- Approve minutes of UMA telecon 2021-09-09, UMA telecon 2021-09-16, UMA telecon 2021-09-23, UMA telecon 2021-09-30, UMA telecon 2021-10-14, UMA telecon 2021-10-21, UMA telecon 2021-10-28
The Kantara All members meeting is Dec 8th, 11-1230ET (it's virtual, link TBD)
FHIR Vulnerability Report
Please take a look, all comments/contributions welcomed! There original report is attached to the confluence page
OAuth vs UMA content
previous discussion: UMA telecon 2021-09-16
Who is the right audience for this content? a version at different 'levels'? Show value to Business & Technical separately,
At biz level, there is buy into 'OAuth is awesome' and creates the question "so why do I need UMA?"
- 'putting you lock on the wrong locker' UMA helps prevent this mistake
- you can apply Oauth to protect an API, however the solution still needs to consider who's who (authN) and who has access to what (authZ)
Maybe it's 'what's oauth' and then a 'what's UMA to follow up'
Here' the problem UMA addresses: it allows a person to control their stuff, and how they want to share it with somewhere else. OAuth is an underlying technology to authorize the requestor. eg give Alice the ability to call the help desk to give her Mom or spouse access to her record. UMA gives Alice the ability to do this herself. THe cost reduction of self-service access is similar to removing manual 'forgot password' flow.
By using UMA, it reduces the custom development of these features in existing stacks. UMA services come with these features off the shelf, shift custom impl to configuration. (Except policy which is... left to the reader)
Removes requirements from the enterprise by given the user the direct ability to manage their stuff themselves.
Google drive sharing is the best practical example of this (even though it doens't use UMA ).
What is the best format for this content?
- 2-3 slides that members can easily re-use
What about UMA vs GNAP? Will GNAP replace OAuth and UMA?
Have never heard a customer request GNAP, only discussion within the IETF/OAuth/UMA communities.
Check out the recent GNAP progress here: https://github.com/ietf-wg-gnap/gnap-core-protocol
Is there a clear UMA → GNAP transition?
PAT lifecycle management
PAT lifecycle management, it is a OAuth access token, with expiration and refresh token
When it's needed (eg when a client makes a request) it can be expired
How long should it live?
- the PAT itself it an access token and should expire in a short window (eg normal access token, such as 5mins)
- the refresh token can have a loooong lifetime, eg months/years
- the PAT represents the ROs authorization for the RS to trust the AS, and for the AS to protect the RS's API
- it should expire aligned with that human level policy around expiration
What to do if the PAT and it's refresh have expired? Need the RO to come back and regenerate it
- should there be a different message to the client? It's not the RO at the client, instead it's the RqP. We shouldn't expose the maintenence of the PAT to the RqP
- the RS can't issue a ticket to the RqP
- there is no definied response in this case, is it a 403? there is no appropriate www-authenticate type redirect
- UMA Implementer's Guide#pat-invalidResourceServerErrorHandlingWhenthePATIsInvalid
- return a 403 with http error and header 'Warning: 199 - "UMA Authorization Server Unreachable"'
- ideally there is some RS → RO notification to renew
Depends on the RO model. When the RO is the RS, the RS can always get a new PAT using it's client credentails
If the RO is a proper subject, then these challenges all exist
Could the AS always allow a RS=RO PAT, how would this interact/intersect with proper subject RO bounded PATs?
A not-uma solution (relationship manager solution)
RS <> AS: resources registered (eg /patient)
RS → RO: 'id token' with the subject id (alec123)
RO → AS: the RS knows me as alec123, I want to give Bob access to /patient for that subject
AS → RS: introspection result returns resource and subject id
- We are planning a 3 hour working session on December 9th, we will use extend the normal call from 930-1230ET
- Want to make progress on some of the in-progress docs, have them in a consistent state
- Eve, Nancy, Alec, Andi
- If you're up to attend, please email Alec, or leave a comment on these minutes
Next week, Steve will give a de-brief of the FIDO authenticate conference
Topic Candidates (from previous week's telcon)
As of October 26, 2020, quorum is 5 of 9. (Michael, Domenico, Peter, Sal, Thomas, Andi, Alec, Eve, Steve)