Authentication Context for the OASIS Security Assertion Markup Language (SAML) V2.0
|
|
|
- Oscar Lang
- 10 years ago
- Views:
Transcription
1 Authentication Context for the OASIS Security Assertion Markup Language (SAML) V2.0 OASIS Standard, 15 March 2005 Document identifier: saml-authn-context-2.0-os Location: Editors: John Kemp, Nokia Scott Cantor, Internet2 Prateek Mishra, Principal Identity Rob Philpott, RSA Security Eve Maler, Sun Microsystems SAML V2.0 Contributors: Conor P. Cahill, AOL John Hughes, Atos Origin Hal Lockhart, BEA Systems Michael Beach, Boeing Rebekah Metz, Booz Allen Hamilton Rick Randall, Booz Allen Hamilton Thomas Wisniewski, Entrust Irving Reid, Hewlett-Packard Paula Austel, IBM Maryann Hondo, IBM Michael McIntosh, IBM Tony Nadalin, IBM Nick Ragouzis, Individual Scott Cantor, Internet2 RL 'Bob' Morgan, Internet2 Peter C Davis, Neustar Jeff Hodges, Neustar Frederick Hirsch, Nokia John Kemp, Nokia Paul Madsen, NTT Steve Anderson, OpenNetwork Prateek Mishra, Principal Identity John Linn, RSA Security Rob Philpott, RSA Security Jahan Moreh, Sigaba Anne Anderson, Sun Microsystems Eve Maler, Sun Microsystems Ron Monzillo, Sun Microsystems Copyright OASIS Open All Rights Reserved. Page 1 of 70
2 Greg Whitehead, Trustgenix Abstract: This specification defines a syntax for the definition of authentication context declarations and an initial list of authentication context classes for use with SAML. Status: This is an OASIS Standard document produced by the Security Services Technical Committee. It was approved by the OASIS membership on 1 March Committee members should submit comments and potential errata to the [email protected] list. Others should submit them by filling out the web form located at The committee will publish on its web page ( a catalog of any changes made to this document. For information on whether any patents have been disclosed that may be essential to implementing this specification, and any offers of patent licensing terms, please refer to the Intellectual Property Rights web page for the Security Services TC ( Copyright OASIS Open All Rights Reserved. Page 2 of 70
3 Table of Contents 1 Introduction Authentication Context Concepts Notation and Terminology Authentication Context Declaration Data Model Extensibility Processing Rules Schema Authentication Context Classes Advantages of Authentication Context Classes Processing Rules Extensibility Schemas Internet Protocol InternetProtocolPassword Kerberos MobileOneFactorUnregistered MobileTwoFactorUnregistered MobileOneFactorContract MobileTwoFactorContract Password PasswordProtectedTransport PreviousSession Public Key X Public Key PGP Public Key SPKI Public Key - XML Digital Signature Smartcard SmartcardPKI SoftwarePKI Telephony Telephony ("Nomadic") Telephony (Personalized) Telephony (Authenticated) Secure Remote Password SSL/TLS Certificate-Based Client Authentication TimeSyncToken Unspecified References...66 Appendix A. Acknowledgments...68 Appendix B. Notices...70 Copyright OASIS Open All Rights Reserved. Page 3 of 70
4 Introduction This specification defines a syntax for the definition of authentication context declarations and an initial list of authentication context classes. 1.1 Authentication Context Concepts If a relying party is to rely on the authentication of a principal by an authentication authority, the relying party may require information additional to the assertion itself in order to assess the level of confidence they can place in that assertion. This specification defines an XML Schema for the creation of Authentication Context declarations - XML documents that allow the authentication authority to provide to the relying party this additional information. Additionally, this specification defines a number of Authentication Context classes; categories into which many Authentication Context declarations will fall, thereby simplifying their interpretation. The OASIS Security Assertion Markup Language does not prescribe a single technology, protocol, or policy for the processes by which authentication authorities issue identities to principals and by which those principals subsequently authenticate themselves to the authentication authority. Different authentication authorities will choose different technologies, follow different processes, and be bound by different legal obligations with respect to how they authenticate principals. The choices that an authentication authority makes here will be driven in large part by the requirements of the relying parties with which the authentication authority interacts. These requirements themselves will be determined by the nature of the service (that is, the sensitivity of any information exchanged, the associated financial value, the relying parties' risk tolerance, etc.) that the relying party will be providing to the principal. Consequently, for anything other than trivial services, if the relying party is to place sufficient confidence in the authentication assertions it receives from an authentication authority, it will be necessary for it to know which technologies, protocols, and processes were used or followed for the original authentication mechanism on which the authentication assertion is based. Armed with this information and trusting the origin of the actual assertion, the relying party will be better able to make an informed entitlements decision regarding what services the subject of the authentication assertion should be allowed to access. Authentication context is defined as the information, additional to the authentication assertion itself, that the relying party may require before it makes an entitlements decision with respect to an authentication assertion. Such context may include, but is not limited to, the actual authentication method used (see the SAML assertions and protocols specification [SAMLCore] for more information). 1.2 Notation and Terminology The keywords "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this specification are to be interpreted as described in IETF RFC 2119 [RFC 2119]. Listings of XML schemas appear like this. Example code listings appear like this. This specification uses schema documents conforming to W3C XML Schema [Schema1] and normative text to describe the syntax and semantics of XML-encoded SAML assertions and protocol messages. In cases of disagreement between the SAML authentication context schema documents and schema listings in this specification, the schema documents take precedence. Note that in some cases the normative text of this specification imposes constraints beyond those indicated by the schema documents. Conventional XML namespace prefixes are used throughout the listings in this specification to stand for Copyright OASIS Open All Rights Reserved. Page 4 of 70
5 their respective namespaces as follows, whether or not a namespace declaration is present in the example: Prefix XML Namespace Comments ac: xs: urn:oasis:names:tc:saml:2.0:ac This is the namespace defined in this specification and in a schema [SAMLAC-xsd]. This namespace is defined in the W3C XML Schema specification [Schema1]. This specification uses the following typographical conventions in text: <SAMLElement>, <ns:foreignelement>, XMLAttribute, Datatype, OtherKeyword. Copyright OASIS Open All Rights Reserved. Page 5 of 70
6 Authentication Context Declaration If a relying party is to rely on the authentication of another entity by an authentication authority, the relying party may require information additional to the authentication itself to allow it to put the authentication into a risk-management context. This information could include: The initial user identification mechanisms (for example, face-to-face, online, shared secret). The mechanisms for minimizing compromise of credentials (for example, credential renewal frequency, client-side key generation). The mechanisms for storing and protecting credentials (for example, smartcard, password rules). The authentication mechanism or method (for example, password, certificate-based SSL). The variations and permutations in the characteristics listed above guarantee that not all authentication assertions will be the same with respect to the confidence that a relying party can place in it; a particular authentication assertion will be characterized by the values for each of these (and other) variables. A SAML authentication authority can deliver to a relying party the additional authentication context information in the form of an authentication context declaration, an XML document either inserted directly or referenced within the authentication assertion that the authentication authority provides to the relying party. SAML requesters are able to request that an authentication comply with a specified authentication context by identifying that context in an authentication request. A requester may also specify that an authentication must be conducted with an authentication context that exceeds some stated value (for some agreed definition of "exceeds"). See the SAML assertions and protocols specification [SAMLCore] for more information. 2.1 Data Model A particular authentication context declaration defined in this specification will capture characteristics of the processes, procedures, and mechanisms by which the authentication authority verified the subject before issuing an identity, protects the secrets on which subsequent authentications are based, and the mechanisms used for this authentication. These characteristics are categorized in the Authentication Context schema as follows: Identification - Characteristics that describe the processes and mechanism the authentication authority uses to initially create an association between a subject and the identity (or name) by which the subject will be known. Technical Protection - Characteristics that describe how the "secret" (the knowledge or possession of which allows the subject to authenticate to the authentication authority) is kept secure. Operational Protection - Characteristics that describe procedural security controls employed by the authentication authority (for example, security audits, records archival). Authentication Method - Characteristics that define the mechanisms by which the subject of the issued assertion authenticates to the authentication authority (for example, a password versus a smartcard). Governing Agreements - Characteristics that describe the legal framework (e.g. liability constraints and contractual obligations) underlying the authentication event and/or its associated technical authentication infrastructure. Copyright OASIS Open All Rights Reserved. Page 6 of 70
7 Extensibility The authentication context declaration schema [SAMLAC-xsd] has well-defined extensibility points through the <Extension> element. Authentication authorities can use this element to insert additional authentication context details for the SAML assertions they issue (assuming that the consuming relying party will be able to understand these extensions). These additional elements MUST be in a separate XML Namespace to that of the authentication context declaration base or class schema that applies to the declaration itself. 2.3 Processing Rules Additional processing rules for authentication context declarations are specified in the SAML assertions and protocols specification [SAMLCore]. Note that in most respects, these processing rules amount to deployments sharing common interpretations of the relative strength or quality of particular authentication context declarations and cannot be expressed in absolute terms or provided as rules that implementations must follow. 2.4 Schema This section lists the complete Authentication Context Types XML Schema [SAMLAC-Types], and the Authentication Context XML schema [SAMLAC-xsd] itself, used for the validation of individual generalized declarations. The types schema has no target namespace itself, and is then included by [SAMLAC-xsd]. <?xml version="1.0" encoding="utf-8"?> <xs:schema xmlns:xs=" elementformdefault="qualified" version="2.0"> Document identifier: saml-schema-authn-context-types-2.0 Location: Revision history: V2.0 (March, 2005): New core authentication context schema types for SAML V2.0. <xs:element name="authenticationcontextdeclaration" type="authncontextdeclarationbasetype"> A particular assertion on an identity provider's part with respect to the authentication context associated with an authentication assertion. <xs:element name="identification" type="identificationtype"> Refers to those characteristics that describe the processes and mechanisms the Authentication Authority uses to initially create an association between a Principal and the identity (or name) by which the Principal will be known Copyright OASIS Open All Rights Reserved. Page 7 of 70
8 <xs:element name="physicalverification"> This element indicates that identification has been performed in a physical face-to-face meeting with the principal and not in an online manner. <xs:complextype> <xs:attribute name="credentiallevel"> <xs:simpletype> <xs:restriction base="xs:nmtoken"> <xs:enumeration value="primary"/> <xs:enumeration value="secondary"/> </xs:simpletype> </xs:attribute> <xs:element name="writtenconsent" type="extensiononlytype"/> <xs:element name="technicalprotection" type="technicalprotectionbasetype"> Refers to those characterstics that describe how the 'secret' (the knowledge or possession of which allows the Principal to authenticate to the Authentication Authority) is kept secure <xs:element name="secretkeyprotection" type="secretkeyprotectiontype"> This element indicates the types and strengths of facilities of a UA used to protect a shared secret key from unauthorized access and/or use. <xs:element name="privatekeyprotection" type="privatekeyprotectiontype"> This element indicates the types and strengths of facilities of a UA used to protect a private key from unauthorized access and/or use. <xs:element name="keyactivation" type="keyactivationtype"> The actions that must be performed before the private key can be used. <xs:element name="keysharing" type="keysharingtype"> Whether or not the private key is shared Copyright OASIS Open All Rights Reserved. Page 8 of 70
9 with the certificate authority. <xs:element name="keystorage" type="keystoragetype"> In which medium is the key stored. memory - the key is stored in memory. smartcard - the key is stored in a smartcard. token - the key is stored in a hardware token. MobileDevice - the key is stored in a mobile device. MobileAuthCard - the key is stored in a mobile authentication card. <xs:element name="subscriberlinenumber" type="extensiononlytype"/> <xs:element name="usersuffix" type="extensiononlytype"/> <xs:element name="password" type="passwordtype"> This element indicates that a password (or passphrase) has been used to authenticate the Principal to a remote system. <xs:element name="activationpin" type="activationpintype"> This element indicates that a Pin (Personal Identification Number) has been used to authenticate the Principal to some local system in order to activate a key. <xs:element name="token" type="tokentype"> This element indicates that a hardware or software token is used as a method of identifying the Principal. <xs:element name="timesynctoken" type="timesynctokentype"> This element indicates that a time synchronization token is used to identify the Principal. hardware - the time synchonization token has been implemented in hardware. software - the time synchronization token has been implemented in software. SeedLength - the length, in bits, of the random seed used in the time synchronization token. <xs:element name="smartcard" type="extensiononlytype"> Copyright OASIS Open All Rights Reserved. Page 9 of 70
