cdaefa:EFA Policy Assertion SAML2 Binding: Unterschied zwischen den Versionen

Aus Hl7wiki
Wechseln zu: Navigation, Suche
(Die Seite wurde neu angelegt: „== SAML 2.0 Profile for ECR Access Policy Assertions == {{NoteBox|This profile applies to scenarios where the eCR Context Manager requests an Access Policy Asser…“)
 
Zeile 1: Zeile 1:
== SAML 2.0 Profile for ECR Access Policy Assertions ==
+
== SAML 2.0 Profile for ECR Policy Assertions ==
  
{{NoteBox|This profile applies to scenarios where the eCR Context Manager requests an Access Policy Assertion from the eCR Policy Provider and thus implements a policy push authorization model.}}
+
{{NoteBox|This profile applies to scenarios where the eCR Context Manager requests an Access Policy Assertion from the eCR Policy Provider and thus implements a policy push authorization model. There is no specification in the case that the Authorization Decision Provider requests policies from the eCR Policy Provider.}}
 +
 
 +
{|class="wikitable" style="text-align: left; cellpadding: 10;"
 +
!colspan="4"|Assertion Element
 +
!Opt
 +
!Usage Convention
 +
|-
 +
|colspan="4"|@Version
 +
|R
 +
|MUST be “2.0”
 +
|-
 +
|colspan="4"|@ID
 +
|R
 +
|URN encoded unique identifier (UUID) of the assertion
 +
|-
 +
|colspan="4"|@IssueInstant
 +
|R
 +
|time instant of issuance in UTC
 +
|-
 +
|colspan="4"|Issuer
 +
|R
 +
|address URI that identifies the endpoint of the issuing service 
 +
|-
 +
|colspan="4"|Subject
 +
|R
 +
|This element defines the subject confirmation method of the user in order to use the Policy Assertion as a supporting token. Moreover, it defines the subject name identifier that accords with the user identity from an Identity Assertion.
 +
|-
 +
|
 +
|colspan="3"|NameID
 +
|R
 +
|Identifier of the HP given in the Identity Asstertion encoded as an X.509 subject name, an e-Mail address or as a string value (unspecified format). Only identifiers must be used that can be long-term tracked back to an individual person.
 +
|-
 +
|
 +
|
 +
|colspan="2"|@Format
 +
|R
 +
|MUST be ''urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified'' <br>
 +
or ''urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName''<br>
 +
or ''urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress''<br>
 +
For providing an OID as a subject identifier the ''unspecified'' format must be used. The OID must be provided as a string encoded in ISO format.
 +
|-
 +
|
 +
|colspan="3"|SubjectConfirmation
 +
|R
 +
|
 +
|-
 +
|
 +
|
 +
|colspan="2"|@Method
 +
|R
 +
|This element MUST hold a URI reference that identifies a protocol to be used to authenticate the subject.[SAML2.0core] The value of this element MUST be set to <br>
 +
''urn:oasis:names:tc:SAML:2.0:cm:holder-of-key''
 +
|-
 +
|
 +
|
 +
|colspan="2"|SubjectConfirmationData
 +
|R
 +
|
 +
|-
 +
|
 +
|
 +
|
 +
|ds:KeyInfo
 +
|R
 +
|The XML Signature [XMLSignature] element MUST embed a cryptographic key that is only held by the user. This can be the user’s public key (ds:KeyValue/ds:RSAKeyValue), the complete user’s X.509 certificate (ds:X509Data/ds:X509Certificate), or an encrypted symmetric key (xenc:EncryptedKey [XMLEncryption]). This symmetric key MUST be encrypted by using the public key of the consumer service’s certificate [eFA PKI 1.2].
 +
|-
 +
|colspan="4"|Conditions
 +
|R
 +
|
 +
|-
 +
|
 +
|colspan="3"|@NotBefore
 +
|R
 +
|time instant from which the assertion is useable. This condition MUST be assessed by the assertion consumer to proof the validity of the assertion.
 +
|-
 +
|
 +
|colspan="3"|@NotOnOrAfter
 +
|R
 +
|Time instant at which the assertion expires. This condition MUST be assessed by the assertion consumer to proof the validity of the assertion. The maximum validity timespan for a Policy Assertion MUST NOT be more than 4 hours.
 +
|-
 +
|colspan="4"|XACMLPolicyStatement
 +
|R
 +
|
 +
|-
 +
|
 +
|colspan="3"|Policy or PolicySet
 +
|R
 +
|Policy or PolicySet that expresses the authorization (see section below for details).
 +
|-
 +
|colspan="4"|ds:Signature
 +
|R
 +
|Enveloped XML signature of the issuer of the Policy Assertion (see section below for details).
 +
|}

Version vom 5. April 2013, 06:03 Uhr

SAML 2.0 Profile for ECR Policy Assertions

Assertion Element Opt Usage Convention
@Version R MUST be “2.0”
@ID R URN encoded unique identifier (UUID) of the assertion
@IssueInstant R time instant of issuance in UTC
Issuer R address URI that identifies the endpoint of the issuing service
Subject R This element defines the subject confirmation method of the user in order to use the Policy Assertion as a supporting token. Moreover, it defines the subject name identifier that accords with the user identity from an Identity Assertion.
NameID R Identifier of the HP given in the Identity Asstertion encoded as an X.509 subject name, an e-Mail address or as a string value (unspecified format). Only identifiers must be used that can be long-term tracked back to an individual person.
@Format R MUST be urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified

or urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName
or urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
For providing an OID as a subject identifier the unspecified format must be used. The OID must be provided as a string encoded in ISO format.

SubjectConfirmation R
@Method R This element MUST hold a URI reference that identifies a protocol to be used to authenticate the subject.[SAML2.0core] The value of this element MUST be set to

urn:oasis:names:tc:SAML:2.0:cm:holder-of-key

SubjectConfirmationData R
ds:KeyInfo R The XML Signature [XMLSignature] element MUST embed a cryptographic key that is only held by the user. This can be the user’s public key (ds:KeyValue/ds:RSAKeyValue), the complete user’s X.509 certificate (ds:X509Data/ds:X509Certificate), or an encrypted symmetric key (xenc:EncryptedKey [XMLEncryption]). This symmetric key MUST be encrypted by using the public key of the consumer service’s certificate [eFA PKI 1.2].
Conditions R
@NotBefore R time instant from which the assertion is useable. This condition MUST be assessed by the assertion consumer to proof the validity of the assertion.
@NotOnOrAfter R Time instant at which the assertion expires. This condition MUST be assessed by the assertion consumer to proof the validity of the assertion. The maximum validity timespan for a Policy Assertion MUST NOT be more than 4 hours.
XACMLPolicyStatement R
Policy or PolicySet R Policy or PolicySet that expresses the authorization (see section below for details).
ds:Signature R Enveloped XML signature of the issuer of the Policy Assertion (see section below for details).