IDP discovery workflow based on SAML, as specified
in the I-D Dynamic Automated Metadata Exchange
(DAME) (P
¨
ohn, 2015a). The TTP orchestrates the
metadata exchange, while the exchange itself can be
done by the Metadata Query Protocol.
Similar to the described TTP, the approach Trust
Service Provider (TSP) by Jian Jiang et al. (Jiang
et al., 2011) requires each entity to register at the cen-
tral TSP service. The TSP brokers the trust of two
entities during runtime. The metadata is downloaded
from the TSP and might be stored in the cache of an
entity. If a user wants to make use of a service, the SP
needs to query his local cache about the metadata of
the IDP. If the SP does not have the needed metadata,
it sends a request to the TSP. The IDP is required to
send another request, in order to fetch the metadata of
the SP. The metadata files have version numbers. If
the IDP is outside the federation, the SP of the home
federation of the IDP can be used as an IDP-Proxy for
indirect authentication. This also means, that the SP
needs to cache the assertion of the home IDP and that
each SP needs to run an IDP-Proxy. Additionally, the
version number is unnecessarily added to the meta-
data’s name.
The TTP, in contrast, does not need version numbers
and IDP-Proxys, as every federation and entity can
register at the TTP. Furthermore, federations can run
a distributed version of the TTPs, which communi-
cate with each other and exchange metadata across
TTPs. Therefore, entities do only need to register
once. The approach of the TTP automates the tech-
nical integration of new metadata on the SP as well as
on the IDP side. In order to integrate these informa-
tion automatically, an extension of existing software
is needed. The extension of the software can auto-
mate the manual steps by the information already in-
cluded into the metadata. This eliminates the manual
workload for SP and IDP administrators and avoids
waiting time for the end users. This is particularly the
case as the metadata can be exchanged across current
federations’ boarders.
The approach Dynamic Identity Federation by
Md. Sadek Ferdous and Ron Poet (Ferdous and
Poet, 2013) concentrates on the dynamic trust. Dy-
namic Identity Federation distinguishes between fully
trusted, semi-trusted, and untrusted entities. Authen-
ticated users are allowed to add SPs to their IDPs,
while SPs add the IDPs to their local trust anchor
list (TAL) for further usage. The user establishes the
trust by generating a code at his first authentication.
He then informs the SP about the code and the Enti-
tyID of the IDP. After verification, the SP generates
a request with two invisible fields, i. e., MetaAdd and
ReturnTo. Both fields are used for the metadata ex-
change, while the IDP needs to evaluate the value of
MetaAdd. When the user gives his consent, the IDP
adds the chosen SP to the list of semi-trusted entities.
Semi-trusted entities are not allowed to receive sen-
sitive attributes. Untrusted entities are given the Na-
tional Institute of Standards and Technology (NIST)
level of assurance (LoA) 1. If the SP is not known by
the IDP, a proxy could be used complicating the trust
establishment. The trust establishment via the user
generating and forwarding a code is not user friendly,
while both invisible fields are not necessary. The frag-
mentation into trusted, semi-trusted, and untrusted en-
tities as well as the usage of NIST LoA 1 does not
reflect real world with its different LoA schemes and
the trust relationships. As with the IDP discovery ser-
vice, all relevant information are integrated within the
SAML messages, additional fields are not required.
If the user trusts an SP, the SP is added to the IDP’s
TAL, which consists of all downloaded and integrated
metadata. If this fully automated trust is not wanted,
the IDP and SP can configure their LoA and the level
they want from their counterpart. If, e. g., the IDP
matches the level required by the SP, the metadata is
exchanged on-demand, while otherwise the adminis-
trators and the user are notified. Since many differ-
ent LoA are used within federations and most NREN
federation have around NIST LoA 1 or 2, a more fine-
grained LoA schema is needed, which can also map
different schemes. Furthermore, a federation admin-
istration tool is implemented for additional quality as-
surance.
Summing up, the TTP is a central service for on-
demand metadata exchange for IDPs and SPs. It
allows scalable metadata exchange, which is user
triggered and based on standard SAML workflows.
By software extensions it automates manual work-
flows and widens the trust boundaries, while, at the
same time, providing tools for quality assurance and
trust assurance. As the TTP is not an IDP proxy,
it is not involved in further communication. This
also reduces the likelihood of a bottleneck. Fur-
thermore, it could be operated distributively, as de-
scribed in (P
¨
ohn, 2015b). The theoretical approach
of a TTP is currently implemented and improved for
piloting within the project G
´
EANT, which runs the
inter-federation eduGAIN. In order to have a secure
implementation and all needed functions, the risk and
security management is regarded. While the proof
of concept implementation of the TTP is tailored for
SAML, the TTP and all its functionalities are generi-
cally designed, so it can be adopted to further proto-
cols without changes.
For the researcher described above, it means that
his IDP and all the SPs of the community have to reg-
Risk Management for Dynamic Metadata Exchange via a Trusted Third Party
229