Skip to Content.
Sympa Menu

edugain-discuss - Re: [eduGAIN-discuss] Use of Azure Active Directory in eduGain

edugain-discuss AT lists.geant.org

Subject: An open discussion list for topics related to the eduGAIN interfederation service.

List archive

Re: [eduGAIN-discuss] Use of Azure Active Directory in eduGain


Chronological Thread 
  • From: Albert Wu <awu AT internet2.edu>
  • To: Daniel Muscat <daniel.muscat AT um.edu.mt>, "edugain-discuss AT lists.geant.org" <edugain-discuss AT lists.geant.org>
  • Subject: Re: [eduGAIN-discuss] Use of Azure Active Directory in eduGain
  • Date: Mon, 2 Oct 2023 15:20:55 +0000
  • Accept-language: en-US
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=internet2.edu; dmarc=pass action=none header.from=internet2.edu; dkim=pass header.d=internet2.edu; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=RbgwSuFip7AZKnE0FGisZKcO9rTT6psh0/Ei+dXWoz0=; b=W9XpWFen/JfPGXHNOFDDBV1dZ3/yH/gJMycLi59PUgZXOaZuoubAKhG2GGhp5o7u+gZIBNYxKbuFc/+1Y7WaWVeUeUi8SsNyiYYbHk6lTSAMz+odiYAriGHuWsmIsGTex48FVx3gtNeHfioQ3nYiCDjmYRWvPt3o2R5tF/0Xi5G03jzw6hLpXDD9pdVL3kuG2TT6eQS2XePW3Is0XKm9TC2v68xbDmNz3AIpyBYvWs98sJ6iUioFlvaVMdUTXydm2G1wxmx0XLDN39EUwC3bmn21+no0QPwSduXnq6QW/99HjmY+Q19k54SuyDyyoOFlbtzBMV01TdxqnaLNk7qjoA==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=jVXNXVRPlEJ3PftIVOep3+PggiMAqD6JRcPPvui2X1oU0H7dxlkIZE13/CzrKhHaEX7L26IBSD9FCfWhUd+OV6cbUcagA02IQn6ETJmW54J8bVOrF4ORL9k9lYy7x2njFsBwrl2nH1h/2MHTTv2m6J7xbhKuRlY/xA1EwZKhn1YumporqVNX8NYGeLlvEcwLBRI9bXIqNp+cxLhojXsBy1T2V0406PYkOssT9bT9hXhG7gNmqUjE0987RvA/a0OCIK4ReFnu1a8TH5ux0ZrSwy2dbHGWzOILTLkzg+g/ZGuq0kMyqLOhSXvEUDpOTvPz3UQCnRHhqs+9PqvdhUWqTw==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=internet2.edu;

Hello Daniel,

 

If this helps, several schools in the US recently replied to a similar question on the InCommon Participants list. All of them spoke very positively of Cirrus Bridge.

 

Albert

 

 

Albert Wu

InCommon Federation Manager

 

On 9/29/23, 11:35 AM, "edugain-discuss-request AT lists.geant.org" <edugain-discuss-request AT lists.geant.org> wrote:

 

HI all,

  Is there anyone who can give me feedback on Cirrus Bridge?

 

Regards

Daniel

 

 

On Fri, 4 Aug 2023 at 10:29, Daniel Muscat <daniel.muscat AT um.edu.mt> wrote:

Dear all,

   In relation to this thread, Microsoft is now encouraging using Cirrus Bridge ( https://learn.microsoft.com/en-us/azure/active-directory/architecture/multilateral-federation-solution-one ) to integrate Azure Ad with eduGAIN. Does anybody use this product and can give feedback on how worthy it is?

 

Regards

Daniel

 

 

On Wed, 14 Apr 2021 at 13:24, Guy Halse <guy AT tenet.ac.za> wrote:

Hi

On 2021/04/14 12:14, Peter Schober wrote:

Whether the WebPKI's use of domain control validation is a good
example for the kind of trust we're trying to establish within
Identity Federations is questionable.

And WHOIS as a means of proving domain "ownership" for scopes and entitiyIDs is somehow better?

Even pre-GDPR, the information contained in WHOIS is/was largely self-asserted. I am whomever I tell my Registrar that I am, and they don't care provided my credit card works. I have *never* been asked to prove identity by a DNS Registrar for anything other than a moderated domain (such as our .ac.za).

Now what is WHOIS is both self-asserted and largely redacted and inaccessible. Here's what I have to work with when I try to use WHOIS to validate the edugain.org domain:

Domain Name: edugain.org
Registrant Name: REDACTED FOR PRIVACY
Registrant Organization: REDACTED FOR PRIVACY

Registrant Email: info AT domain-contact.org
Admin Name: REDACTED FOR PRIVACY
Admin Organization: REDACTED FOR PRIVACY
Admin Email: info AT domain-contact.org

Tech Name: REDACTED FOR PRIVACY
Tech Organization: REDACTED FOR PRIVACY
Tech Email: info AT domain-contact.org
Billing Name: REDACTED FOR PRIVACY 
Billing Organization: REDACTED FOR PRIVACY
Billing Email: info AT domain-contact.org

At least with the DCV approach, I know that the person I am talking to has some level of administrative control over the domain; with WHOIS I now have nothing...


Ask yourself this: Is anything able to get any DCV TLS certificate
trustworthy to do business with? Is that enough to know what
real-world entity is behind this certificate?

To be clear, I don't believe that either DCV or WHOIS are sufficient on their own. I'm suggesting that, coupled with other mechanisms we already have, DCV provides analogous levels of trust to WHOIS.

In this regard, I'm with Thijs:

On 2021/04/14 12:35, Thijs Kinkhorst wrote:

In short, yes, I believe our procedures, contracts. technolical measures AND community are individually already provide good guarantees and and that all four combined give me a very high confidence in the process.


I'm talking about DCV performed by an individual who has been formally designated as a contact for the the organisation responsible for the entity. And that organisation being one with whom there is a direct contractual relationship, and whose identity is verifiable (OV in the PKI analogy). And in a lot of cases, certainly for smaller federations, a person with whom there is an established interpersonal relationship (Thijs's "community" point).

And to extend this to the Azure case, I'm talking about finding an equivalent of DCV to verify the tenant ID used in that entityID that can be coupled with the above to provide a fairly high confidence that the Azure entityID belongs to the organisation claiming it.

Thus far the best I've managed there is to have that individual demonstrate operational control of the tenant over Zoom. Not ideal. Doesn't scale. But doable (and funnily enough, akin to how AATL vendors are doing validation for document signing certs).

Kind regards,

- Guy

--

Guy Halse
Executive Officer: Trust & Identity

Tertiary Education & Research Network of South Africa NPC

Fault Reporting: +27(21)763-7147 or support AT tenet.ac.za
Office: +27(21)763-7102
http://www.tenet.ac.za/contact
https://orcid.org/0000-0002-9388-8592


 

--

Regards

Daniel


 

--

Regards

Daniel

PNG image




Archive powered by MHonArc 2.6.24.

Top of Page