10 This element indicates that a smartcard is used to identity the Principal. <xs:element name="length" type="lengthtype"> This element indicates the minimum and/or maximum ASCII length of the password which is enforced (by the UA or the IdP). In other words, this is the minimum and/or maximum number of ASCII characters required to represent a valid password. min - the minimum number of ASCII characters required in a valid password, as enforced by the UA or the IdP. max - the maximum number of ASCII characters required in a valid password, as enforced by the UA or the IdP. <xs:element name="activationlimit" type="activationlimittype"> This element indicates the length of time for which an PIN-based authentication is valid. <xs:element name="generation"> Indicates whether the password was chosen by the Principal or auto-supplied by the Authentication Authority. principalchosen - the Principal is allowed to choose the value of the password. This is true even if the initial password is chosen at random by the UA or the IdP and the Principal is then free to change the password. automatic - the password is chosen by the UA or the IdP to be cryptographically strong in some sense, or to satisfy certain password rules, and that the Principal is not free to change it or to choose a new password. <xs:complextype> <xs:attribute name="mechanism" use="required"> <xs:simpletype> <xs:restriction base="xs:nmtoken"> <xs:enumeration value="principalchosen"/> <xs:enumeration value="automatic"/> </xs:simpletype> </xs:attribute> <xs:element name="authnmethod" type="authnmethodbasetype"> Refers to those characteristics that define the mechanisms by which the Principal authenticates to the Authentication Authority. Copyright OASIS Open All Rights Reserved. Page 10 of 70
11 <xs:element name="principalauthenticationmechanism" type="principalauthenticationmechanismtype"> The method that a Principal employs to perform authentication to local system components. <xs:element name="authenticator" type="authenticatorbasetype"> The method applied to validate a principal's authentication across a network <xs:element name="complexauthenticator" type="complexauthenticatortype"> Supports Authenticators with nested combinations of additional complexity. <xs:element name="previoussession" type="extensiononlytype"> Indicates that the Principal has been strongly authenticated in a previous session during which the IdP has set a cookie in the UA. During the present session the Principal has only been authenticated by the UA returning the cookie to the IdP. <xs:element name="resumesession" type="extensiononlytype"> Rather like PreviousSession but using stronger security. A secret that was established in a previous session with the Authentication Authority has been cached by the local system and is now re-used (e.g. a Master Secret is used to derive new session keys in TLS, SSL, WTLS). <xs:element name="zeroknowledge" type="extensiononlytype"> This element indicates that the Principal has been authenticated by a zero knowledge technique as specified in ISO/IEC <xs:element name="sharedsecretchallengeresponse" type="sharedsecretchallengeresponsetype"/> Copyright OASIS Open All Rights Reserved. Page 11 of 70
12 <xs:complextype name="sharedsecretchallengeresponsetype"> This element indicates that the Principal has been authenticated by a challenge-response protocol utilizing shared secret keys and symmetric cryptography. <xs:attribute name="method" type="xs:anyuri" use="optional"/> <xs:element name="digsig" type="publickeytype"> This element indicates that the Principal has been authenticated by a mechanism which involves the Principal computing a digital signature over at least challenge data provided by the IdP. <xs:element name="asymmetricdecryption" type="publickeytype"> The local system has a private key but it is used in decryption mode, rather than signature mode. For example, the Authentication Authority generates a secret and encrypts it using the local system's public key: the local system then proves it has decrypted the secret. <xs:element name="asymmetrickeyagreement" type="publickeytype"> The local system has a private key and uses it for shared secret key agreement with the Authentication Authority (e.g. via Diffie Helman). <xs:complextype name="publickeytype"> <xs:attribute name="keyvalidation" use="optional"/> <xs:element name="ipaddress" type="extensiononlytype"> This element indicates that the Principal has been authenticated through connection from a particular IP address. <xs:element name="sharedsecretdynamicplaintext" type="extensiononlytype"> The local system and Authentication Authority Copyright OASIS Open All Rights Reserved. Page 12 of 70
13 share a secret key. The local system uses this to encrypt a randomised string to pass to the Authentication Authority. <xs:element name="authenticatortransportprotocol" type="authenticatortransportprotocoltype"> The protocol across which Authenticator information is transferred to an Authentication Authority verifier. <xs:element name="http" type="extensiononlytype"> This element indicates that the Authenticator has been transmitted using bare HTTP utilizing no additional security protocols. <xs:element name="ipsec" type="extensiononlytype"> This element indicates that the Authenticator has been transmitted using a transport mechanism protected by an IPSEC session. <xs:element name="wtls" type="extensiononlytype"> This element indicates that the Authenticator has been transmitted using a transport mechanism protected by a WTLS session. <xs:element name="mobilenetworknoencryption" type="extensiononlytype"> This element indicates that the Authenticator has been transmitted solely across a mobile network using no additional security mechanism. <xs:element name="mobilenetworkradioencryption" type="extensiononlytype"/> <xs:element name="mobilenetworkendtoendencryption" type="extensiononlytype"/> <xs:element name="ssl" type="extensiononlytype"> This element indicates that the Authenticator has been transmitted using a transport mechnanism protected by an SSL or TLS session. Copyright OASIS Open All Rights Reserved. Page 13 of 70
14 <xs:element name="pstn" type="extensiononlytype"/> <xs:element name="isdn" type="extensiononlytype"/> <xs:element name="adsl" type="extensiononlytype"/> <xs:element name="operationalprotection" type="operationalprotectiontype"> Refers to those characteristics that describe procedural security controls employed by the Authentication Authority. <xs:element name="securityaudit" type="securityaudittype"/> <xs:element name="switchaudit" type="extensiononlytype"/> <xs:element name="deactivationcallcenter" type="extensiononlytype"/> <xs:element name="governingagreements" type="governingagreementstype"> Provides a mechanism for linking to external (likely human readable) documents in which additional business agreements, (e.g. liability constraints, obligations, etc) can be placed. <xs:element name="governingagreementref" type="governingagreementreftype"/> <xs:simpletype name="nymtype"> <xs:restriction base="xs:nmtoken"> <xs:enumeration value="anonymity"/> <xs:enumeration value="verinymity"/> <xs:enumeration value="pseudonymity"/> </xs:simpletype> <xs:complextype name="authncontextdeclarationbasetype"> <xs:element ref="identification" minoccurs="0"/> <xs:element ref="technicalprotection" minoccurs="0"/> <xs:element ref="operationalprotection" minoccurs="0"/> <xs:element ref="authnmethod" minoccurs="0"/> <xs:element ref="governingagreements" minoccurs="0"/> <xs:attribute name="id" type="xs:id" use="optional"/> <xs:complextype name="identificationtype"> <xs:element ref="physicalverification" minoccurs="0"/> <xs:element ref="writtenconsent" minoccurs="0"/> <xs:element ref="governingagreements" minoccurs="0"/> <xs:attribute name="nym" type="nymtype"> This attribute indicates whether or not the Identification mechanisms allow the actions of the Principal to be linked to an actual end user. </xs:attribute> Copyright OASIS Open All Rights Reserved. Page 14 of 70
15 <xs:complextype name="technicalprotectionbasetype"> <xs:choice minoccurs="0"> <xs:element ref="privatekeyprotection"/> <xs:element ref="secretkeyprotection"/> </xs:choice> <xs:complextype name="operationalprotectiontype"> <xs:element ref="securityaudit" minoccurs="0"/> <xs:element ref="deactivationcallcenter" minoccurs="0"/> <xs:complextype name="authnmethodbasetype"> <xs:element ref="principalauthenticationmechanism" minoccurs="0"/> <xs:element ref="authenticator" minoccurs="0"/> <xs:element ref="authenticatortransportprotocol" minoccurs="0"/> <xs:complextype name="governingagreementstype"> <xs:element ref="governingagreementref" maxoccurs="unbounded"/> <xs:complextype name="governingagreementreftype"> <xs:attribute name="governingagreementref" type="xs:anyuri" use="required"/> <xs:complextype name="principalauthenticationmechanismtype"> <xs:element ref="password" minoccurs="0"/> <xs:element ref="restrictedpassword" minoccurs="0"/> <xs:element ref="token" minoccurs="0"/> <xs:element ref="smartcard" minoccurs="0"/> <xs:element ref="activationpin" minoccurs="0"/> <xs:attribute name="preauth" type="xs:integer" use="optional"/> <xs:group name="authenticatorchoicegroup"> <xs:choice> <xs:element ref="previoussession"/> <xs:element ref="resumesession"/> <xs:element ref="digsig"/> <xs:element ref="password"/> <xs:element ref="restrictedpassword"/> <xs:element ref="zeroknowledge"/> <xs:element ref="sharedsecretchallengeresponse"/> <xs:element ref="sharedsecretdynamicplaintext"/> <xs:element ref="ipaddress"/> <xs:element ref="asymmetricdecryption"/> <xs:element ref="asymmetrickeyagreement"/> <xs:element ref="subscriberlinenumber"/> <xs:element ref="usersuffix"/> <xs:element ref="complexauthenticator"/> </xs:choice> </xs:group> Copyright OASIS Open All Rights Reserved. Page 15 of 70
16 <xs:group name="authenticatorsequencegroup"> <xs:element ref="previoussession" minoccurs="0"/> <xs:element ref="resumesession" minoccurs="0"/> <xs:element ref="digsig" minoccurs="0"/> <xs:element ref="password" minoccurs="0"/> <xs:element ref="restrictedpassword" minoccurs="0"/> <xs:element ref="zeroknowledge" minoccurs="0"/> <xs:element ref="sharedsecretchallengeresponse" minoccurs="0"/> <xs:element ref="sharedsecretdynamicplaintext" minoccurs="0"/> <xs:element ref="ipaddress" minoccurs="0"/> <xs:element ref="asymmetricdecryption" minoccurs="0"/> <xs:element ref="asymmetrickeyagreement" minoccurs="0"/> <xs:element ref="subscriberlinenumber" minoccurs="0"/> <xs:element ref="usersuffix" minoccurs="0"/> </xs:group> <xs:complextype name="authenticatorbasetype"> <xs:group ref="authenticatorchoicegroup"/> <xs:group ref="authenticatorsequencegroup"/> <xs:complextype name="complexauthenticatortype"> <xs:group ref="authenticatorchoicegroup"/> <xs:group ref="authenticatorsequencegroup"/> <xs:complextype name="authenticatortransportprotocoltype"> <xs:choice minoccurs="0"> <xs:element ref="http"/> <xs:element ref="ssl"/> <xs:element ref="mobilenetworknoencryption"/> <xs:element ref="mobilenetworkradioencryption"/> <xs:element ref="mobilenetworkendtoendencryption"/> <xs:element ref="wtls"/> <xs:element ref="ipsec"/> <xs:element ref="pstn"/> <xs:element ref="isdn"/> <xs:element ref="adsl"/> </xs:choice> <xs:complextype name="keyactivationtype"> <xs:element ref="activationpin" minoccurs="0"/> <xs:complextype name="keysharingtype"> <xs:attribute name="sharing" type="xs:boolean" use="required"/> <xs:complextype name="privatekeyprotectiontype"> <xs:element ref="keyactivation" minoccurs="0"/> <xs:element ref="keystorage" minoccurs="0"/> Copyright OASIS Open All Rights Reserved. Page 16 of 70
17 <xs:element ref="keysharing" minoccurs="0"/> <xs:complextype name="passwordtype"> <xs:element ref="length" minoccurs="0"/> <xs:element ref="alphabet" minoccurs="0"/> <xs:element ref="generation" minoccurs="0"/> <xs:attribute name="externalverification" type="xs:anyuri" use="optional"/> <xs:element name="restrictedpassword" type="restrictedpasswordtype"/> <xs:complextype name="restrictedpasswordtype"> <xs:restriction base="passwordtype"> <xs:element name="length" type="restrictedlengthtype" minoccurs="1"/> <xs:element ref="generation" minoccurs="0"/> <xs:attribute name="externalverification" type="xs:anyuri" use="optional"/> <xs:complextype name="restrictedlengthtype"> <xs:restriction base="lengthtype"> <xs:attribute name="min" use="required"> <xs:simpletype> <xs:restriction base="xs:integer"> <xs:mininclusive value="3"/> </xs:simpletype> </xs:attribute> <xs:attribute name="max" type="xs:integer" use="optional"/> <xs:complextype name="activationpintype"> <xs:element ref="length" minoccurs="0"/> <xs:element ref="alphabet" minoccurs="0"/> <xs:element ref="generation" minoccurs="0"/> <xs:element ref="activationlimit" minoccurs="0"/> <xs:element name="alphabet" type="alphabettype"/> <xs:complextype name="alphabettype"> <xs:attribute name="requiredchars" type="xs:string" use="required"/> <xs:attribute name="excludedchars" type="xs:string" use="optional"/> <xs:attribute name="case" type="xs:string" use="optional"/> <xs:complextype name="tokentype"> <xs:element ref="timesynctoken"/> Copyright OASIS Open All Rights Reserved. Page 17 of 70
18 <xs:simpletype name="devicetypetype"> <xs:restriction base="xs:nmtoken"> <xs:enumeration value="hardware"/> <xs:enumeration value="software"/> </xs:simpletype> <xs:simpletype name="booleantype"> <xs:restriction base="xs:nmtoken"> <xs:enumeration value="true"/> <xs:enumeration value="false"/> </xs:simpletype> <xs:complextype name="timesynctokentype"> <xs:attribute name="devicetype" type="devicetypetype" use="required"/> <xs:attribute name="seedlength" type="xs:integer" use="required"/> <xs:attribute name="deviceinhand" type="booleantype" use="required"/> <xs:complextype name="activationlimittype"> <xs:choice> <xs:element ref="activationlimitduration"/> <xs:element ref="activationlimitusages"/> <xs:element ref="activationlimitsession"/> </xs:choice> <xs:element name="activationlimitduration" type="activationlimitdurationtype"> This element indicates that the Key Activation Limit is defined as a specific duration of time. <xs:element name="activationlimitusages" type="activationlimitusagestype"> This element indicates that the Key Activation Limit is defined as a number of usages. <xs:element name="activationlimitsession" type="activationlimitsessiontype"> This element indicates that the Key Activation Limit is the session. <xs:complextype name="activationlimitdurationtype"> <xs:attribute name="duration" type="xs:duration" use="required"/> <xs:complextype name="activationlimitusagestype"> <xs:attribute name="number" type="xs:integer" use="required"/> <xs:complextype name="activationlimitsessiontype"/> Copyright OASIS Open All Rights Reserved. Page 18 of 70
19 <xs:complextype name="lengthtype"> <xs:attribute name="min" type="xs:integer" use="required"/> <xs:attribute name="max" type="xs:integer" use="optional"/> <xs:simpletype name="mediumtype"> <xs:restriction base="xs:nmtoken"> <xs:enumeration value="memory"/> <xs:enumeration value="smartcard"/> <xs:enumeration value="token"/> <xs:enumeration value="mobiledevice"/> <xs:enumeration value="mobileauthcard"/> </xs:simpletype> <xs:complextype name="keystoragetype"> <xs:attribute name="medium" type="mediumtype" use="required"/> <xs:complextype name="secretkeyprotectiontype"> <xs:element ref="keyactivation" minoccurs="0"/> <xs:element ref="keystorage" minoccurs="0"/> <xs:complextype name="securityaudittype"> <xs:element ref="switchaudit" minoccurs="0"/> <xs:complextype name="extensiononlytype"> <xs:element name="extension" type="extensiontype"/> <xs:complextype name="extensiontype"> <xs:any namespace="##other" processcontents="lax" maxoccurs="unbounded"/> </xs:schema> <?xml version="1.0" encoding="utf-8"?> <xs:schema targetnamespace="urn:oasis:names:tc:saml:2.0:ac" xmlns:xs=" xmlns="urn:oasis:names:tc:saml:2.0:ac" blockdefault="substitution" version="2.0"> Document identifier: saml-schema-authn-context-2.0 Location: Revision history: Copyright OASIS Open All Rights Reserved. Page 19 of 70
20 V2.0 (March, 2005): New core authentication context schema for SAML V2.0. This is just an include of all types from the schema referred to in the include statement below. <xs:include schemalocation="saml-schema-authn-context-types-2.0.xsd"/> </xs:schema> Copyright OASIS Open All Rights Reserved. Page 20 of 70
