2013
DOI: 10.1007/978-3-642-37282-7_13
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Identity Federation Using Security Assertion Markup Language (SAML)

Abstract: Abstract. Security Assertion Markup Language (SAML, in short) is one of the most widely used technologies to enable Identity Federation among organisations from different trust domains. Despite its several advantages, one of the key disadvantages of SAML is the mechanism by which an identity federation is established. This mechanism lacks flexibility to create a federation in a dynamic fashion to enable service provisioning (or de-provisioning) in real time. Several different mechanisms to rectify this problem… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
4
2
1

Relationship

3
4

Authors

Journals

citations
Cited by 16 publications
(7 citation statements)
references
References 7 publications
0
7
0
Order By: Relevance
“…The implementation supports two types of SAML IdPs: trusted and semi-trusted. A trusted SAML IdP is the one which has been federated in the traditional way by exchanging metadata at the admin level whereas a semi-trusted SAML IdP is the one that has been federated using the concept of dynamic federation (Ferdous & Poet, 2013b). In addition, the Hybrid IdP determines the LoA for each IdP in this way: attributes from the Hybrid IdP or from any trusted SAML IdP will have a LoA value of 2 whereas attributes from all other IdPs will have a LoA value of 1.…”
Section: Methodsmentioning
confidence: 99%
“…The implementation supports two types of SAML IdPs: trusted and semi-trusted. A trusted SAML IdP is the one which has been federated in the traditional way by exchanging metadata at the admin level whereas a semi-trusted SAML IdP is the one that has been federated using the concept of dynamic federation (Ferdous & Poet, 2013b). In addition, the Hybrid IdP determines the LoA for each IdP in this way: attributes from the Hybrid IdP or from any trusted SAML IdP will have a LoA value of 2 whereas attributes from all other IdPs will have a LoA value of 1.…”
Section: Methodsmentioning
confidence: 99%
“…The IdP component also shares the same back-end database of the PAS to retrieve static or dynamic attributes during the user authentication phase. The PPIdP can be integrated with the SP using the concept of Dynamic Federation to create the federation in a dynamic fashion [23]. Such a federation involving the PPIdP is called the Personal Identity Federation (PIF) [22].…”
Section: Cafs Frameworkmentioning
confidence: 99%
“…The middle IdP in this setting is known as the Proxy IdP and is assumed to be fully trusted by the SP with a mutual trust agreement. On the other hand, the PPIdP will be considered as a semitrusted entity (not fully trusted by another entity, see [23]) by both the proxy IdP and the SP following the condition of the dynamic federation as explained in [23].…”
Section: Cafs Frameworkmentioning
confidence: 99%
“…This standard set of attributes is relatively stable, but it can evolve over time to meet the changing needs of the federation members. The trustworthiness of the federation members is based on a web of trust model which is similar to the PGP trust model [16]. This allows existing federation members to dynamically introduce new federation members based on their collective recommendations.…”
Section: The F-sams Systemmentioning
confidence: 99%