SOAP SLO handler: what would it be used for?

Eric Goodman Eric.Goodman at ucop.edu
Wed Apr 16 15:05:29 EDT 2014


As I understood it:

With SAML1 artifact resolution, the attributes "query" is always preceded by an authentication event.

With SAML2 attribute queries, I thought the IdP could be used as an non-authenticating attribute authority (i.e., in a circumstance where there was no preceding authentication event). Is that not true? I understand avoiding redundant queries is a good thing, but in the latter use case, it's not redundant. I think Keith's point about ECP is valid, but I thought ECP still presumed a preceding authentication event.

I'm calling it out since it's another place where disabling attribute queries would affect functionality (though perhaps an advanced and uncommon one). And I guess there's a difference between disabling attribute queries and listing the endpoint in the InCommon metadata...

--- Eric

> -----Original Message-----
> From: users-bounces at shibboleth.net [mailto:users-
> bounces at shibboleth.net] On Behalf Of Wessel, Keith
> Sent: Wednesday, April 16, 2014 11:40 AM
> To: Shib Users
> Subject: RE: SOAP SLO handler: what would it be used for?
> 
> Thanks, Tom and Scott. Looks like we can get rid of five, not just
> four, endpoints.
> 
> BTW, Tom, your page looks like good advice. Might want to further
> quantify your statement about not supporting SOAP endpoints, though, by
> making ECP the exception. I'm sure the researchers on this list would
> want to encourage any new IDP to support ECP out of the gate.
> 
> Keith
> 
> 
> -----Original Message-----
> From: users-bounces at shibboleth.net [mailto:users-
> bounces at shibboleth.net] On Behalf Of Tom Scavo
> Sent: Wednesday, April 16, 2014 12:48 PM
> To: Shib Users
> Subject: Re: SOAP SLO handler: what would it be used for?
> 
> On Wed, Apr 16, 2014 at 1:07 PM, Wessel, Keith <kwessel at illinois.edu>
> wrote:
> >
> > We’ve decided, since nobody’s using it, to get rid of back-channel
> > handler support on our IDP.
> 
> That's good news. Your metadata (and your configuration) will be
> greatly simplified.
> 
> > I encourage others to consider this route.
> 
> Indeed. For new IdPs, it's mostly a no-brainer. Here are some
> preliminary thoughts on this issue:
> 
> https://spaces.internet2.edu/x/4YHYAg
> 
> Those recommendations have not yet been vetted, however, so take them
> with a grain of salt. If anyone has comments or suggestions, I'd like
> to hear them.
> 
> > I’m planning to remove the SAML1 and 2 attribute query and artifact
> > resolution endpoints from published metadata, local metadata, and
> > handler.xml.
> >
> > Looks like /idp/profile/SAML2/SOAP/SLO also uses back channel
> > communications… and we can turn that off, too. I’m just curious,
> > though, what would be a use case for a SOAP SLO call?
> > Non-interactively terminating a user’s session?
> 
> An inbound SOAP-based SLO endpoint doesn't seem to be very useful.
> However, outbound SOAP-based SLO is what's being implemented in v3, if
> I recall. If that's right, this means SPs will expose a SOAP endpoint
> for this purpose.
> 
> > I assume that the SOAP SLO call uses a similar security model to
> > artifact resolution and attribute queries and thus should be turned
> > off if we’re turning off the others. Is that correct?
> 
> AFAICT, yes.
> 
> > And finally, does ECP not use this security model? Looks like we have
> > that running on 443, so I assume it’s not using a cert from metadata.
> > Is that right?
> 
> Someone else needs to answer definitively, but yes, I think you're
> right, ECP is the exception.
> 
> Tom
> --
> To unsubscribe from this list send an email to users-
> unsubscribe at shibboleth.net
> --
> To unsubscribe from this list send an email to users-
> unsubscribe at shibboleth.net


More information about the users mailing list