21 Authentication Context Classes The number of permutations of different characteristics ensures that there is a theoretically infinite number of unique authentication contexts. The implication is that, in theory, any particular relying party would be expected to be able to parse arbitrary authentication context declarations and, more importantly, to analyze the declaration in order to assess the quality of the associated authentication assertion. Making such an assessment is non-trivial. Fortunately, an optimization is possible. In practice many authentication contexts will fall into categories determined by industry practices and technology. For instance, many B2C web browser authentication contexts will be (partially) defined by the principal authenticating to the authentication authority through the presentation of a password over an SSL protected session. In the enterprise world, certificate-based authentication will be common. Of course, the full authentication context is not limited to the specifics of how the principal authenticated. Nevertheless, the authentication method is often the most visible characteristic and as such, can serve as a useful classifer for a class of related authentication contexts. The concept is expressed in this specification as a definition of a series of authentication context classes. Each class defines a proper subset of the full set of authentication contexts. Classes have been chosen as representative of the current practices and technologies for authentication technologies, and provide asserting and relying parties a convenient shorthand when referring to authentication context issues. For instance, an authentication authority may include with the complete authentication context declaration it provides to a relying party an assertion that the authentication context also belongs to an authentication context class. For some relying parties, this assertion is sufficient detail for it to be able to assign an appropriate level of confidence to the associated authentication assertion. Other relying parties might prefer to examine the complete authentication context declaration itself. Likewise, the ability to refer to an authentication context class rather than being required to list the complete details of a specific authentication context declaration will simplify how the relying party can express its desires and/or requirements to an authentication authority. 3.1 Advantages of Authentication Context Classes The introduction of the additional layer of classes and the definition of an initial list of representative and flexible classes are expected to: Make it easier for the authentication authority and relying party to come to an agreement on what are acceptable authentication contexts by giving them a framework for discussion. Make it easier for relying parties to indicate their preferences when requesting a step-up authentication assertion from an authentication authority. Simplify for relying parties the burden of processing authentication context declarations by giving them the option of being satisfied by the associated class. Insulate relying parties from the impact of new authentication technologies. Make it easier for authentication authorities to publish their authentication capabilities, for example, through WSDL Processing Rules Further processing rules for authentication context classes are described in the SAML assertions and protocols specification [SAMLCore]. Note that in most respects, these processing rules amount to deployments sharing common interpretations of the relative strength or quality of particular authentication context classes and cannot be expressed in absolute terms or provided as rules that implementations must follow. Copyright OASIS Open All Rights Reserved. Page 21 of 70
22 Extensibility As does the core authentication context declaration schema, the separate authentication context class schemas allow the <Extension> element in certain locations of the tree structure. In general, where the <Extension> element occurred as a child of an <xs:choice> element, this option was removed in creating the appropriate class schema definition as a restriction of the base type. When the <Extension> element occurred as an optional child of an element, the <Extension> element was allowed to remain in addition to any required elements. Consequently, authentication context declarations can include the <Extension> element (with additional elements in different namespaces) and still conform to authentication context class schemas (if they meet the other requirements of the schema of course). The authentication context class schemas restrict type definitions in the base authentication context schema. As an extension point, the authentication context class schemas themselves can be further restricted their type definitions serving as base types in some other schema (potentially defined by some community wishing a more tightly defined authentication context class). To prevent logical inconsistencies, any such schema extensions can only further constrain the type definitions of the class schema. To enforce this constraint, the authentication context class schemas are defined with the finaldefault="extension" attribute on the <schema> element to prevent this type of derivation. Additional authentication context classes MAY be developed by groups other than the Security Services Technical Committee. OASIS members may wish to document and submit them for consideration by the SSTC in a future version of the specification, and other groups may simply wish to inform the committee of their work. Please refer to the SSTC web site for further details. Guidelines for the specification of new context classes are as follows: Specify a URI that uniquely identifies the context class. Provide contact information for the author of the class. Provide a textual description of the circumstances under which this class should be used. Provide a valid XML schema [Schema1] document implementing the class. Authors of new classes are encouraged to review the classes defined within this specification in order to guide their work. 3.4 Schemas Authentication context classes are listed in the following sub-sections. The classes are listed in alphabetical order; no other ranking is implied by the order of classes. Classes are uniquely identified by URIs with the following initial stem: urn:oasis:names:tc:saml:2.0:ac:classes The class schemas are defined as restrictions of parts of the base authentication context "types" schema. XML instances that validate against a given authentication context class schema are said to conform to that authentication context class. Note that because the class schema imports and redefines the elements and types into the class schema namespace, a class-conforming authentication context declaration does not simultaneously validate against the base authentication context schema Internet Protocol URI: urn:oasis:names:tc:saml:2.0:ac:classes:internetprotocol Note that this URI is also used as the target namespace in the corresponding authentication context class schema document [SAMLAC-IP]. Copyright OASIS Open All Rights Reserved. Page 22 of 70
23 The Internet Protocol class is applicable when a principal is authenticated through the use of a provided IP address. <?xml version="1.0" encoding="utf-8"?> <xs:schema targetnamespace="urn:oasis:names:tc:saml:2.0:ac:classes:internetprotocol" xmlns:xs=" xmlns="urn:oasis:names:tc:saml:2.0:ac:classes:internetprotocol" finaldefault="extension" blockdefault="substitution" version="2.0"> <xs:redefine schemalocation="saml-schema-authn-context-types-2.0.xsd"> Class identifier: urn:oasis:names:tc:saml:2.0:ac:classes:internetprotocol Document identifier: saml-schema-authn-context-ip-2.0 Location: Revision history: V2.0 (March, 2005): New authentication context class schema for SAML V2.0. <xs:complextype name="authncontextdeclarationbasetype"> <xs:restriction base="authncontextdeclarationbasetype"> <xs:element ref="identification" minoccurs="0"/> <xs:element ref="technicalprotection" minoccurs="0"/> <xs:element ref="operationalprotection" minoccurs="0"/> <xs:element ref="authnmethod"/> <xs:element ref="governingagreements" minoccurs="0"/> <xs:attribute name="id" type="xs:id" use="optional"/> <xs:complextype name="authnmethodbasetype"> <xs:restriction base="authnmethodbasetype"> <xs:element ref="principalauthenticationmechanism" minoccurs="0"/> <xs:element ref="authenticator"/> <xs:element ref="authenticatortransportprotocol" minoccurs="0"/> <xs:complextype name="authenticatorbasetype"> <xs:restriction base="authenticatorbasetype"> <xs:element ref="ipaddress"/> </xs:redefine> Copyright OASIS Open All Rights Reserved. Page 23 of 70
24 </xs:schema> InternetProtocolPassword URI: urn:oasis:names:tc:saml:2.0:ac:classes:internetprotocolpassword Note that this URI is also used as the target namespace in the corresponding authentication context class schema document [SAMLAC-IPP]. The Internet Protocol Password class is applicable when a principal is authenticated through the use of a provided IP address, in addition to a username/password. <?xml version="1.0" encoding="utf-8"?> <xs:schema targetnamespace="urn:oasis:names:tc:saml:2.0:ac:classes:internetprotocolpassw ord" xmlns:ac="urn:oasis:names:tc:saml:2.0:ac" xmlns:xs=" xmlns="urn:oasis:names:tc:saml:2.0:ac:classes:internetprotocolpassword" finaldefault="extension" blockdefault="substitution" version="2.0"> <xs:redefine schemalocation="saml-schema-authn-context-types-2.0.xsd"> Class identifier: urn:oasis:names:tc:saml:2.0:ac:classes:internetprotocolpassword Document identifier: saml-schema-authn-context-ippword-2.0 Location: Revision history: V2.0 (March, 2005): New authentication context class schema for SAML V2.0. <xs:complextype name="authncontextdeclarationbasetype"> <xs:restriction base="authncontextdeclarationbasetype"> <xs:element ref="identification" minoccurs="0"/> <xs:element ref="technicalprotection" minoccurs="0"/> <xs:element ref="operationalprotection" minoccurs="0"/> <xs:element ref="authnmethod"/> <xs:element ref="governingagreements" minoccurs="0"/> <xs:attribute name="id" type="xs:id" use="optional"/> <xs:complextype name="authnmethodbasetype"> <xs:restriction base="authnmethodbasetype"> <xs:element ref="principalauthenticationmechanism" minoccurs="0"/> <xs:element ref="authenticator"/> <xs:element ref="authenticatortransportprotocol" minoccurs="0"/> Copyright OASIS Open All Rights Reserved. Page 24 of 70
25 <xs:complextype name="authenticatorbasetype"> <xs:restriction base="authenticatorbasetype"> <xs:element ref="password"/> <xs:element ref="ipaddress"/> </xs:redefine> </xs:schema> Kerberos URI: urn:oasis:names:tc:saml:2.0:ac:classes:kerberos Note that this URI is also used as the target namespace in the corresponding authentication context class schema document [SAMLAC-Kerb]. This class is applicable when the principal has authenticated using a password to a local authentication authority, in order to acquire a Kerberos ticket. That Kerberos ticket is then used for subsequent network authentication. Note: It is possible for the authentication authority to indicate (via this context class) a preauthentication data type which was used by the Kerberos Key Distribution Center [RFC 1510] when authenticating the principal. The method used by the authentication authority to obtain this information is outside of the scope of this specification, but it is strongly recommended that a trusted method be deployed to pass the pre-authentication data type and any other Kerberos related context details (e.g. ticket lifetime) to the authentication authority. <?xml version="1.0" encoding="utf-8"?> <xs:schema targetnamespace="urn:oasis:names:tc:saml:2.0:ac:classes:kerberos" xmlns:xs=" xmlns="urn:oasis:names:tc:saml:2.0:ac:classes:kerberos" finaldefault="extension" blockdefault="substitution" version="2.0"> <xs:redefine schemalocation="saml-schema-authn-context-types-2.0.xsd"> Class identifier: urn:oasis:names:tc:saml:2.0:ac:classes:kerberos Document identifier: saml-schema-authn-context-kerberos-2.0 Location: Revision history: V2.0 (March, 2005): New authentication context class schema for SAML V2.0. <xs:complextype name="authncontextdeclarationbasetype"> <xs:restriction base="authncontextdeclarationbasetype"> <xs:element ref="identification" minoccurs="0"/> <xs:element ref="technicalprotection" minoccurs="0"/> <xs:element ref="operationalprotection" minoccurs="0"/> Copyright OASIS Open All Rights Reserved. Page 25 of 70
26 <xs:element ref="authnmethod"/> <xs:element ref="governingagreements" minoccurs="0"/> <xs:attribute name="id" type="xs:id" use="optional"/> <xs:complextype name="authnmethodbasetype"> <xs:restriction base="authnmethodbasetype"> <xs:element ref="principalauthenticationmechanism"/> <xs:element ref="authenticator"/> <xs:element ref="authenticatortransportprotocol" minoccurs="0"/> <xs:complextype name="principalauthenticationmechanismtype"> <xs:restriction base="principalauthenticationmechanismtype"> <xs:element ref="restrictedpassword"/> <xs:attribute name="preauth" type="xs:integer" use="optional"/> <xs:complextype name="authenticatorbasetype"> <xs:restriction base="authenticatorbasetype"> <xs:element ref="sharedsecretchallengeresponse"/> <xs:complextype name="sharedsecretchallengeresponsetype"> <xs:restriction base="sharedsecretchallengeresponsetype"> <xs:attribute name="method" type="xs:anyuri" fixed="urn:oasis:names:tc:saml:2.0:ac:classes:kerberos"/> </xs:redefine> </xs:schema> Copyright OASIS Open All Rights Reserved. Page 26 of 70
27 An example of an XML instance conforming to this class schema is as follows: <AuthenticationContextDeclaration xmlns="urn:oasis:names:tc:saml:2.0:ac:classes:kerberos"> <AuthnMethod> <PrincipalAuthenticationMechanism preauth="0"> <RestrictedPassword> <Length min="4"/> </RestrictedPassword> </PrincipalAuthenticationMechanism> <Authenticator> <AuthenticatorSequence> <SharedSecretChallengeResponse method="urn:oasis:names:tc:saml:2.0:ac:classes:kerberos"/> </AuthenticatorSequence> </Authenticator> </AuthnMethod> </AuthenticationContextDeclaration> MobileOneFactorUnregistered URI: urn:oasis:names:tc:saml:2.0:ac:classes:mobileonefactorunregistered Note that this URI is also used as the target namespace in the corresponding authentication context class schema document [SAMLAC-MOFU]. Reflects no mobile customer registration procedures and an authentication of the mobile device without requiring explicit end-user interaction. This context class authenticates only the device and never the user; it is useful when services other than the mobile operator want to add a secure device authentication to their authentication process. <?xml version="1.0" encoding="utf-8"?> <xs:schema targetnamespace="urn:oasis:names:tc:saml:2.0:ac:classes:mobileonefactorunregi stered" xmlns:xs=" xmlns="urn:oasis:names:tc:saml:2.0:ac:classes:mobileonefactorunregistered" finaldefault="extension" blockdefault="substitution" version="2.0"> <xs:redefine schemalocation="saml-schema-authn-context-types-2.0.xsd"> Class identifier: urn:oasis:names:tc:saml:2.0:ac:classes:mobileonefactorunregistered Document identifier: saml-schema-authn-context-mobileonefactor-unreg-2.0 Location: Revision history: V2.0 (March, 2005): New authentication context class schema for SAML V2.0. <xs:complextype name="authncontextdeclarationbasetype"> <xs:restriction base="authncontextdeclarationbasetype"> <xs:element ref="identification" minoccurs="0"/> Copyright OASIS Open All Rights Reserved. Page 27 of 70
28 <xs:element ref="technicalprotection" minoccurs="0"/> <xs:element ref="operationalprotection" minoccurs="0"/> <xs:element ref="authnmethod"/> <xs:element ref="governingagreements" minoccurs="0"/> <xs:attribute name="id" type="xs:id" use="optional"/> <xs:complextype name="authnmethodbasetype"> <xs:restriction base="authnmethodbasetype"> <xs:element ref="principalauthenticationmechanism" minoccurs="0"/> <xs:element ref="authenticator"/> <xs:element ref="authenticatortransportprotocol" minoccurs="0"/> <xs:complextype name="authenticatorbasetype"> <xs:restriction base="authenticatorbasetype"> <xs:choice> <xs:element ref="digsig"/> <xs:element ref="zeroknowledge"/> <xs:element ref="sharedsecretchallengeresponse"/> <xs:element ref="sharedsecretdynamicplaintext"/> <xs:element ref="asymmetricdecryption"/> <xs:element ref="asymmetrickeyagreement"/> </xs:choice> <xs:complextype name="authenticatortransportprotocoltype"> <xs:restriction base="authenticatortransportprotocoltype"> <xs:choice> <xs:element ref="ssl"/> <xs:element ref="mobilenetworknoencryption"/> <xs:element ref="mobilenetworkradioencryption"/> <xs:element ref="mobilenetworkendtoendencryption"/> <xs:element ref="wtls"/> </xs:choice> <xs:complextype name="operationalprotectiontype"> <xs:restriction base="operationalprotectiontype"> <xs:element ref="securityaudit"/> <xs:element ref="deactivationcallcenter"/> Copyright OASIS Open All Rights Reserved. Page 28 of 70
29 <xs:complextype name="technicalprotectionbasetype"> <xs:restriction base="technicalprotectionbasetype"> <xs:choice> <xs:element ref="privatekeyprotection"/> <xs:element ref="secretkeyprotection"/> </xs:choice> <xs:complextype name="privatekeyprotectiontype"> <xs:restriction base="privatekeyprotectiontype"> <xs:element ref="keystorage"/> <xs:complextype name="secretkeyprotectiontype"> <xs:restriction base="secretkeyprotectiontype"> <xs:element ref="keystorage"/> <xs:complextype name="keystoragetype"> <xs:restriction base="keystoragetype"> <xs:attribute name="medium" use="required"> <xs:simpletype> <xs:restriction base="mediumtype"> <xs:enumeration value="mobiledevice"/> <xs:enumeration value="mobileauthcard"/> <xs:enumeration value="smartcard"/> </xs:simpletype> </xs:attribute> <xs:complextype name="securityaudittype"> <xs:restriction base="securityaudittype"> <xs:element ref="switchaudit"/> Copyright OASIS Open All Rights Reserved. Page 29 of 70
