13.07.2015 Views

Liberty ID-FF Bindings and Profiles Specification - Liberty Alliance

Liberty ID-FF Bindings and Profiles Specification - Liberty Alliance

Liberty ID-FF Bindings and Profiles Specification - Liberty Alliance

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Liberty</strong> <strong>Alliance</strong> Project:<strong>Liberty</strong> <strong>ID</strong>-<strong>FF</strong> <strong>Bindings</strong> <strong>and</strong> <strong>Profiles</strong> <strong>Specification</strong>Version: 1.2-errata-v2.02046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820693.7.1.2. Step 2: Responding to the RequestIn step 3, the identity provider MUST respond to the with a SOAP 200OK message.3.7.1.3. Step 3: Requesting SAML attributes using a mapped NameIdentifierNote: This step is not normatively specified by <strong>Liberty</strong>, <strong>and</strong> is shown only for illustrative purposes. The requestingservice provider may use the mapped NameIdentifier of the Principal to issue a . ThisMUST adhere to the rules specified in [SAMLCore11]3.7.1.4. Step 4: Returning a Note: This step is not normatively specified by <strong>Liberty</strong>, <strong>and</strong> is shown only for illustrative purposes. A service providerreceiving a may return a . This action MUST conformto the rules specified in [SAMLCore11].3.7.1.5. Security ConsiderationsIn addition to the usual considerations relating to <strong>Liberty</strong> <strong>and</strong> SAML protocols (see [SAMLCore11]), an identityprovider SHOULD encrypt or otherwise obfuscate the NameIdentifier returned to the requesting service provider, sothat it is opaque to the requester. A way of accomplishing this is described in the next section.Because the identifier gives the receiving provider a persistent way of referencing the principal, it should only bereturned subject to the policies set by the principal or other authorized party.3.8. NameIdentifier Encryption ProfileThe <strong>Liberty</strong> NameIdentifier encryption profile allows a principal’s NameIdentifier to be encrypted such that onlythe identity or service provider possessing the decryption key can deduce the identity of the principal when theNameIdentifier is included in a SAML or <strong>Liberty</strong> protocol message. The identifier is encrypted in such a fashionthat it is a different value when requested by different providers or multiple times, reducing the chance for correlationof the encrypted value across multiple logical transactions.The NameIdentifier encryption profile make use of the following metadata element, as defined in [<strong>Liberty</strong>Metadata]:20702071• KeyDescriptor - Defines a public key to use when wrapping the keys used in encrypting data for a provider (thekey-encrypting key)<strong>Liberty</strong> <strong>Alliance</strong> Project60

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!