To propose a new idea, copy and paste the table below. Ideas don't need to be fully formed but the more scope we can get the easier it will be to assess whether idea should be taken forward.
Anything in the Trust and Identity space is of interest, from improvements to current services to brand new ideas and technologies.
If your idea already exists in the suggestions, you can just add a +1 for endorsement.
Template
Title | <title of your proposal here> |
---|---|
Description | <description text here> |
Proposer | <your name here> |
Resource requirements | <money? effort? coordination? infrastructure?> |
+1's | <for others to voice their support - add your name here> |
Proposals
Title | Global Push-MDQ Infrastructure |
---|---|
Description | Build a global, shared infrastructure for federations to submit/publish per-entity metadata to eduGAIN, and have those updates be pushed via messaging infrastructure to subscribers. This will enable more rapid metadata updates and a global per-entity metadata distribution infrastructure. It should be possible to accommodate multiple federations submitting/publishing metadata for the same entityIDs, and consumers can subscribe to whichever version they choose. NOTE: This may also facilitate a solution to IdP discovery in a per-entity metadata world. |
Proposer | Nick Roy |
Resource requirements | Money, effort, standardisation, coordination, infrastructure, operations |
+1's | Chris Phillips - CANARIE – see related collab area: https://wiki.refeds.org/display/GROUPS/Incubator |
Title | Response Testing for Security Contacts |
---|---|
Description | Simple response testing process for security contacts in federation metadata. Could replicate the process currently used by Trusted Introducer. |
Proposer | Nicole Harris |
Resource requirements | money, infrastructure |
+1's | Thomas Lenggenhager (SWITCH) provided you are careful not to annoy the security contacts Wolfgang Pempe (DFN): our plan is to perform some test alarm at least once a year |
Title | Query service for Sirtfi |
---|---|
Description | API to query whether an entity supports Sirtfi. In addition, a mechanism for asserting Sirtfi compliance outside federation metadata. |
Proposer | Hannah Short (with Nicole Harris and Ann Harding) |
Resource requirements | money, infrastructure |
+1's | (Wolfgang Pempe, DFN: outside federation metadata? IMHO not a good idea. This would lead to inconsistencies.) |
Title | Reputation Portal |
---|---|
Description | A way to flag bad (or good!) behaviour of entities, e.g. Sirtfi compliance, LoA misuse, CoCo violation |
Proposer | Hannah Short (with Nicole Harris and Ann Harding) |
Resource requirements | money, infrastructure |
+1's |
Title | Last_seen() |
---|---|
Description | Federated AAI is poorly equipped to support SPs in dealing with the depreciation of users by the IdP. Outside of at login time, the SP basically has no way of finding out the user is no longer a user at an institution, save perhaps sending out emails. A mechanism to allow SPs to learn about a user status would help SPs immensely to keep data accurate and at the same time improve privacy and data protection. This activity should investigate push and pull scenarios and propose and implement example solution(s), in collaboration with entities that produce commonly used software products in our space. Retaining the privacy of the enduser in the process is paramount! |
Proposer | Niels |
Resource requirements | money, software dev, standarization |
+1's | Wolfgang Pempe (DFN): the current approach (at least in our federation) is to perform periodical attribute queries with SAML2 Persistent NameID, which leads to quite some problems. |
Title | eduGAIN Federated Service Catalog |
---|---|
Description | At the moment, the only way you get an overview of services in eduGAIN is via metadata. While this is how the system is designed to work (machine to machine), service info is also interesting to humans e.g. to browse, to know if an SP already exists etc. A preliminary WG is starting in REFEDs to look at how service catalogs could be built. An eduGAIN level catalog should build on that work and also integrate with other relevant catalogs e.g open science cloud, NREN's own catalogs etc. |
Proposer | Ann Harding |
Resource requirements | Standardisation/spec via refeds Prototype implemention for aggregation. Protoype implementation for federation level infra. Pilot. |
+1's | Wolfgang Pempe (DFN): encourage cross-federation support for mdui:Keywords. |
Title | Storing History and Evolution of Metadata in a Distributed Ledger |
---|---|