30 <xs:complextype name="identificationtype"> <xs:restriction base="identificationtype"> <xs:element ref="governingagreements"/> <xs:attribute name="nym"> <xs:simpletype> <xs:restriction base="nymtype"> <xs:enumeration value="anonymity"/> <xs:enumeration value="pseudonymity"/> </xs:simpletype> </xs:attribute> </xs:redefine> </xs:schema> MobileTwoFactorUnregistered URI: urn:oasis:names:tc:saml:2.0:ac:classes:mobiletwofactorunregistered Note that this URI is also used as the target namespace in the corresponding authentication context class schema document [SAMLAC-MTFU]. Reflects no mobile customer registration procedures and a two-factor based authentication, such as secure device and user PIN. This context class is useful when a service other than the mobile operator wants to link their customer ID to a mobile supplied two-factor authentication service by capturing mobile phone data at enrollment. <?xml version="1.0" encoding="utf-8"?> <xs:schema targetnamespace="urn:oasis:names:tc:saml:2.0:ac:classes:mobiletwofactorunregist ered" xmlns:xs=" xmlns="urn:oasis:names:tc:saml:2.0:ac:classes:mobiletwofactorunregistered" finaldefault="extension" blockdefault="substitution" version="2.0"> <xs:redefine schemalocation="saml-schema-authn-context-types-2.0.xsd"> Class identifier: urn:oasis:names:tc:saml:2.0:ac:classes:mobiletwofactorunregistered Document identifier: saml-schema-authn-context-mobiletwofactor-unreg-2.0 Location: Revision history: V2.0 (March, 2005): New authentication context class schema for SAML V2.0. <xs:complextype name="authncontextdeclarationbasetype"> <xs:restriction base="authncontextdeclarationbasetype"> <xs:element ref="identification" minoccurs="0"/> <xs:element ref="technicalprotection" minoccurs="0"/> Copyright OASIS Open All Rights Reserved. Page 30 of 70
31 <xs:element ref="operationalprotection" minoccurs="0"/> <xs:element ref="authnmethod"/> <xs:element ref="governingagreements" minoccurs="0"/> <xs:attribute name="id" type="xs:id" use="optional"/> <xs:complextype name="authnmethodbasetype"> <xs:restriction base="authnmethodbasetype"> <xs:element ref="principalauthenticationmechanism" minoccurs="0"/> <xs:element ref="authenticator"/> <xs:element ref="authenticatortransportprotocol" minoccurs="0"/> <xs:complextype name="authenticatorbasetype"> <xs:restriction base="authenticatorbasetype"> <xs:choice> <xs:element ref="digsig"/> <xs:element ref="zeroknowledge"/> <xs:element ref="sharedsecretchallengeresponse"/> <xs:element ref="sharedsecretdynamicplaintext"/> <xs:element ref="asymmetricdecryption"/> <xs:element ref="asymmetrickeyagreement"/> <xs:element ref="complexauthenticator"/> </xs:choice> <xs:complextype name="complexauthenticatortype"> <xs:restriction base="complexauthenticatortype"> <xs:choice> <xs:element ref="sharedsecretchallengeresponse"/> <xs:element ref="sharedsecretdynamicplaintext"/> </xs:choice> <xs:element ref="password"/> <xs:complextype name="authenticatortransportprotocoltype"> <xs:restriction base="authenticatortransportprotocoltype"> <xs:choice> <xs:element ref="ssl"/> <xs:element ref="mobilenetworknoencryption"/> <xs:element ref="mobilenetworkradioencryption"/> <xs:element ref="mobilenetworkendtoendencryption"/> <xs:element ref="wtls"/> </xs:choice> Copyright OASIS Open All Rights Reserved. Page 31 of 70
32 <xs:complextype name="operationalprotectiontype"> <xs:restriction base="operationalprotectiontype"> <xs:element ref="securityaudit"/> <xs:element ref="deactivationcallcenter"/> <xs:complextype name="technicalprotectionbasetype"> <xs:restriction base="technicalprotectionbasetype"> <xs:choice> <xs:element ref="privatekeyprotection"/> <xs:element ref="secretkeyprotection"/> </xs:choice> <xs:complextype name="privatekeyprotectiontype"> <xs:restriction base="privatekeyprotectiontype"> <xs:element ref="keyactivation"/> <xs:element ref="keystorage"/> <xs:complextype name="secretkeyprotectiontype"> <xs:restriction base="secretkeyprotectiontype"> <xs:element ref="keyactivation"/> <xs:element ref="keystorage"/> <xs:complextype name="keystoragetype"> <xs:restriction base="keystoragetype"> <xs:attribute name="medium" use="required"> <xs:simpletype> <xs:restriction base="mediumtype"> <xs:enumeration value="mobiledevice"/> <xs:enumeration value="mobileauthcard"/> <xs:enumeration value="smartcard"/> </xs:simpletype> Copyright OASIS Open All Rights Reserved. Page 32 of 70
33 </xs:attribute> <xs:complextype name="securityaudittype"> <xs:restriction base="securityaudittype"> <xs:element ref="switchaudit"/> <xs:complextype name="identificationtype"> <xs:restriction base="identificationtype"> <xs:element ref="governingagreements"/> <xs:attribute name="nym"> <xs:simpletype> <xs:restriction base="nymtype"> <xs:enumeration value="anonymity"/> <xs:enumeration value="pseudonymity"/> </xs:simpletype> </xs:attribute> </xs:redefine> </xs:schema> MobileOneFactorContract URI: urn:oasis:names:tc:saml:2.0:ac:classes:mobileonefactorcontract Note that this URI is also used as the target namespace in the corresponding authentication context class schema document [SAMLAC-MOFC]. Reflects mobile contract customer registration procedures and a single factor authentication. For example, a digital signing device with tamper resistant memory for key storage, such as the mobile MSISDN, but no required PIN or biometric for real-time user authentication. <?xml version="1.0" encoding="utf-8"?> <xs:schema targetnamespace="urn:oasis:names:tc:saml:2.0:ac:classes:mobileonefactorcontra ct" xmlns:xs=" xmlns="urn:oasis:names:tc:saml:2.0:ac:classes:mobileonefactorcontract" finaldefault="extension" blockdefault="substitution" version="2.0"> <xs:redefine schemalocation="saml-schema-authn-context-types-2.0.xsd"> Copyright OASIS Open All Rights Reserved. Page 33 of 70
34 Class identifier: urn:oasis:names:tc:saml:2.0:ac:classes:mobileonefactorcontract Document identifier: saml-schema-authn-context-mobileonefactor-reg-2.0 Location: Revision history: V2.0 (March, 2005): New authentication context class schema for SAML V2.0. <xs:complextype name="authncontextdeclarationbasetype"> <xs:restriction base="authncontextdeclarationbasetype"> <xs:element ref="identification" minoccurs="0"/> <xs:element ref="technicalprotection" minoccurs="0"/> <xs:element ref="operationalprotection" minoccurs="0"/> <xs:element ref="authnmethod"/> <xs:element ref="governingagreements" minoccurs="0"/> <xs:attribute name="id" type="xs:id" use="optional"/> <xs:complextype name="authnmethodbasetype"> <xs:restriction base="authnmethodbasetype"> <xs:element ref="principalauthenticationmechanism" minoccurs="0"/> <xs:element ref="authenticator"/> <xs:element ref="authenticatortransportprotocol" minoccurs="0"/> <xs:complextype name="authenticatorbasetype"> <xs:restriction base="authenticatorbasetype"> <xs:choice> <xs:element ref="digsig"/> <xs:element ref="zeroknowledge"/> <xs:element ref="sharedsecretchallengeresponse"/> <xs:element ref="sharedsecretdynamicplaintext"/> <xs:element ref="asymmetricdecryption"/> <xs:element ref="asymmetrickeyagreement"/> </xs:choice> <xs:complextype name="authenticatortransportprotocoltype"> <xs:restriction base="authenticatortransportprotocoltype"> <xs:choice> <xs:element ref="ssl"/> <xs:element ref="mobilenetworknoencryption"/> <xs:element ref="mobilenetworkradioencryption"/> <xs:element ref="mobilenetworkendtoendencryption"/> <xs:element ref="wtls"/> Copyright OASIS Open All Rights Reserved. Page 34 of 70
35 </xs:choice> <xs:complextype name="operationalprotectiontype"> <xs:restriction base="operationalprotectiontype"> <xs:element ref="securityaudit"/> <xs:element ref="deactivationcallcenter"/> <xs:complextype name="technicalprotectionbasetype"> <xs:restriction base="technicalprotectionbasetype"> <xs:choice> <xs:element ref="privatekeyprotection"/> <xs:element ref="secretkeyprotection"/> </xs:choice> <xs:complextype name="privatekeyprotectiontype"> <xs:restriction base="privatekeyprotectiontype"> <xs:element ref="keystorage"/> <xs:complextype name="secretkeyprotectiontype"> <xs:restriction base="secretkeyprotectiontype"> <xs:element ref="keystorage"/> <xs:complextype name="keystoragetype"> <xs:restriction base="keystoragetype"> <xs:attribute name="medium" use="required"> <xs:simpletype> <xs:restriction base="mediumtype"> <xs:enumeration value="smartcard"/> <xs:enumeration value="mobiledevice"/> <xs:enumeration value="mobileauthcard"/> </xs:simpletype> </xs:attribute> Copyright OASIS Open All Rights Reserved. Page 35 of 70
36 <xs:complextype name="securityaudittype"> <xs:restriction base="securityaudittype"> <xs:element ref="switchaudit"/> <xs:complextype name="identificationtype"> <xs:restriction base="identificationtype"> <xs:element ref="physicalverification"/> <xs:element ref="writtenconsent"/> <xs:element ref="governingagreements"/> <xs:attribute name="nym"> <xs:simpletype> <xs:restriction base="nymtype"> <xs:enumeration value="anonymity"/> <xs:enumeration value="verinymity"/> <xs:enumeration value="pseudonymity"/> </xs:simpletype> </xs:attribute> </xs:redefine> </xs:schema> MobileTwoFactorContract URI: urn:oasis:names:tc:saml:2.0:ac:classes:mobiletwofactorcontract Note that this URI is also used as the target namespace in the corresponding authentication context class schema document [SAMLAC-MTFC]. Reflects mobile contract customer registration procedures and a two-factor based authentication. For example, a digital signing device with tamper resistant memory for key storage, such as a GSM SIM, that requires explicit proof of user identity and intent, such as a PIN or biometric. <?xml version="1.0" encoding="utf-8"?> <xs:schema targetnamespace="urn:oasis:names:tc:saml:2.0:ac:classes:mobiletwofactorcontract" xmlns:xs=" xmlns="urn:oasis:names:tc:saml:2.0:ac:classes:mobiletwofactorcontract" finaldefault="extension" blockdefault="substitution" version="2.0"> <xs:redefine schemalocation="saml-schema-authn-context-types-2.0.xsd"> Copyright OASIS Open All Rights Reserved. Page 36 of 70
37 Class identifier: urn:oasis:names:tc:saml:2.0:ac:classes:mobiletwofactorcontract Document identifier: saml-schema-authn-context-mobiletwofactor-reg-2.0 Location: Revision history: V2.0 (March, 2005): New authentication context class schema for SAML V2.0. <xs:complextype name="authncontextdeclarationbasetype"> <xs:restriction base="authncontextdeclarationbasetype"> <xs:element ref="identification" minoccurs="0"/> <xs:element ref="technicalprotection" minoccurs="0"/> <xs:element ref="operationalprotection" minoccurs="0"/> <xs:element ref="authnmethod"/> <xs:element ref="governingagreements" minoccurs="0"/> <xs:attribute name="id" type="xs:id" use="optional"/> <xs:complextype name="authnmethodbasetype"> <xs:restriction base="authnmethodbasetype"> <xs:element ref="principalauthenticationmechanism" minoccurs="0"/> <xs:element ref="authenticator"/> <xs:element ref="authenticatortransportprotocol" minoccurs="0"/> <xs:complextype name="authenticatorbasetype"> <xs:restriction base="authenticatorbasetype"> <xs:choice> <xs:element ref="digsig"/> <xs:element ref="zeroknowledge"/> <xs:element ref="sharedsecretchallengeresponse"/> <xs:element ref="sharedsecretdynamicplaintext"/> <xs:element ref="asymmetricdecryption"/> <xs:element ref="asymmetrickeyagreement"/> <xs:element ref="complexauthenticator"/> </xs:choice> <xs:complextype name="complexauthenticatortype"> <xs:restriction base="complexauthenticatortype"> <xs:choice> <xs:element ref="sharedsecretchallengeresponse"/> <xs:element ref="sharedsecretdynamicplaintext"/> </xs:choice> <xs:element ref="password"/> Copyright OASIS Open All Rights Reserved. Page 37 of 70
38 <xs:complextype name="authenticatortransportprotocoltype"> <xs:restriction base="authenticatortransportprotocoltype"> <xs:choice> <xs:element ref="ssl"/> <xs:element ref="mobilenetworknoencryption"/> <xs:element ref="mobilenetworkradioencryption"/> <xs:element ref="mobilenetworkendtoendencryption"/> <xs:element ref="wtls"/> </xs:choice> <xs:complextype name="operationalprotectiontype"> <xs:restriction base="operationalprotectiontype"> <xs:element ref="securityaudit"/> <xs:element ref="deactivationcallcenter"/> <xs:complextype name="technicalprotectionbasetype"> <xs:restriction base="technicalprotectionbasetype"> <xs:choice> <xs:element ref="privatekeyprotection"/> <xs:element ref="secretkeyprotection"/> </xs:choice> <xs:complextype name="privatekeyprotectiontype"> <xs:restriction base="privatekeyprotectiontype"> <xs:element ref="keyactivation"/> <xs:element ref="keystorage"/> <xs:complextype name="secretkeyprotectiontype"> <xs:restriction base="secretkeyprotectiontype"> <xs:element ref="keyactivation"/> <xs:element ref="keystorage"/> Copyright OASIS Open All Rights Reserved. Page 38 of 70
39 <xs:complextype name="keystoragetype"> <xs:restriction base="keystoragetype"> <xs:attribute name="medium" use="required"> <xs:simpletype> <xs:restriction base="mediumtype"> <xs:enumeration value="mobiledevice"/> <xs:enumeration value="mobileauthcard"/> <xs:enumeration value="smartcard"/> </xs:simpletype> </xs:attribute> <xs:complextype name="securityaudittype"> <xs:restriction base="securityaudittype"> <xs:element ref="switchaudit"/> <xs:complextype name="identificationtype"> <xs:restriction base="identificationtype"> <xs:element ref="physicalverification"/> <xs:element ref="writtenconsent"/> <xs:element ref="governingagreements"/> <xs:attribute name="nym"> <xs:simpletype> <xs:restriction base="nymtype"> <xs:enumeration value="anonymity"/> <xs:enumeration value="verinymity"/> <xs:enumeration value="pseudonymity"/> </xs:simpletype> </xs:attribute> </xs:redefine> </xs:schema> Password URI: urn:oasis:names:tc:saml:2.0:ac:classes:password Note that this URI is also used as the target namespace in the corresponding authentication context class schema document [SAMLAC-Pass]. Copyright OASIS Open All Rights Reserved. Page 39 of 70
40 The Password class is applicable when a principal authenticates to an authentication authority through the presentation of a password over an unprotected HTTP session. <?xml version="1.0" encoding="utf-8"?> <xs:schema targetnamespace="urn:oasis:names:tc:saml:2.0:ac:classes:password" xmlns:xs=" xmlns="urn:oasis:names:tc:saml:2.0:ac:classes:password" finaldefault="extension" blockdefault="substitution" version="2.0"> <xs:redefine schemalocation="saml-schema-authn-context-types-2.0.xsd"> Class identifier: urn:oasis:names:tc:saml:2.0:ac:classes:password Document identifier: saml-schema-authn-context-pword-2.0 Location: Revision history: V2.0 (March, 2005): New authentication context class schema for SAML V2.0. <xs:complextype name="authncontextdeclarationbasetype"> <xs:restriction base="authncontextdeclarationbasetype"> <xs:element ref="identification" minoccurs="0"/> <xs:element ref="technicalprotection" minoccurs="0"/> <xs:element ref="operationalprotection" minoccurs="0"/> <xs:element ref="authnmethod"/> <xs:element ref="governingagreements" minoccurs="0"/> <xs:attribute name="id" type="xs:id" use="optional"/> <xs:complextype name="authnmethodbasetype"> <xs:restriction base="authnmethodbasetype"> <xs:element ref="principalauthenticationmechanism" minoccurs="0"/> <xs:element ref="authenticator"/> <xs:element ref="authenticatortransportprotocol" minoccurs="0"/> <xs:complextype name="authenticatorbasetype"> <xs:restriction base="authenticatorbasetype"> <xs:element ref="restrictedpassword"/> </xs:redefine> </xs:schema> Copyright OASIS Open All Rights Reserved. Page 40 of 70
