By superpat on Sep 23, 2008
Nice - maybe I'll get some of my old games up on my MacBook Pro :-)
I'm sitting in seat 20A of Delta flight 101 from Atlanta to Buenos Aires, catching up with the blogging backlog that built up during the RSA Conference. I usually compose my blog entries directly in Roller's web UI, but, since there bain't be no Interweb up here, I'm using Flock's built-in blog editor, and a very comfortable experience it is. I can type up the bulk of the text in the 'Editor' view, tweak formatting in 'Source' view and get a pretty good idea of how it will look in 'Preview', fiipping back and forth as I go.
While this is very convenient, what is really cool is that I have Flock in 'offline' mode, but it allows me to load pages from its cache, so, since most everything I've looked at lately is cached, I can just go to a URL, and I see it exactly as if I was connected. This lets me look up links, check references, even view source to remind myself of the formatting I use when posting over at The Aquarium. In fact, it's probably more productive than being connected, since there's no email to distract me
The information card (aka InfoCard, aka CardSpace) portion of the OSIS event focused on testing 17 identity provider security token services (IP/STS) against 39 relying parties (RP) plus specific feature tests (note - right now, a bug in the wiki software means that both the IdP and RP feature results tables are shown under the RP heading). Last time I looked, OpenSSO worked with 11 of the identity providers and 19 relying parties. Of the remainder, many (shown as N/A in the table) were not tested due to incompatible policies - for example, it's impossible to test an IP/STS against an RP that only accepts self-issued cards. Some others (shown as Not Tested in OpenSSO's results) are not yet online. Of the outright failures, many on the RP side seem to be due to the assumption that the token MUST be encrypted by the IP/STS. This is somewhat ambiguous in the specification (section 8.3), which clearly states that self-issued cards SHOULD be encrypted, but leaves the question open for managed cards. I'll let you into a secret - I inadvertently configured the OpenSSO IP/STS to not encrypt tokens; a lucky mistake in that it exposed this nit.
Meanwhile, over on the expo floor, OpenSSO was also well represented in the OASIS XACML interop event (press release). Where the OSIS event focused on basic on-the-wire compatibility, the XACML interop covered quite an elaborate use case from the U.S. Department of Veterans Affairs featuring role-based access control (RBAC), privacy protections, structured and functional roles, consent codes, emergency overrides and filtering of sensitive data. I ducked out of the OSIS interop to go take a look (and say 'Hi' to Bina and Dilli from the OpenSSO team) and was blown away - 7 vendors supplied policy decision points (PDPs), while OpenSSO was also the policy evaluation point (PEP) for the client side of the demo app. Actually, demo app doesn't begin to do it justice - the application showed how a patient could set policy to control access to medical records, down through controls on individual physicians seeing your records to physician + resource (e.g. Dr Bob isn't allowed to see my radiography results) and more. There was even an emergency 'break glass' override included to allow a physician (duly authenticated, of course) to get access to any of your notes via a specific affirmation that an emergency is in progress. Very cool stuff - it seems like XACML is coming of age!
A packed schedule over the next few months - I'll be spreading the OpenSSO gospel on three continents:
|April 19 (this coming Saturday!)||Porto Alegre, Brazil||Open Source Identity Integration with OpenSSO|
|May 5||San Francisco, CA||
OpenSSO Workshop: Creating Federated Relationships with Software as a Service, Social Networking, and Web 2.0 Applications.
I'll also be attending JavaOne 2008, May 6-9 at the same location.
|May 12-14||Mountain View, CA||I'll probably do a session on the Fedlet.|
|June 25||Zurich, Switzerland||Who's On The Other End of the Wire? Identity-Enabling Java Web Applications with OpenSSO|
|July 4||Mont-de-Marsan, France||Open Source Identity Integration with OpenSSO|
I'll also be at the Liberty Alliance plenary meeting in Stockholm, Sweden from July 8-10. Then I'll be taking a much-needed vacation!
No bookmarks in folder