the Identity Provider and it's home organisation has declared that they fulfill or has been approved for.

Service Providers can also via metadata declare that they fulfill the REFEDS SIRTFI framework and that gives the Identity Providers added trust in that the Service Providers fulfills the same Best Current PractricePractice.

Expected Web Application behavior for REFEDS SIRTFI framework

If the web application need to check if an Identity Provider has delcared declared that they fulfill the security framwork framework REFEDS SIRTFI the application needs to check approved assurance profiles the Indentity Identity Provider metadata. The web application may also use a filter in the Discovery Service that narrow down the shown Identity Providers to only those who fulfills the framework.

...