41 Following is an example of an XML instance that conforms to the context class schema: <AuthenticationContextDeclaration xmlns="urn:oasis:names:tc:saml:2.0:ac:classes:password"> <AuthnMethod> <Authenticator> <AuthenticatorSequence> <RestrictedPassword> <Length min="4"/> </RestrictedPassword> </AuthenticatorSequence> </Authenticator> </AuthnMethod> </AuthenticationContextDeclaration> PasswordProtectedTransport URI: urn:oasis:names:tc:saml:2.0:ac:classes:passwordprotectedtransport Note that this URI is also used as the target namespace in the corresponding authentication context class schema document [SAMLAC-PPT]. The PasswordProtectedTransport class is applicable when a principal authenticates to an authentication authority through the presentation of a password over a protected session. <?xml version="1.0" encoding="utf-8"?> <xs:schema targetnamespace="urn:oasis:names:tc:saml:2.0:ac:classes:passwordprotectedtransp ort" xmlns:xs=" xmlns="urn:oasis:names:tc:saml:2.0:ac:classes:passwordprotectedtransport" finaldefault="extension" blockdefault="substitution" version="2.0"> <xs:redefine schemalocation="saml-schema-authn-context-types-2.0.xsd"> Class identifier: urn:oasis:names:tc:saml:2.0:ac:classes:passwordprotectedtransport Document identifier: saml-schema-authn-context-ppt-2.0 Location: Revision history: V2.0 (March, 2005): New authentication context class schema for SAML V2.0. <xs:complextype name="authncontextdeclarationbasetype"> <xs:restriction base="authncontextdeclarationbasetype"> <xs:element ref="identification" minoccurs="0"/> <xs:element ref="technicalprotection" minoccurs="0"/> <xs:element ref="operationalprotection" minoccurs="0"/> <xs:element ref="authnmethod"/> <xs:element ref="governingagreements" minoccurs="0"/> <xs:attribute name="id" type="xs:id" use="optional"/> Copyright OASIS Open All Rights Reserved. Page 41 of 70
42 <xs:complextype name="authnmethodbasetype"> <xs:restriction base="authnmethodbasetype"> <xs:element ref="principalauthenticationmechanism" minoccurs="0"/> <xs:element ref="authenticator"/> <xs:element ref="authenticatortransportprotocol"/> <xs:complextype name="authenticatorbasetype"> <xs:restriction base="authenticatorbasetype"> <xs:element ref="restrictedpassword"/> <xs:complextype name="authenticatortransportprotocoltype"> <xs:restriction base="authenticatortransportprotocoltype"> <xs:choice> <xs:element ref="ssl"/> <xs:element ref="mobilenetworkradioencryption"/> <xs:element ref="mobilenetworkendtoendencryption"/> <xs:element ref="wtls"/> <xs:element ref="ipsec"/> </xs:choice> </xs:redefine> </xs:schema> PreviousSession URI: urn:oasis:names:tc:saml:2.0:ac:classes:previoussession Note that this URI is also used as the target namespace in the corresponding authentication context class schema document [SAMLAC-Prev]. The PreviousSession class is applicable when a principal had authenticated to an authentication authority at some point in the past using any authentication context supported by that authentication authority. Consequently, a subsequent authentication event that the authentication authority will assert to the relying party may be significantly separated in time from the principal's current resource access request. The context for the previously authenticated session is explicitly not included in this context class because the user has not authenticated during this session, and so the mechanism that the user employed to authenticate in a previous session should not be used as part of a decision on whether to now allow access to a resource. <?xml version="1.0" encoding="utf-8"?> Copyright OASIS Open All Rights Reserved. Page 42 of 70
43 <xs:schema targetnamespace="urn:oasis:names:tc:saml:2.0:ac:classes:previoussession" xmlns:xs=" xmlns="urn:oasis:names:tc:saml:2.0:ac:classes:previoussession" finaldefault="extension" blockdefault="substitution" version="2.0"> <xs:redefine schemalocation="saml-schema-authn-context-types-2.0.xsd"> Class identifier: urn:oasis:names:tc:saml:2.0:ac:classes:previoussession Document identifier: saml-schema-authn-context-session-2.0 Location: Revision history: V2.0 (March, 2005): New authentication context class schema for SAML V2.0. <xs:complextype name="authncontextdeclarationbasetype"> <xs:restriction base="authncontextdeclarationbasetype"> <xs:element ref="identification" minoccurs="0"/> <xs:element ref="technicalprotection" minoccurs="0"/> <xs:element ref="operationalprotection" minoccurs="0"/> <xs:element ref="authnmethod"/> <xs:element ref="governingagreements" minoccurs="0"/> <xs:attribute name="id" type="xs:id" use="optional"/> <xs:complextype name="authnmethodbasetype"> <xs:restriction base="authnmethodbasetype"> <xs:element ref="principalauthenticationmechanism" minoccurs="0"/> <xs:element ref="authenticator"/> <xs:element ref="authenticatortransportprotocol" minoccurs="0"/> <xs:complextype name="authenticatorbasetype"> <xs:restriction base="authenticatorbasetype"> <xs:element ref="previoussession"/> </xs:redefine> </xs:schema> Copyright OASIS Open All Rights Reserved. Page 43 of 70
44 Public Key X.509 URI: urn:oasis:names:tc:saml:2.0:ac:classes:x509 Note that this URI is also used as the target namespace in the corresponding authentication context class schema document [SAMLAC-X509]. The X509 context class indicates that the principal authenticated by means of a digital signature where the key was validated as part of an X.509 Public Key Infrastructure. <?xml version="1.0" encoding="utf-8"?> <xs:schema targetnamespace="urn:oasis:names:tc:saml:2.0:ac:classes:x509" xmlns:xs=" xmlns="urn:oasis:names:tc:saml:2.0:ac:classes:x509" finaldefault="extension" blockdefault="substitution" version="2.0"> <xs:redefine schemalocation="saml-schema-authn-context-types-2.0.xsd"> Class identifier: urn:oasis:names:tc:saml:2.0:ac:classes:x509 Document identifier: saml-schema-authn-context-x Location: Revision history: V2.0 (March, 2005): New authentication context class schema for SAML V2.0. <xs:complextype name="authncontextdeclarationbasetype"> <xs:restriction base="authncontextdeclarationbasetype"> <xs:element ref="identification" minoccurs="0"/> <xs:element ref="technicalprotection" minoccurs="0"/> <xs:element ref="operationalprotection" minoccurs="0"/> <xs:element ref="authnmethod"/> <xs:element ref="governingagreements" minoccurs="0"/> <xs:attribute name="id" type="xs:id" use="optional"/> <xs:complextype name="authnmethodbasetype"> <xs:restriction base="authnmethodbasetype"> <xs:element ref="principalauthenticationmechanism"/> <xs:element ref="authenticator"/> <xs:element ref="authenticatortransportprotocol" minoccurs="0"/> <xs:complextype name="principalauthenticationmechanismtype"> <xs:restriction base="principalauthenticationmechanismtype"> <xs:element ref="restrictedpassword"/> Copyright OASIS Open All Rights Reserved. Page 44 of 70
45 <xs:attribute name="preauth" type="xs:integer" use="optional"/> <xs:complextype name="authenticatorbasetype"> <xs:restriction base="authenticatorbasetype"> <xs:element ref="digsig"/> <xs:complextype name="publickeytype"> <xs:restriction base="publickeytype"> <xs:attribute name="keyvalidation" type="xs:anyuri" fixed="urn:oasis:names:tc:saml:2.0:ac:classes:x509"/> </xs:redefine> </xs:schema> Public Key PGP URI: urn:oasis:names:tc:saml:2.0:ac:classes:pgp Note that this URI is also used as the target namespace in the corresponding authentication context class schema document [SAMLAC-PGP]. The PGP context class indicates that the principal authenticated by means of a digital signature where the key was validated as part of a PGP Public Key Infrastructure. <?xml version="1.0" encoding="utf-8"?> <xs:schema targetnamespace="urn:oasis:names:tc:saml:2.0:ac:classes:pgp" xmlns:xs=" xmlns="urn:oasis:names:tc:saml:2.0:ac:classes:pgp" finaldefault="extension" blockdefault="substitution" version="2.0"> <xs:redefine schemalocation="saml-schema-authn-context-types-2.0.xsd"> Class identifier: urn:oasis:names:tc:saml:2.0:ac:classes:pgp Document identifier: saml-schema-authn-context-pgp-2.0 Location: Revision history: V2.0 (March, 2005): New authentication context class schema for SAML V2.0. <xs:complextype name="authncontextdeclarationbasetype"> <xs:restriction base="authncontextdeclarationbasetype"> <xs:element ref="identification" minoccurs="0"/> Copyright OASIS Open All Rights Reserved. Page 45 of 70
46 <xs:element ref="technicalprotection" minoccurs="0"/> <xs:element ref="operationalprotection" minoccurs="0"/> <xs:element ref="authnmethod"/> <xs:element ref="governingagreements" minoccurs="0"/> <xs:attribute name="id" type="xs:id" use="optional"/> <xs:complextype name="authnmethodbasetype"> <xs:restriction base="authnmethodbasetype"> <xs:element ref="principalauthenticationmechanism"/> <xs:element ref="authenticator"/> <xs:element ref="authenticatortransportprotocol" minoccurs="0"/> <xs:complextype name="principalauthenticationmechanismtype"> <xs:restriction base="principalauthenticationmechanismtype"> <xs:element ref="restrictedpassword"/> <xs:attribute name="preauth" type="xs:integer" use="optional"/> <xs:complextype name="authenticatorbasetype"> <xs:restriction base="authenticatorbasetype"> <xs:element ref="digsig"/> <xs:complextype name="publickeytype"> <xs:restriction base="publickeytype"> <xs:attribute name="keyvalidation" fixed="urn:oasis:names:tc:saml:2.0:ac:classes:pgp"/> </xs:redefine> </xs:schema> Public Key SPKI URI: urn:oasis:names:tc:saml:2.0:ac:classes:spki Note that this URI is also used as the target namespace in the corresponding authentication context class schema document [SAMLAC-SPKI]. Copyright OASIS Open All Rights Reserved. Page 46 of 70
47 The SPKI context class indicates that the principal authenticated by means of a digital signature where the key was validated via an SPKI Infrastructure. <?xml version="1.0" encoding="utf-8"?> <xs:schema targetnamespace="urn:oasis:names:tc:saml:2.0:ac:classes:spki" xmlns:xs=" xmlns="urn:oasis:names:tc:saml:2.0:ac:classes:spki" finaldefault="extension" blockdefault="substitution" version="2.0"> <xs:redefine schemalocation="saml-schema-authn-context-types-2.0.xsd"> Class identifier: urn:oasis:names:tc:saml:2.0:ac:classes:spki Document identifier: saml-schema-authn-context-spki-2.0 Location: Revision history: V2.0 (March, 2005): New authentication context class schema for SAML V2.0. <xs:complextype name="authncontextdeclarationbasetype"> <xs:restriction base="authncontextdeclarationbasetype"> <xs:element ref="identification" minoccurs="0"/> <xs:element ref="technicalprotection" minoccurs="0"/> <xs:element ref="operationalprotection" minoccurs="0"/> <xs:element ref="authnmethod"/> <xs:element ref="governingagreements" minoccurs="0"/> <xs:attribute name="id" type="xs:id" use="optional"/> <xs:complextype name="authnmethodbasetype"> <xs:restriction base="authnmethodbasetype"> <xs:element ref="principalauthenticationmechanism"/> <xs:element ref="authenticator"/> <xs:element ref="authenticatortransportprotocol" minoccurs="0"/> <xs:complextype name="principalauthenticationmechanismtype"> <xs:restriction base="principalauthenticationmechanismtype"> <xs:element ref="restrictedpassword"/> <xs:attribute name="preauth" type="xs:integer" use="optional"/> <xs:complextype name="authenticatorbasetype"> Copyright OASIS Open All Rights Reserved. Page 47 of 70
48 <xs:restriction base="authenticatorbasetype"> <xs:element ref="digsig"/> <xs:complextype name="publickeytype"> <xs:restriction base="publickeytype"> <xs:attribute name="keyvalidation" fixed="urn:oasis:names:tc:saml:2.0:ac:classes:spki"/> </xs:redefine> </xs:schema> Public Key - XML Digital Signature URI: urn:oasis:names:tc:saml:2.0:ac:classes:xmldsig Note that this URI is also used as the target namespace in the corresponding authentication context class schema document [SAMLAC-XSig] This context class indicates that the principal authenticated by means of a digital signature according to the processing rules specified in the XML Digital Signature specification [XMLSig]. <?xml version="1.0" encoding="utf-8"?> <xs:schema targetnamespace="urn:oasis:names:tc:saml:2.0:ac:classes:xmldsig" xmlns:xs=" xmlns="urn:oasis:names:tc:saml:2.0:ac:classes:xmldsig" finaldefault="extension" blockdefault="substitution" version="2.0"> <xs:redefine schemalocation="saml-schema-authn-context-types-2.0.xsd"> Class identifier: urn:oasis:names:tc:saml:2.0:ac:classes:xmldsig Document identifier: saml-schema-authn-context-xmldsig-2.0 Location: Revision history: V2.0 (March, 2005): New authentication context class schema for SAML V2.0. <xs:complextype name="authncontextdeclarationbasetype"> <xs:restriction base="authncontextdeclarationbasetype"> <xs:element ref="identification" minoccurs="0"/> <xs:element ref="technicalprotection" minoccurs="0"/> <xs:element ref="operationalprotection" minoccurs="0"/> <xs:element ref="authnmethod"/> <xs:element ref="governingagreements" minoccurs="0"/> <xs:attribute name="id" type="xs:id" use="optional"/> Copyright OASIS Open All Rights Reserved. Page 48 of 70
49 <xs:complextype name="authnmethodbasetype"> <xs:restriction base="authnmethodbasetype"> <xs:element ref="principalauthenticationmechanism"/> <xs:element ref="authenticator"/> <xs:element ref="authenticatortransportprotocol" minoccurs="0"/> <xs:complextype name="principalauthenticationmechanismtype"> <xs:restriction base="principalauthenticationmechanismtype"> <xs:element ref="restrictedpassword"/> <xs:attribute name="preauth" type="xs:integer" use="optional"/> <xs:complextype name="authenticatorbasetype"> <xs:restriction base="authenticatorbasetype"> <xs:element ref="digsig"/> <xs:complextype name="publickeytype"> <xs:restriction base="publickeytype"> <xs:attribute name="keyvalidation" type="xs:anyuri" fixed="urn:ietf:rfc:3075"/> </xs:redefine> </xs:schema> Smartcard URI: urn:oasis:names:tc:saml:2.0:ac:classes:smartcard Note that this URI is also used as the target namespace in the corresponding authentication context class schema document [SAMLAC-Smart]. The Smartcard class is identified when a principal authenticates to an authentication authority using a smartcard. <?xml version="1.0" encoding="utf-8"?> <xs:schema targetnamespace="urn:oasis:names:tc:saml:2.0:ac:classes:smartcard" xmlns:xs=" xmlns="urn:oasis:names:tc:saml:2.0:ac:classes:smartcard" finaldefault="extension" Copyright OASIS Open All Rights Reserved. Page 49 of 70
50 blockdefault="substitution" version="2.0"> <xs:redefine schemalocation="saml-schema-authn-context-types-2.0.xsd"> Class identifier: urn:oasis:names:tc:saml:2.0:ac:classes:smartcard Document identifier: saml-schema-authn-context-smartcard-2.0 Location: Revision history: V2.0 (March, 2005): New authentication context class schema for SAML V2.0. <xs:complextype name="authncontextdeclarationbasetype"> <xs:restriction base="authncontextdeclarationbasetype"> <xs:element ref="identification" minoccurs="0"/> <xs:element ref="technicalprotection" minoccurs="0"/> <xs:element ref="operationalprotection" minoccurs="0"/> <xs:element ref="authnmethod"/> <xs:element ref="governingagreements" minoccurs="0"/> <xs:attribute name="id" type="xs:id" use="optional"/> <xs:complextype name="authnmethodbasetype"> <xs:restriction base="authnmethodbasetype"> <xs:element ref="principalauthenticationmechanism"/> <xs:element ref="authenticator"/> <xs:element ref="authenticatortransportprotocol" minoccurs="0"/> <xs:complextype name="principalauthenticationmechanismtype"> <xs:restriction base="principalauthenticationmechanismtype"> <xs:element ref="smartcard"/> </xs:redefine> </xs:schema> SmartcardPKI URI: urn:oasis:names:tc:saml:2.0:ac:classes:smartcardpki Note that this URI is also used as the target namespace in the corresponding authentication context class schema document [SAMLAC-SmPKI]. Copyright OASIS Open All Rights Reserved. Page 50 of 70
51 The SmartcardPKI class is applicable when a principal authenticates to an authentication authority through a two-factor authentication mechanism using a smartcard with enclosed private key and a PIN. <?xml version="1.0" encoding="utf-8"?> <xs:schema targetnamespace="urn:oasis:names:tc:saml:2.0:ac:classes:smartcardpki" xmlns:xs=" xmlns="urn:oasis:names:tc:saml:2.0:ac:classes:smartcardpki" finaldefault="extension" blockdefault="substitution" version="2.0"> <xs:redefine schemalocation="saml-schema-authn-context-types-2.0.xsd"> Class identifier: urn:oasis:names:tc:saml:2.0:ac:classes:smartcardpki Document identifier: saml-schema-authn-context-smartcardpki-2.0 Location: Revision history: V2.0 (March, 2005): New authentication context class schema for SAML V2.0. <xs:complextype name="authncontextdeclarationbasetype"> <xs:restriction base="authncontextdeclarationbasetype"> <xs:element ref="identification" minoccurs="0"/> <xs:element ref="technicalprotection"/> <xs:element ref="operationalprotection" minoccurs="0"/> <xs:element ref="authnmethod"/> <xs:element ref="governingagreements" minoccurs="0"/> <xs:attribute name="id" type="xs:id" use="optional"/> <xs:complextype name="authnmethodbasetype"> <xs:restriction base="authnmethodbasetype"> <xs:element ref="principalauthenticationmechanism"/> <xs:element ref="authenticator"/> <xs:element ref="authenticatortransportprotocol" minoccurs="0"/> <xs:complextype name="technicalprotectionbasetype"> <xs:restriction base="technicalprotectionbasetype"> <xs:choice> <xs:element ref="privatekeyprotection"/> </xs:choice> <xs:complextype name="principalauthenticationmechanismtype"> Copyright OASIS Open All Rights Reserved. Page 51 of 70
