Electronic signatures

Eric Goodman Eric.Goodman at ucop.edu
Mon May 23 18:09:48 EDT 2016

>> So in this case I mean literally auditing the IdP’s behavior.

>I can understand the appeal and the value.  I don’t think there’s a 
>chance in Hades that SP’s will get to audit their IdP’s.  

I only meant this within the context an organization or a specific bilateral agreement. Referring to my previous comment:

[me speaking]
>I have agitated for auditing the ForceAuthn response behavior of the IdPs 
>*in my system* [i.e., "those operated by entities within University of California"] 
>as a prelude to leveraging ForceAuthn this way, but I don't see any realistic way 
>to support it federation-wide short of something like a trustmark. (And I think the 
>development of such a trustmark is not high on anyone's priority list.)

("I have agitated for auditing..." in the above is not implying "I have gotten agreement that we will audit....")

[Nate again]
>It becomes an even more interesting option when combined with holder-of-key SAML 
>assertions that can bind the assertion minted by the IdP to the same keypair that can 
>be presented to the SP.

FWIW, I didn't mean HoK assertions in SAML. I meant that you could literally digitally sign the information being presented. As in: "I uploaded an Adobe Acrobat document which is signed with my signing key". Not arguing for or against HoK -- either would be feasible (and likely problematic in the short term) -- just clarifying that my previous statement was referring to a SAML-less "signature".

--- Eric

More information about the users mailing list