Friday, March 07, 2008
PKI and SAML - Friend or Foes
Patrick Harding comments that wide-spread use of user certificates never materialized and how SAML is a better model...
I figured I would analyze his posting to see if alternative perspectives can emerge...
It becomes difficult to assert something at runtime if software is written with the notion of provisioning upfront. For example, in Documentum, I only have two choices. I can either have a proxy user or I have to register each and every user in advance. There is no way to dynamically assert identity without provisioning/syncronization. For federation to work in this scenario, you don't need to sell the enterprises, you need to help other software vendors understand the importance of changing their code.
| | View blog reactionsI figured I would analyze his posting to see if alternative perspectives can emerge...
- As such we at Ping have struggled to justify the value of SAML in these entrenched PKI communities that already rely on user digital certificates for authentication and cross-domain web SSO
- Their issue is that digital certificates are not well suited for conveying directory based attribute information, such as user role and group designations, that is used for making authorization decisions.
It becomes difficult to assert something at runtime if software is written with the notion of provisioning upfront. For example, in Documentum, I only have two choices. I can either have a proxy user or I have to register each and every user in advance. There is no way to dynamically assert identity without provisioning/syncronization. For federation to work in this scenario, you don't need to sell the enterprises, you need to help other software vendors understand the importance of changing their code.
- While they will continue to authenticate users and systems with certificates, they plan to leverage SAML Assertions to communicate user attributes between applications in different domains. These attributes will be used to make authorization decisions.