52 <xs:restriction base="principalauthenticationmechanismtype"> <xs:element ref="smartcard"/> <xs:element ref="activationpin"/> <xs:complextype name="authenticatorbasetype"> <xs:restriction base="authenticatorbasetype"> <xs:choice> <xs:element ref="digsig"/> <xs:element ref="asymmetricdecryption"/> <xs:element ref="asymmetrickeyagreement"/> </xs:choice> <xs:complextype name="privatekeyprotectiontype"> <xs:restriction base="privatekeyprotectiontype"> <xs:element ref="keyactivation"/> <xs:element ref="keystorage"/> <xs:complextype name="keyactivationtype"> <xs:restriction base="keyactivationtype"> <xs:element ref="activationpin"/> <xs:complextype name="keystoragetype"> <xs:restriction base="keystoragetype"> <xs:attribute name="medium" use="required"> <xs:simpletype> <xs:restriction base="mediumtype"> <xs:enumeration value="smartcard"/> </xs:simpletype> </xs:attribute> </xs:redefine> </xs:schema> Copyright OASIS Open All Rights Reserved. Page 52 of 70
53 SoftwarePKI URI: urn:oasis:names:tc:saml:2.0:ac:classes:softwarepki Note that this URI is also used as the target namespace in the corresponding authentication context class schema document [SAMLAC-SwPKI]. The Software-PKI class is applicable when a principal uses an X.509 certificate stored in software to authenticate to the authentication authority. <?xml version="1.0" encoding="utf-8"?> <xs:schema targetnamespace="urn:oasis:names:tc:saml:2.0:ac:classes:softwarepki" xmlns:xs=" xmlns="urn:oasis:names:tc:saml:2.0:ac:classes:softwarepki" finaldefault="extension" blockdefault="substitution" version="2.0"> <xs:redefine schemalocation="saml-schema-authn-context-types-2.0.xsd"> Class identifier: urn:oasis:names:tc:saml:2.0:ac:classes:softwarepki Document identifier: saml-schema-authn-context-softwarepki-2.0 Location: Revision history: V2.0 (March, 2005): New authentication context class schema for SAML V2.0. <xs:complextype name="authncontextdeclarationbasetype"> <xs:restriction base="authncontextdeclarationbasetype"> <xs:element ref="identification" minoccurs="0"/> <xs:element ref="technicalprotection"/> <xs:element ref="operationalprotection" minoccurs="0"/> <xs:element ref="authnmethod"/> <xs:element ref="governingagreements" minoccurs="0"/> <xs:attribute name="id" type="xs:id" use="optional"/> <xs:complextype name="authnmethodbasetype"> <xs:restriction base="authnmethodbasetype"> <xs:element ref="principalauthenticationmechanism"/> <xs:element ref="authenticator"/> <xs:element ref="authenticatortransportprotocol" minoccurs="0"/> <xs:complextype name="technicalprotectionbasetype"> <xs:restriction base="technicalprotectionbasetype"> <xs:choice> Copyright OASIS Open All Rights Reserved. Page 53 of 70
54 <xs:element ref="privatekeyprotection"/> </xs:choice> <xs:complextype name="principalauthenticationmechanismtype"> <xs:restriction base="principalauthenticationmechanismtype"> <xs:element ref="activationpin"/> <xs:complextype name="authenticatorbasetype"> <xs:restriction base="authenticatorbasetype"> <xs:choice> <xs:element ref="digsig"/> <xs:element ref="asymmetricdecryption"/> <xs:element ref="asymmetrickeyagreement"/> </xs:choice> <xs:complextype name="privatekeyprotectiontype"> <xs:restriction base="privatekeyprotectiontype"> <xs:element ref="keyactivation"/> <xs:element ref="keystorage"/> <xs:complextype name="keyactivationtype"> <xs:restriction base="keyactivationtype"> <xs:element ref="activationpin"/> <xs:complextype name="keystoragetype"> <xs:restriction base="keystoragetype"> <xs:attribute name="medium" use="required"> <xs:simpletype> <xs:restriction base="mediumtype"> <xs:enumeration value="memory"/> </xs:simpletype> </xs:attribute> Copyright OASIS Open All Rights Reserved. Page 54 of 70
55 </xs:redefine> </xs:schema> Telephony URI: urn:oasis:names:tc:saml:2.0:ac:classes:telephony Note that this URI is also used as the target namespace in the corresponding authentication context class schema document [SAMLAC-Tele]. This class is used to indicate that the principal authenticated via the provision of a fixed-line telephone number, transported via a telephony protocol such as ADSL. <?xml version="1.0" encoding="utf-8"?> <xs:schema targetnamespace="urn:oasis:names:tc:saml:2.0:ac:classes:telephony" xmlns:xs=" xmlns="urn:oasis:names:tc:saml:2.0:ac:classes:telephony" finaldefault="extension" blockdefault="substitution" version="2.0"> <xs:redefine schemalocation="saml-schema-authn-context-types-2.0.xsd"> Class identifier: urn:oasis:names:tc:saml:2.0:ac:classes:telephony Document identifier: saml-schema-authn-context-telephony-2.0 Location: Revision history: V2.0 (March, 2005): New authentication context class schema for SAML V2.0. <xs:complextype name="authncontextdeclarationbasetype"> <xs:restriction base="authncontextdeclarationbasetype"> <xs:element ref="identification" minoccurs="0"/> <xs:element ref="technicalprotection" minoccurs="0"/> <xs:element ref="operationalprotection" minoccurs="0"/> <xs:element ref="authnmethod"/> <xs:element ref="governingagreements" minoccurs="0"/> <xs:attribute name="id" type="xs:id" use="optional"/> <xs:complextype name="authnmethodbasetype"> <xs:restriction base="authnmethodbasetype"> <xs:element ref="principalauthenticationmechanism" minoccurs="0"/> <xs:element ref="authenticator"/> <xs:element ref="authenticatortransportprotocol"/> Copyright OASIS Open All Rights Reserved. Page 55 of 70
56 <xs:complextype name="authenticatorbasetype"> <xs:restriction base="authenticatorbasetype"> <xs:element ref="subscriberlinenumber"/> <xs:complextype name="authenticatortransportprotocoltype"> <xs:restriction base="authenticatortransportprotocoltype"> <xs:choice> <xs:element ref="pstn"/> <xs:element ref="isdn"/> <xs:element ref="adsl"/> </xs:choice> </xs:redefine> </xs:schema> Telephony ("Nomadic") URI: urn:oasis:names:tc:saml:2.0:ac:classes:nomadtelephony Note that this URI is also used as the target namespace in the corresponding authentication context class schema document [SAMLAC-TNom]. Indicates that the principal is "roaming" (perhaps using a phone card) and authenticates via the means of the line number, a user suffix, and a password element. <?xml version="1.0" encoding="utf-8"?> <xs:schema targetnamespace="urn:oasis:names:tc:saml:2.0:ac:classes:nomadtelephony" xmlns:xs=" xmlns="urn:oasis:names:tc:saml:2.0:ac:classes:nomadtelephony" finaldefault="extension" blockdefault="substitution" version="2.0"> <xs:redefine schemalocation="saml-schema-authn-context-types-2.0.xsd"> Class identifier: urn:oasis:names:tc:saml:2.0:ac:classes:nomadtelephony Document identifier: saml-schema-authn-context-nomad-telephony-2.0 Location: Revision history: V2.0 (March, 2005): New authentication context class schema for SAML V2.0. <xs:complextype name="authncontextdeclarationbasetype"> <xs:restriction base="authncontextdeclarationbasetype"> Copyright OASIS Open All Rights Reserved. Page 56 of 70
57 <xs:element ref="identification" minoccurs="0"/> <xs:element ref="technicalprotection" minoccurs="0"/> <xs:element ref="operationalprotection" minoccurs="0"/> <xs:element ref="authnmethod"/> <xs:element ref="governingagreements" minoccurs="0"/> <xs:attribute name="id" type="xs:id" use="optional"/> <xs:complextype name="authnmethodbasetype"> <xs:restriction base="authnmethodbasetype"> <xs:element ref="principalauthenticationmechanism" minoccurs="0"/> <xs:element ref="authenticator"/> <xs:element ref="authenticatortransportprotocol"/> <xs:complextype name="authenticatorbasetype"> <xs:restriction base="authenticatorbasetype"> <xs:element ref="password"/> <xs:element ref="subscriberlinenumber"/> <xs:element ref="usersuffix"/> <xs:complextype name="authenticatortransportprotocoltype"> <xs:restriction base="authenticatortransportprotocoltype"> <xs:choice> <xs:element ref="pstn"/> <xs:element ref="isdn"/> <xs:element ref="adsl"/> </xs:choice> </xs:redefine> </xs:schema> Telephony (Personalized) URI: urn:oasis:names:tc:saml:2.0:ac:classes:personaltelephony Note that this URI is also used as the target namespace in the corresponding authentication context class schema document [SAMLAC-TPers]. This class is used to indicate that the principal authenticated via the provision of a fixed-line telephone number and a user suffix, transported via a telephony protocol such as ADSL. Copyright OASIS Open All Rights Reserved. Page 57 of 70
58 <?xml version="1.0" encoding="utf-8"?> <xs:schema targetnamespace="urn:oasis:names:tc:saml:2.0:ac:classes:personalizedtelephony" xmlns:xs=" xmlns="urn:oasis:names:tc:saml:2.0:ac:classes:personalizedtelephony" finaldefault="extension" blockdefault="substitution" version="2.0"> <xs:redefine schemalocation="saml-schema-authn-context-types-2.0.xsd"> Class identifier: urn:oasis:names:tc:saml:2.0:ac:classes:personalizedtelephony Document identifier: saml-schema-authn-context-personal-telephony-2.0 Location: Revision history: V2.0 (March, 2005): New authentication context class schema for SAML V2.0. <xs:complextype name="authncontextdeclarationbasetype"> <xs:restriction base="authncontextdeclarationbasetype"> <xs:element ref="identification" minoccurs="0"/> <xs:element ref="technicalprotection" minoccurs="0"/> <xs:element ref="operationalprotection" minoccurs="0"/> <xs:element ref="authnmethod"/> <xs:element ref="governingagreements" minoccurs="0"/> <xs:attribute name="id" type="xs:id" use="optional"/> <xs:complextype name="authnmethodbasetype"> <xs:restriction base="authnmethodbasetype"> <xs:element ref="principalauthenticationmechanism" minoccurs="0"/> <xs:element ref="authenticator"/> <xs:element ref="authenticatortransportprotocol"/> <xs:complextype name="authenticatorbasetype"> <xs:restriction base="authenticatorbasetype"> <xs:element ref="subscriberlinenumber"/> <xs:element ref="usersuffix"/> <xs:complextype name="authenticatortransportprotocoltype"> <xs:restriction base="authenticatortransportprotocoltype"> Copyright OASIS Open All Rights Reserved. Page 58 of 70
59 <xs:choice> <xs:element ref="pstn"/> <xs:element ref="isdn"/> <xs:element ref="adsl"/> </xs:choice> </xs:redefine> </xs:schema> Telephony (Authenticated) URI: urn:oasis:names:tc:saml:2.0:ac:classes:authenticatedtelephony Note that this URI is also used as the target namespace in the corresponding authentication context class schema document [SAMLAC-TAuthn]. Indicates that the principal authenticated via the means of the line number, a user suffix, and a password element. <?xml version="1.0" encoding="utf-8"?> <xs:schema targetnamespace="urn:oasis:names:tc:saml:2.0:ac:classes:authenticatedtelephony" xmlns:xs=" xmlns="urn:oasis:names:tc:saml:2.0:ac:classes:authenticatedtelephony" finaldefault="extension" blockdefault="substitution" version="2.0"> <xs:redefine schemalocation="saml-schema-authn-context-types-2.0.xsd"> Class identifier: urn:oasis:names:tc:saml:2.0:ac:classes:authenticatedtelephony Document identifier: saml-schema-authn-context-auth-telephony-2.0 Location: Revision history: V2.0 (March, 2005): New authentication context class schema for SAML V2.0. <xs:complextype name="authncontextdeclarationbasetype"> <xs:restriction base="authncontextdeclarationbasetype"> <xs:element ref="identification" minoccurs="0"/> <xs:element ref="technicalprotection" minoccurs="0"/> <xs:element ref="operationalprotection" minoccurs="0"/> <xs:element ref="authnmethod"/> <xs:element ref="governingagreements" minoccurs="0"/> <xs:attribute name="id" type="xs:id" use="optional"/> Copyright OASIS Open All Rights Reserved. Page 59 of 70
60 <xs:complextype name="authnmethodbasetype"> <xs:restriction base="authnmethodbasetype"> <xs:element ref="principalauthenticationmechanism" minoccurs="0"/> <xs:element ref="authenticator"/> <xs:element ref="authenticatortransportprotocol"/> <xs:complextype name="authenticatorbasetype"> <xs:restriction base="authenticatorbasetype"> <xs:element ref="password"/> <xs:element ref="subscriberlinenumber"/> <xs:element ref="usersuffix"/> <xs:complextype name="authenticatortransportprotocoltype"> <xs:restriction base="authenticatortransportprotocoltype"> <xs:choice> <xs:element ref="pstn"/> <xs:element ref="isdn"/> <xs:element ref="adsl"/> </xs:choice> </xs:redefine> </xs:schema> Secure Remote Password URI: urn:oasis:names:tc:saml:2.0:ac:classes:secureremotepassword Note that this URI is also used as the target namespace in the corresponding authentication context class schema document [SAMLAC-SRP]. The Secure Remote Password class is applicable when the authentication was performed by means of Secure Remote Password as specified in [RFC 2945]. <?xml version="1.0" encoding="utf-8"?> <xs:schema targetnamespace="urn:oasis:names:tc:saml:2.0:ac:classes:secureremotepassword" xmlns:xs=" xmlns="urn:oasis:names:tc:saml:2.0:ac:classes:secureremotepassword" finaldefault="extension" blockdefault="substitution" version="2.0"> <xs:redefine schemalocation="saml-schema-authn-context-types-2.0.xsd"> Copyright OASIS Open All Rights Reserved. Page 60 of 70
61 Class identifier: urn:oasis:names:tc:saml:2.0:ac:classes:secureremotepassword Document identifier: saml-schema-authn-context-srp-2.0 Location: Revision history: V2.0 (March, 2005): New authentication context class schema for SAML V2.0. <xs:complextype name="authncontextdeclarationbasetype"> <xs:restriction base="authncontextdeclarationbasetype"> <xs:element ref="identification" minoccurs="0"/> <xs:element ref="technicalprotection" minoccurs="0"/> <xs:element ref="operationalprotection" minoccurs="0"/> <xs:element ref="authnmethod"/> <xs:element ref="governingagreements" minoccurs="0"/> <xs:attribute name="id" type="xs:id" use="optional"/> <xs:complextype name="authnmethodbasetype"> <xs:restriction base="authnmethodbasetype"> <xs:element ref="principalauthenticationmechanism"/> <xs:element ref="authenticator"/> <xs:element ref="authenticatortransportprotocol" minoccurs="0"/> <xs:complextype name="principalauthenticationmechanismtype"> <xs:restriction base="principalauthenticationmechanismtype"> <xs:element ref="restrictedpassword"/> <xs:complextype name="authenticatorbasetype"> <xs:restriction base="authenticatorbasetype"> <xs:element ref="sharedsecretchallengeresponse"/> <xs:complextype name="sharedsecretchallengeresponsetype"> <xs:restriction base="sharedsecretchallengeresponsetype"> <xs:attribute name="method" type="xs:anyuri" fixed="urn:ietf:rfc:2945"/> Copyright OASIS Open All Rights Reserved. Page 61 of 70
62 </xs:redefine> </xs:schema> SSL/TLS Certificate-Based Client Authentication URI: urn:oasis:names:tc:saml:2.0:ac:classes:tlsclient Note that this URI is also used as the target namespace in the corresponding authentication context class schema document [SAMLAC-SSL]. This class indicates that the principal authenticated by means of a client certificate, secured with the SSL/TLS transport. <?xml version="1.0" encoding="utf-8"?> <xs:schema targetnamespace="urn:oasis:names:tc:saml:2.0:ac:classes:tlsclient" xmlns:xs=" xmlns="urn:oasis:names:tc:saml:2.0:ac:classes:tlsclient" finaldefault="extension" blockdefault="substitution" version="2.0"> <xs:redefine schemalocation="saml-schema-authn-context-types-2.0.xsd"> Class identifier: urn:oasis:names:tc:saml:2.0:ac:classes:tlsclient Document identifier: saml-schema-authn-context-sslcert-2.0 Location: Revision history: V2.0 (March, 2005): New authentication context class schema for SAML V2.0. <xs:complextype name="authncontextdeclarationbasetype"> <xs:restriction base="authncontextdeclarationbasetype"> <xs:element ref="identification" minoccurs="0"/> <xs:element ref="technicalprotection" minoccurs="0"/> <xs:element ref="operationalprotection" minoccurs="0"/> <xs:element ref="authnmethod"/> <xs:element ref="governingagreements" minoccurs="0"/> <xs:attribute name="id" type="xs:id" use="optional"/> <xs:complextype name="authnmethodbasetype"> <xs:restriction base="authnmethodbasetype"> <xs:element ref="principalauthenticationmechanism"/> <xs:element ref="authenticator"/> <xs:element ref="authenticatortransportprotocol" minoccurs="0"/> Copyright OASIS Open All Rights Reserved. Page 62 of 70