Description | The aggregated metadata of eduGAIN is under constant change as entities get added, removed, or changed. While daily backups are made, there is no event-based changelog and no trace of which change was made when. When an entry of interest is examined, the search for the exact event timestamps of changes pertaining to that entry are tedious by searching old copies of the entity database manually. The proposed system stores any change to the metadata aggregate one-by-one in a ledger as soon as it happens. That way, even intra-day changes (between daily database backups) can be observed and a "rewind" of the entity list to specific point in time becomes simple. For improved traceability of any changes, the ledger can be made distributed and authenticated in the way that both the publishing eduGAIN participant (sending side) and the eduGAIN OT (receiving side) both sign the change in a distributed ledger. The ledger would be distributed so that each eduGAIN federation maintains a copy. With that, changes made automatically synchronise between federations and a manual polling of per-participant feeds (by eduGAIN OT) as well as a periodic download of the aggregate (by eduGAIN participants) becomes superfluous. eduGAIN OT still maintains its role as metadata policy verifier by signing only such changes in metadata which result in eduGAIN policy conformant metadata. As a positive side-effect, this changes the granularity of metadata rejection from a per-participant (country-wide) effect to a per-entity effect, reducing outages due to metadata of entire participant federations vanishing. The solution developed here is not limited to eduGAIN exclusively; it can also be used inside a federation to collect and sign individual pieces of metadata, thereby assembling its own metadata set in the same way. Where IdPs or SP choose to maintain a copy of the ledger, they can immediately and in real-time see any changes and implement them in their entity; resulting in an experience similar to the MDX proposal above. They can choose to incorporate only entries signed by their own federation, or a superset to their liking. |
Proposer | Stefan Winter (RESTENA) |
Resource Requirements | VMs, storage for the ledger, a blockchain implementation, someone to work on that so it fits our needs |
+1's |
Title | Scope verification based on DNS |
---|---|
Description | The scope part of attributes means critical security context for many applications. Currently the only way for an SP to check whether an IdP is allowed to use a scope is based on verification of shibmd:Scope metadata extension. As metadata might originate from a massive number of sources, an organization and/or an SP might want to provide additional means to verify scope usage. If the scope equals to a real domain name, it can be easily implemented by adding TXT records to the domain record that describe the allowed entityIDs which can assert the scope. (Similar to SPF - Sender Policy Framework.) This should be an optional measure in addition to existing metadata-based scope verification technique. |
Proposer | Kristof Bajnok (eduID.hu) |
Resource requirements | standardization - REFEDs? implementation for Shibboleth and SimpleSAMLphp |
+1's | <for others to voice their support - add your name here> |
Title | Adoption & Outreach Support for eduGAIN BCP |
---|---|
Description | BCP for eduGAIN will be launched in 2018. Federations should be supported to gain adoption by campuses |
Proposer | Ann H on behalf of several |
Resource requirements | Funding for outreach and adoption efforts at each GEANT partner, strategic/materials support for all. |
+1's | <for others to voice their support - add your name here> |
Title | Reference implementation of an IdP and OP in Python |
---|---|
Description | The current GN4-2 projet has invested heavly into the Python stack for OpenID Connect (federation) and it should be good to put together a full blown home organisation IdP/OP based on this work and earlier work with the SAML stack. This imlementation should support all current best practices in eduGAIN and retrie attributes from different sources. |
Proposer | Pål Axelsson on behalf of Sunet |
Resource requirements | money, software dev |
+1's | Stefan Winter |
Title | Allow eduGAIN OT to enrich MDS metadata |
---|---|
Description | Currently, metadata is controlled exclusively by federation operators, which is generally good. However, there will pop up use-cases where it is more efficient, a lot faster and definitely more agile to allow eduGAIN OT to enrich eduGAIN metadata centrally with some entity categories because if all 50+ federations have to do something, it will take years and effort to set some entity category is duplicated for each federation. |
Proposer | Lukas Hämmerle, SWITCH |
Resource requirements | Policy might need to be changed, it would have to be defined what/what not eduGAIN OT reasonably could and should do. Some (limited) implementation effort on MDS might be needed. |
+1's |
You do not have to fill in every field, just give as much detail as you have right now if you know them.