- Gael Gourmelen
- Fulup Ar Foll
- Jonas Hogberg
- Tim Cole
- Rainer Horbe
- Mark Lizar
- HervHervé Ganem
- Ingo Friese
- Hiroki Itoh
- Alam Mohammed
- Philippe Clement
- Sebastien Brault
- Bill Braithwaite
- John Bradley
- Mikael Ates
- Serge Ravet
- Benoit Ballieux
- Dervla O'Reilly (staff)
- Anna Ticktin (staff)
- Domenico passed new Trusted Claims diagram + UX to list
Main simplification assumptions are:
- Subject Authentication: support for SSO affiliated authentication (OpenID, Fed/SAML) in the step 1 and step 4 to reduce authentication processes.
- AM2 Subject session management in the step 5 (allow cache subject consent).
- "Silent Consent" (no online consent, only subject notification) based on claims release policy at AM (i.e. Subject specifies silent consent for specific identity attributes which have low privacy impact) -> not included in the UX.
Maciej explains what scope registration means - Host communicates to the AM all the resources that they are managing that need protection. Scope defines the resource, describes the things you can do to a bunch of stuff e.g. from OAuth. (JB says it's claims based access, others says it's groups) Scope also refers to AM resources access as opposed to Host-based access. This prompts Maciej to provide an overview.
John Bradley digs into understanding the scope and registration issues - asks if it makes sense to exchange the keys and the (? - missing) in the initial OAuth flow.
Maciej describes the UMA flows and presents an introduction to UMA. JB asks about dynamic PEP/PDP and remote validation. JB asks about opaque tokens so the host knows which AM to talk to. Maciej says that this can be a problem. JB says that making the assumption that the host knows is a bad design choice.
JB brings up a great point: if the requester is talking to a non-human requester vs. a human requester.
Rainer brings up an enterprise use case - where the administrator sets the policy, and the user executes the policy. Herve explains that there is a use case for this and that this is baked into UMA. JB reiterates this in an enterprise context and discuss that this can be done through claims. Herve explains that you look at claims as if they are protected resources. JB another way to look at this can be like a Secure Token Service (STS).
JB points out that UMA is just one way to transform one type of token into another.