63 <xs:complextype name="principalauthenticationmechanismtype"> <xs:restriction base="principalauthenticationmechanismtype"> <xs:element ref="restrictedpassword"/> <xs:attribute name="preauth" type="xs:integer" use="optional"/> <xs:complextype name="authenticatorbasetype"> <xs:restriction base="authenticatorbasetype"> <xs:element ref="digsig"/> <xs:complextype name="publickeytype"> <xs:restriction base="publickeytype"> <xs:attribute name="keyvalidation" type="xs:anyuri" fixed="urn:oasis:names:tc:saml:2.0:ac:classes:x509"/> <xs:complextype name="authenticatortransportprotocoltype"> <xs:restriction base="authenticatortransportprotocoltype"> <xs:choice> <xs:element ref="ssl"/> <xs:element ref="wtls"/> </xs:choice> </xs:redefine> </xs:schema> TimeSyncToken URI: urn:oasis:names:tc:saml:2.0:ac:classes:timesynctoken Note that this URI is also used as the target namespace in the corresponding authentication context class schema document [SAMLAC-TST]. The TimeSyncToken class is applicable when a principal authenticates through a time synchronization token. <?xml version="1.0" encoding="utf-8"?> <xs:schema targetnamespace="urn:oasis:names:tc:saml:2.0:ac:classes:timesynctoken" xmlns:xs=" xmlns="urn:oasis:names:tc:saml:2.0:ac:classes:timesynctoken" finaldefault="extension" Copyright OASIS Open All Rights Reserved. Page 63 of 70
64 blockdefault="substitution" version="2.0"> <xs:redefine schemalocation="saml-schema-authn-context-types-2.0.xsd"> Class identifier: urn:oasis:names:tc:saml:2.0:ac:classes:timesynctoken Document identifier: saml-schema-authn-context-timesync-2.0 Location: Revision history: V2.0 (March, 2005): New authentication context class schema for SAML V2.0. <xs:complextype name="authncontextdeclarationbasetype"> <xs:restriction base="authncontextdeclarationbasetype"> <xs:element ref="identification" minoccurs="0"/> <xs:element ref="technicalprotection" minoccurs="0"/> <xs:element ref="operationalprotection" minoccurs="0"/> <xs:element ref="authnmethod"/> <xs:element ref="governingagreements" minoccurs="0"/> <xs:attribute name="id" type="xs:id" use="optional"/> <xs:complextype name="authnmethodbasetype"> <xs:restriction base="authnmethodbasetype"> <xs:element ref="principalauthenticationmechanism" minoccurs="0"/> <xs:element ref="authenticator"/> <xs:element ref="authenticatortransportprotocol" minoccurs="0"/> <xs:complextype name="principalauthenticationmechanismtype"> <xs:restriction base="principalauthenticationmechanismtype"> <xs:element ref="token"/> <xs:complextype name="tokentype"> <xs:restriction base="tokentype"> <xs:element ref="timesynctoken"/> <xs:complextype name="timesynctokentype"> Copyright OASIS Open All Rights Reserved. Page 64 of 70
65 <xs:restriction base="timesynctokentype"> <xs:attribute name="devicetype" use="required"> <xs:simpletype> <xs:restriction base="devicetypetype"> <xs:enumeration value="hardware"/> </xs:simpletype> </xs:attribute> <xs:attribute name="seedlength" use="required"> <xs:simpletype> <xs:restriction base="xs:integer"> <xs:mininclusive value="64"/> </xs:simpletype> </xs:attribute> <xs:attribute name="deviceinhand" use="required"> <xs:simpletype> <xs:restriction base="booleantype"> <xs:enumeration value="true"/> </xs:simpletype> </xs:attribute> </xs:redefine> </xs:schema> Unspecified URI: urn:oasis:names:tc:saml:2.0:ac:classes:unspecified The Unspecified class indicates that the authentication was performed by unspecified means. Copyright OASIS Open All Rights Reserved. Page 65 of 70
66 References [RFC 1510] [RFC 2119] J. Kohl, C. Neuman. The Kerberos Network Authentication Requestor (V5). IETF RFC 1510, September See S. Bradner. Key words for use in RFCs to Indicate Requirement Levels. IETF RFC 2119, March See [RFC 2945] T. Wu. The SRP Authentication and Key Exchange System. IETF RFC 2945, September See [SAMLAC-xsd] J. Kemp et al. SAML authentication context schema. OASIS SSTC, March Document ID saml-schema-authn-context-2.0. See [SAMLAC-Types] [SAMLAC-IP] [SAMLAC-IPP] [SAMLAC-Kerb] [SAMLAC-MOFC] [SAMLAC-MOFU] [SAMLAC-MTFC] [SAMLAC-MTFU] [SAMLAC-Pass] [SAMLAC-PGP] [SAMLAC-PPT] [SAMLAC-Prev] [SAMLAC-Smart] J. Kemp et al. SAML authentication context types schema. OASIS SSTC, March Document ID saml-schema-authn-context-types-2.0. See J. Kemp et al. SAML context class schema for Internet Protocol. OASIS SSTC, March Document ID saml-schema-authn-context-ip-2.0. See J. Kemp et al. SAML context class schema for Internet Protocol Password. OASIS SSTC, March Document ID saml-schema-authn-context-ippword See J. Kemp et al. SAML context class schema for Kerberos. OASIS SSTC, March Document ID saml-schema-authn-context-kerberos-2.0. See J. Kemp et al. SAML context class schema for Mobile One Factor Contract. Document ID saml-schema-authn-context-mobileonefactor-reg-2.0. See OASIS SSTC, March J. Kemp et al. SAML context class schema for Mobile One Factor Unregistered. Document ID saml-schema-authn-context-mobileonefactor-unreg-2.0. See OASIS SSTC, March J. Kemp et al. SAML context class schema for Mobile Two Factor Contract. OASIS SSTC, March Document ID saml-schema-authn-contextmobiletwofactor-reg-2.0.see J. Kemp et al. SAML context class schema for Mobile Two Factor Unregistered. OASIS SSTC, March Document ID saml-schema-authn-contextmobiletwofactor-unreg-2.0. See J. Kemp et al. SAML context class schema for Password. OASIS SSTC, March Document ID saml-schema-authn-context-pword-2.0. See J. Kemp et al. SAML context class schema for Public Key PGP. OASIS SSTC, March Document ID saml-schema-authn-context-pgp-2.0. See J. Kemp et al. SAML context class schema for Password Protected Transport. OASIS SSTC, March Document ID saml-schema-authn-context-ppt-2.0. See J. Kemp et al. SAML context class schema for Previous Session. OASIS SSTC, March Document ID saml-schema-authn-context-session-2.0. See J. Kemp et al. SAML context class schema for Smartcard. OASIS SSTC, March Document ID saml-schema-authn-context-smartcard-2.0. See Copyright OASIS Open All Rights Reserved. Page 66 of 70
67 [SAMLAC-SmPKI] J. Kemp et al. SAML context class schema for Smartcard PKI. OASIS SSTC, March Document ID saml-schema-authn-context-smartcardpki-2.0. See [SAMLAC-SPKI] [SAMLAC-SRP] [SAMLAC-SSL] J. Kemp et al. SAML context class schema for Public Key SPKI. OASIS SSTC, March Document ID saml-schema-authn-context-spki-2.0. See J. Kemp et al. SAML context class schema for Secure Remote Password. OASIS SSTC, March Document ID saml-schema-authn-context-srp-2.0. See J. Kemp et al. SAML context class schema for SSL/TLS Certificate-Based Client Authentication. OASIS SSTC, March Document ID saml-schema-authncontext-sslcert-2.0. See [SAMLAC-SwPKI] J. Kemp et al. SAML context class schema for Software PKI. OASIS SSTC, March Document ID saml-schema-authn-context-softwarepki-2.0. See [SAMLAC-Tele] [SAMLAC-TNom] [SAMLAC-TPers] J. Kemp et al. SAML context class schema for Telephony. OASIS SSTC, March Document ID saml-schema-authn-context-telephony-2.0. See J. Kemp et al. SAML context class schema for Telephony ( Nomadic ). OASIS SSTC, March Document ID saml-schema-authn-context-nomad-telephony See J. Kemp et al. SAML context class schema for Telephony (Personalized). OASIS SSTC, March Document ID saml-schema-authn-context-personaltelephony-2.0. See [SAMLAC-TAuthn] J. Kemp et al. SAML context class schema for Telephony (Authenticated). OASIS SSTC, March Document ID saml-schema-authn-context-auth-telephony See [SAMLAC-TST] [SAMLAC-X509] [SAMLAC-XSig] [SAMLCore] [Schema1] [XMLSig] J. Kemp et al. SAML context class schema for Time Sync Token. OASIS SSTC, March Document ID saml-schema-authn-context-timesync-2.0. See J. Kemp et al. SAML context class schema for Public Key X.509. OASIS SSTC, March Document ID saml-schema-authn-context-x See J. Kemp et al. SAML context class schema for Public Key XML Signature. OASIS SSTC, March Document ID saml-schema-authn-context-xmldsig See S. Cantor et al. Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) V2.0. OASIS SSTC, March Document ID samlcore-2.0-os. See H. S. Thompson et al. XML Schema Part 1: Structures. World Wide Web Consortium Recommendation, May See 1/. D. Eastlake et al., XML-Signature Syntax and Processing, World Wide Web Consortium Recommendation, February See Copyright OASIS Open All Rights Reserved. Page 67 of 70
68 Appendix A. Acknowledgments The editors would like to acknowledge the contributions of the OASIS Security Services Technical Committee, whose voting members at the time of publication were: Conor Cahill, AOL John Hughes, Atos Origin Hal Lockhart, BEA Systems Mike Beach, Boeing Rebekah Metz, Booz Allen Hamilton Rick Randall, Booz Allen Hamilton Ronald Jacobson, Computer Associates Gavenraj Sodhi, Computer Associates Thomas Wisniewski, Entrust Carolina Canales-Valenzuela, Ericsson Dana Kaufman, Forum Systems Irving Reid, Hewlett-Packard Guy Denton, IBM Heather Hinton, IBM Maryann Hondo, IBM Michael McIntosh, IBM Anthony Nadalin, IBM Nick Ragouzis, Individual Scott Cantor, Internet2 Bob Morgan, Internet2 Peter Davis, Neustar Jeff Hodges, Neustar Frederick Hirsch, Nokia Senthil Sengodan, Nokia Abbie Barbir, Nortel Networks Scott Kiester, Novell Cameron Morris, Novell Paul Madsen, NTT Steve Anderson, OpenNetwork Ari Kermaier, Oracle Vamsi Motukuru, Oracle Darren Platt, Ping Identity Prateek Mishra, Principal Identity Jim Lien, RSA Security John Linn, RSA Security Rob Philpott, RSA Security Dipak Chopra, SAP Jahan Moreh, Sigaba Bhavna Bhatnagar, Sun Microsystems Eve Maler, Sun Microsystems Copyright OASIS Open All Rights Reserved. Page 68 of 70
69 Ronald Monzillo, Sun Microsystems Emily Xu, Sun Microsystems Greg Whitehead, Trustgenix The editors also would like to acknowledge the following former SSTC members for their contributions to this or previous versions of the OASIS Security Assertions Markup Language Standard: Stephen Farrell, Baltimore Technologies David Orchard, BEA Systems Krishna Sankar, Cisco Systems Zahid Ahmed, CommerceOne Tim Alsop, CyberSafe Limited Carlisle Adams, Entrust Tim Moses, Entrust Nigel Edwards, Hewlett-Packard Joe Pato, Hewlett-Packard Bob Blakley, IBM Marlena Erdos, IBM Marc Chanliau, Netegrity Chris McLaren, Netegrity Lynne Rosenthal, NIST Mark Skall, NIST Charles Knouse, Oblix Simon Godik, Overxeer Charles Norwood, SAIC Evan Prodromou, Securant Robert Griffin, RSA Security (former editor) Sai Allarvarpu, Sun Microsystems Gary Ellison, Sun Microsystems Chris Ferris, Sun Microsystems Mike Myers, Traceroute Security Phillip Hallam-Baker, VeriSign (former editor) James Vanderbeek, Vodafone Mark O Neill, Vordel Tony Palmer, Vordel Finally, the editors wish to acknowledge the following people for their contributions of material used as input to the OASIS Security Assertions Markup Language specifications: Thomas Gross, IBM Birgit Pfitzmann, IBM Copyright OASIS Open All Rights Reserved. Page 69 of 70
70 Appendix B. Notices OASIS takes no position regarding the validity or scope of any intellectual property or other rights that might be claimed to pertain to the implementation or use of the technology described in this document or the extent to which any license under such rights might or might not be available; neither does it represent that it has made any effort to identify any such rights. Information on OASIS's procedures with respect to rights in OASIS specifications can be found at the OASIS website. Copies of claims of rights made available for publication and any assurances of licenses to be made available, or the result of an attempt made to obtain a general license or permission for the use of such proprietary rights by implementors or users of this specification, can be obtained from the OASIS Executive Director. OASIS invites any interested party to bring to its attention any copyrights, patents or patent applications, or other proprietary rights which may cover technology that may be required to implement this specification. Please address the information to the OASIS Executive Director. Copyright OASIS Open All Rights Reserved. This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implementation may be prepared, copied, published and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this paragraph are included on all such copies and derivative works. However, this document itself does not be modified in any way, such as by removing the copyright notice or references to OASIS, except as needed for the purpose of developing OASIS specifications, in which case the procedures for copyrights defined in the OASIS Intellectual Property Rights document must be followed, or as required to translate it into languages other than English. The limited permissions granted above are perpetual and will not be revoked by OASIS or its successors or assigns. This document and the information contained herein is provided on an AS IS basis and OASIS DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Copyright OASIS Open All Rights Reserved. Page 70 of 70
Profiles for the OASIS Security Assertion Markup Language (SAML) V2.0
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 Profiles for the OASIS Security Assertion Markup Language (SAML) V2.0 OASIS Standard,
Bindings for the OASIS Security Assertion Markup Language (SAML) V2.0
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 Bindings for the OASIS Security Assertion Markup Language (SAML) V2.0 OASIS Standard,
Appendix 1 Technical Requirements
1 av 13 Appendix 1 Technical Requirements Version 2.4.7 Technical requirements for membership in the Skolfederation The Skolfederation has, like many other federation initiatives, the goal to use the following
Glossary for the OASIS Security Assertion Markup Language (SAML) V2.0
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 Glossary for the OASIS Security Assertion Markup Language (SAML) V2.0 OASIS Standard,
Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) V2.0
2 3 4 5 Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) V2.0 OASIS Standard, 15 March 2005 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32
Metadata for the OASIS Security Assertion Markup Language (SAML) V2.0
2 3 4 5 Metadata for the OASIS Security Assertion Markup Language (SAML) V2.0 OASIS Standard, 15 March 2005 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38
SAML V2.0 Asynchronous Single Logout Profile Extension Version 1.0
SAML V2.0 Asynchronous Single Logout Profile Extension Version 1.0 Committee Specification 01 22 November 2012 Specification URIs This version: http://docs.oasis-open.org/security/saml/post2.0/saml-async-slo/v1.0/cs01/saml-async-slo-v1.0-
Liberty ID-WSF Multi-Device SSO Deployment Guide
: Version: 1.0-02 Liberty ID-WSF Multi-Device SSO Deployment Guide Version: 1.0-02 Editors: Paul Madsen, NTT Contributors: Hiroki Itoh, NTT Kiyohiko Ishikawa, NHK Fujii Arisa, NHK Abstract: This document
COM_2006_023_02.xsd <?xml version="1.0" encoding="utf-8"?> <xs:schema xmlns:xs="http://www.w3.org/2001/xmlschema" elementformdefault="qualified">
[MS-DVRD]: Device Registration Discovery Protocol. Intellectual Property Rights Notice for Open Specifications Documentation
[MS-DVRD]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation for protocols, file formats, languages,
Liberty ID-WSF Authentication, Single Sign-On, and Identity Mapping Services Specification
: Version: v2.0 Liberty ID-WSF Authentication, Single Sign-On, and Identity Mapping Services Specification Version: v2.0 Editors: Jeff Hodges, NeuStar, Inc. Robert Aarts, Hewlett-Packard Paul Madsen, NTT
[MS-FSDAP]: Forms Services Design and Activation Web Service Protocol
[MS-FSDAP]: Forms Services Design and Activation Web Service Protocol Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications
+ <xs:element name="productsubtype" type="xs:string" minoccurs="0"/>
otcd.ntf.001.01.auctiondetail.. otcd.ntf.001.01.auctionresult - + otcd.ntf.001.01.automaticterminationsummary
Security Assertion Markup Language (SAML) V2.0 Technical Overview
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 Security Assertion Markup Language (SAML) V2.0 Technical Overview Committee Draft 02 25 March 2008
XACML Profile for Role Based Access Control (RBAC)
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 XACML Profile for Role Based Access Control (RBAC) Committee Draft 01, 13 February 2004 Document identifier: cs-xacml-rbac-profile-01 Location:
SAML 2.0 Interoperability Testing Procedures
1 2 3 4 5 6 7 8 9 10 11 Version 2.0 7 July 2006 Editors: Eric Tiffany, Contributors: Greg Whitehead, Hewlett-Packard Sampo Kellomäki, Symlabs Nick Ragouzis, Enosis Abstract: 12 13 14 15 16 17 18 19 20
The Direct Project. Implementation Guide for Direct Project Trust Bundle Distribution. Version 1.0 14 March 2013
The Direct Project Implementation Guide for Direct Project Trust Bundle Distribution Version 1.0 14 March 2013 Version 1.0, 14 March 2013 Page 1 of 14 Contents Change Control... 3 Status of this Guide...
No Trade Secrets. Microsoft does not claim any trade secret rights in this documentation.
[MS-EDCSOM]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation for protocols, file formats, languages,
SAML 2.0 INT SSO Deployment Profile
1 2 3 4 5 6 SAML 2.0 INT 7 8 9 Version: 0.1 Date: 2011-12-2 10 Editor: TBD 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Contributors: The full list of contributors can be referenced here: URL Status: This
Key Management Interoperability Protocol (KMIP)
(KMIP) Addressing the Need for Standardization in Enterprise Key Management Version 1.0, May 20, 2009 Copyright 2009 by the Organization for the Advancement of Structured Information Standards (OASIS).
Standards for Identity & Authentication. Catherine J. Tilton 17 September 2014
Standards for Identity & Authentication Catherine J. Tilton 17 September 2014 Purpose of these standards Wide deployment of authentication technologies that may be used in a global context is heavily dependent
This Working Paper provides an introduction to the web services security standards.
International Civil Aviation Organization ATNICG WG/8-WP/12 AERONAUTICAL TELECOMMUNICATION NETWORK IMPLEMENTATION COORDINATION GROUP EIGHTH WORKING GROUP MEETING (ATNICG WG/8) Christchurch New Zealand
Security for industrial automation and control systems: Patch compatibility information
Security for industrial automation and control systems: Patch compatibility information A Progress Report for Review and Comment From ISA99 Work Group 6 (Patch Management) The material in this report has
Digital Signature Web Service Interface
1 2 Digital Signature Web Service Interface 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 1 Introduction This document describes an RPC interface for a centralized
CAS Protocol 3.0 specification
CAS Protocol 3.0 specification Contents CAS Protocol 3.0 Specification 5 Authors, Version 5 1. Introduction 5 1.1. Conventions & Definitions.................... 5 1.2 Reference Implementation....................
IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0
International Virtual Observatory Alliance IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0 IVOA Proposed Recommendation 20151029 Working group http://www.ivoa.net/twiki/bin/view/ivoa/ivoagridandwebservices
Test Plan for Liberty Alliance SAML Test Event Test Criteria SAML 2.0
1 2 3 4 5 6 7 8 9 10 11 Test Plan for Liberty Alliance SAML Test Event Test Criteria SAML 2.0 Version 3.2.2 Editor: Kyle Meadors, Drummond Group Inc. Abstract: This document describes the test steps to
[MS-SAMLPR]: Security Assertion Markup Language (SAML) Proxy Request Signing Protocol
[MS-SAMLPR]: Security Assertion Markup Language (SAML) Proxy Request Signing Protocol Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes
SAML Privacy-Enhancing Profile
SAML Privacy-Enhancing Profile Moritz Horsch 1, Max Tuengerthal 2, Tobias Wich 2 1 Technische Universität Darmstadt, Hochschulstraße 10, 64289 Darmstadt [email protected] 2 ecsec GmbH,
Web Services Metadata Exchange (WS- MetadataExchange)
Web Services Metadata Exchange (WS- MetadataExchange) September 2004 Authors Keith Ballinger, Microsoft Don Box, Microsoft Francisco Curbera (Editor), IBM Srinivas Davanum, Computer Associates Don Ferguson,
ATSC Standard: ATSC Security and Service Protection Standard
ATSC Standard: ATSC Security and Service Protection Standard Doc. A/106 28 September 2015 Advanced Television Systems Committee 1776 K Street, N.W. Washington, D.C. 20006 202-872-9160 1 The Advanced Television
[MS-SAMLPR]: Security Assertion Markup Language (SAML) Proxy Request Signing Protocol Specification
[MS-SAMLPR]: Security Assertion Markup Language (SAML) Proxy Request Signing Protocol Specification Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft
DocuSign Connect Guide
Information Guide 1 DocuSign Connect Guide 2 Copyright 2003-2014 DocuSign, Inc. All rights reserved. For information about DocuSign trademarks, copyrights and patents refer to the DocuSign Intellectual
Cross Operation of Single Sign-On, Federation, and Identity Web Services Frameworks
: Version: 1.1 Cross Operation of Single Sign-On, Federation, and Identity Web Services Frameworks Version: 1.1 Editors: Sampo Kellomäki, Symlabs, Inc. Contributors: Conor Cahill, Intel Rob Lockhart, IEEE-ISTO
Assertions and Protocol for the OASIS Security Assertion Markup Language (SAML) V1.1
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 Assertions and Protocol for the OASIS Security Assertion Markup Language (SAML) V1.1 OASIS Standard,
[MS-QoE]: Quality of Experience Monitoring Server Protocol Specification
[MS-QoE]: Quality of Experience Monitoring Server Protocol Specification Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications
Certification Final Report SAML 2.0 Interoperability Test First Quarter 2011 (1Q11) March 31, 2011
Certification Final Report SAML 2.0 Interoperability Test First Quarter 2011 (1Q11) March 31, 2011 Prepared & Administered by: DRUMMOND GROUP INC. www.drummondgroup.com Copyright Drummond Group Inc. 2011
DRAFT. Standard Definition. Extensible Event Stream. Christian W. Günther Fluxicon Process Laboratories [email protected]
Extensible Event Stream Standard Definition Christian W. Günther Fluxicon Process Laboratories [email protected] XES Version: 1.0 Revision: 1 November 25, 2009 DRAFT Introduction Event logs, as they
A Federated Authorization and Authentication Infrastructure for Unified Single Sign On
A Federated Authorization and Authentication Infrastructure for Unified Single Sign On Sascha Neinert Computing Centre University of Stuttgart Allmandring 30a 70550 Stuttgart [email protected]
OpenHRE Security Architecture. (DRAFT v0.5)
OpenHRE Security Architecture (DRAFT v0.5) Table of Contents Introduction -----------------------------------------------------------------------------------------------------------------------2 Assumptions----------------------------------------------------------------------------------------------------------------------2
SAML Federated Identity at OASIS
International Telecommunication Union SAML Federated Identity at OASIS Hal Lockhart BEA Systems Geneva, 5 December 2006 SAML and the OASIS SSTC o SAML: Security Assertion Markup Language A framework for
This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:
CHAPTER 1 SAML Single Sign-On This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: Junos Pulse Secure Access
Federated Identity in the Enterprise
www.css-security.com 425.216.0720 WHITE PAPER The proliferation of user accounts can lead to a lowering of the enterprise security posture as users record their account information in order to remember
[MS-QoE]: Quality of Experience Monitoring Server Protocol. Intellectual Property Rights Notice for Open Specifications Documentation
[MS-QoE]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation for protocols, file formats, languages,
Copyright 2012, Oracle and/or its affiliates. All rights reserved.
1 OTM and SOA Mark Hagan Principal Software Engineer Oracle Product Development Content What is SOA? What is Web Services Security? Web Services Security in OTM Futures 3 PARADIGM 4 Content What is SOA?
An Empirical Study on XML Schema Idiosyncrasies in Big Data Processing
An Empirical Study on XML Schema Idiosyncrasies in Big Data Processing Dmitry Vasilenko, Mahesh Kurapati Business Analytics, IBM, Chicago, USA {dvasilen, mkurapati}@us.ibm.com Abstract The design and maintenance
MedBiquitous Web Services Design Guidelines
MedBiquitous Web Services Design Guidelines Version 2.0 13 May 2009 MedBiquitous Technical Steering Committee Revision History Date Version Description Author 17 Dec 2003 0.9 Draft for Technical Steering
PEPPOL Deliverable D1.1 Requirements for Use of Signatures in Public Procurement Processes Part 5: XKMS v2 Interface Specification
PEPPOL Deliverable D1.1 Requirements for Use of Signatures in Public Procurement Processes Part 5: XKMS v2 Interface Specification Profiling and Extensions Specification Version 1.2 PEPPOL WP1 2009-04-30
Authentication Context Classes for Levels of Assurance for the Swedish eid Framework
Authentication Context Classes for Levels of Assurance for the Swedish eid Framework Version 1.0 2013-07-01 1 (5) 1 INTRODUCTION 3 2 DEFINED AUTHENTICATION CONTEXT CLASSES 3 2.1 LEVEL OF ASSURANCE LEVEL
Kantara egov and SAML2int comparison
Kantara egov and SAML2int comparison 17.8.2010/[email protected] This document compares the egovernment Implementation profile of SAML 2.0, created by the egovernment WG of Kantara Initiative, and the
WebLogic Server 7.0 Single Sign-On: An Overview
WebLogic Server 7.0 Single Sign-On: An Overview Today, a growing number of applications are being made available over the Web. These applications are typically comprised of different components, each of
White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform
White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.
Oasis Security Services Use Cases And Requirements
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 Oasis Security Services Use Cases And Requirements Consensus Draft 1, 30 May 2001 Purpose This document describes
New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation
New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole
Gplus Adapter 8.0. for Siebel CRM. Developer s Guide
Gplus Adapter 8.0 for Siebel CRM Developer s Guide The information contained herein is proprietary and confidential and cannot be disclosed or duplicated without the prior written consent of Genesys Telecommunications
Security Assertion Markup Language (SAML) V2.0 Technical Overview
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 Security Assertion Markup Language (SAML) V2.0 Technical Overview Working Draft 10, 9 October 2006 Document
Session Initiation Protocol (SIP) Registration Extensions
[MS-SIPREGE]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation for protocols, file formats, languages,
Web Services Secure Conversation Language (WS-SecureConversation)
Web Services Secure Conversation Language (WS-SecureConversation) February 2005 Authors Steve Anderson, OpenNetwork Jeff Bohren, OpenNetwork Toufic Boubez, Layer 7 Marc Chanliau, Computer Associates Giovanni
WEB SERVICES SECURITY
WEB SERVICES SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Web Services Distributed Management: Management of Web Services (WSDM-MOWS) 1.1
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 Web Services Distributed Management: Management of Web Services (WSDM-MOWS) 1.1 OASIS Standard, 01 August
How To Understand And Understand The Security Of A Key Infrastructure
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used
CryptoNET: Security Management Protocols
CryptoNET: Security Management Protocols ABDUL GHAFOOR ABBASI, SEAD MUFTIC CoS, School of Information and Communication Technology Royal Institute of Technology Borgarfjordsgatan 15, SE-164 40, Kista,
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
Authentication Tokens
State Capitol P.O. Box 2062 Albany, NY 12220-0062 www.its.ny.gov New York State Information Technology Standard IT Standard: Authentication Tokens No: NYS-S14-006 Updated: 05/15/2015 Issued By: NYS ITS
The Security Behind Sticky Password
The Security Behind Sticky Password Technical White Paper version 3, September 16th, 2015 Executive Summary When it comes to password management tools, concerns over secure data storage of passwords and
[MS-MDM]: Mobile Device Management Protocol. Intellectual Property Rights Notice for Open Specifications Documentation
[MS-MDM]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation for protocols, file formats, languages,
Single Sign-On Implementation Guide
Salesforce.com: Salesforce Winter '09 Single Sign-On Implementation Guide Copyright 2000-2008 salesforce.com, inc. All rights reserved. Salesforce.com and the no software logo are registered trademarks,
XEP-0337: Event Logging over XMPP
XEP-0337: Event Logging over XMPP Peter Waher mailto:[email protected] xmpp:[email protected] http://www.linkedin.com/in/peterwaher 2015-11-09 Version 0.2 Status Type Short Name Experimental
Digital Signing without the Headaches
Digital Signing without the Headaches Nick Pope 1 Juan Carlos Cruellas 2 1 Security & Standards Associates Grays, Essex, United Kingdom [email protected] 2 Universitat Politècnica de Catalunya Barcelona,
Salesforce1 Mobile Security Guide
Salesforce1 Mobile Security Guide Version 1, 1 @salesforcedocs Last updated: December 8, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
ARCHIVED PUBLICATION
ARCHIVED PUBLICATION The attached publication, NIST Special Publication 800-63 Version 1.0.2 (dated April 2006), has been superseded and is provided here only for historical purposes. For the most current
SP 800-130 A Framework for Designing Cryptographic Key Management Systems. 5/25/2012 Lunch and Learn Scott Shorter
SP 800-130 A Framework for Designing Cryptographic Key Management Systems 5/25/2012 Lunch and Learn Scott Shorter Topics Follows the Sections of SP 800-130 draft 2: Introduction Framework Basics Goals
Schema XSD opisująca typy dokumentów obsługiwane w Systemie invooclip
Krajowa Izba Rozliczeniowa S.A. Schema XSD opisująca typy dokumentów obsługiwane w Systemie invooclip Wersja 1.1
<!--=========================================--> <!--=========================================-->
MACE-Dir SAML Attribute Profiles
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 MACE-Dir SAML Attribute Profiles April 2008 Document identifier: internet2-mace-dir-saml-attributes-200804a Location: http://middleware.internet2.edu/dir Editors:
Bindings for the Service Provisioning Markup Language (SPML) Version 1.0
1 2 3 Bindings for the Service Provisioning Markup Language (SPML) Version 1.0 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 OASIS Standard, Approved October 2003 Document identifier:
Title: A Client Middleware for Token-Based Unified Single Sign On to edugain
Title: A Client Middleware for Token-Based Unified Single Sign On to edugain Sascha Neinert Computing Centre University of Stuttgart, Allmandring 30a, 70550 Stuttgart, Germany e-mail: [email protected]
Authentication and Single Sign On
Contents 1. Introduction 2. Fronter Authentication 2.1 Passwords in Fronter 2.2 Secure Sockets Layer 2.3 Fronter remote authentication 3. External authentication through remote LDAP 3.1 Regular LDAP authentication
HTTP State Management
HTTP State Management Candidate Version 1.1 27 Feb 2007 Open Mobile Alliance OMA-TS-HTTPSM-V1_1-20070227-C OMA-TS-HTTPSM-V1_1-20070227-C Page 2 (17) Use of this document is subject to all of the terms
SAML Implementation Guidelines
1 2 3 4 SAML Implementation Guidelines Working Draft 01, 27 August 2004 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 Document identifier: sstc-saml-implementation-guidelines-draft-01 Location:
3GPP TS 24.623 V8.1.0 (2008-09)
TS 24.623 V8.1.0 (2008-09) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Extensible Markup Language (XML) Configuration Access Protocol
A Mechanism for VHDL Source Protection
A Mechanism for VHDL Source Protection 1 Overview The intent of this specification is to define the VHDL source protection mechanism. It defines the rules to encrypt the VHDL source. It also defines the
Introduction to SAML
Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments
[MS-ASMS]: Exchange ActiveSync: Short Message Service (SMS) Protocol
[MS-ASMS]: Exchange ActiveSync: Short Message Service (SMS) Protocol Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications
Security Assertion Markup Language (SAML) 2.0 Technical Overview
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Security Assertion Markup Language (SAML) 2.0 Technical Overview Working Draft 03, 20 February 2005 Document identifier:
ELECTRONIC COMMERCE OBJECTIVE QUESTIONS
MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module
Access Control in Distributed Systems. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Access Control in Distributed Systems Murat Kantarcioglu Topics Overview SAML XACML Overview Security for distributed systems has been widely
ipad in Business Security
ipad in Business Security Device protection Strong passcodes Passcode expiration Passcode reuse history Maximum failed attempts Over-the-air passcode enforcement Progressive passcode timeout Data security
