<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://k5wiki.kerberos.org/wiki?action=history&amp;feed=atom&amp;title=KrbWeb_Buckley-BoardMtgPresoAndNotes-2008-07-24</id>
		<title>KrbWeb Buckley-BoardMtgPresoAndNotes-2008-07-24 - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://k5wiki.kerberos.org/wiki?action=history&amp;feed=atom&amp;title=KrbWeb_Buckley-BoardMtgPresoAndNotes-2008-07-24"/>
		<link rel="alternate" type="text/html" href="https://k5wiki.kerberos.org/wiki?title=KrbWeb_Buckley-BoardMtgPresoAndNotes-2008-07-24&amp;action=history"/>
		<updated>2026-04-27T17:44:00Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.4</generator>

	<entry>
		<id>https://k5wiki.kerberos.org/wiki?title=KrbWeb_Buckley-BoardMtgPresoAndNotes-2008-07-24&amp;diff=435&amp;oldid=prev</id>
		<title>=JeffH: Created.</title>
		<link rel="alternate" type="text/html" href="https://k5wiki.kerberos.org/wiki?title=KrbWeb_Buckley-BoardMtgPresoAndNotes-2008-07-24&amp;diff=435&amp;oldid=prev"/>
				<updated>2008-08-22T21:37:30Z</updated>
		
		<summary type="html">&lt;p&gt;Created.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{krbweb-page}}&lt;br /&gt;
&lt;br /&gt;
==Context==&lt;br /&gt;
&lt;br /&gt;
Below are (reformatted) &amp;quot;..slides and notes from the Consortium Board meeting..&amp;quot; sent by Steve [http://mailman.mit.edu/mailman/private/mitkc-krbweb/2008-July/000039.html in this message] on 24-Jul-2008 to mitkc-krbweb@. &lt;br /&gt;
&lt;br /&gt;
They appear to be taken from Sam Hartman's  [http://www.kerberos.org/events/Board-4-7-08/3-hartman.pdf &amp;quot;Kerberos Road Map&amp;quot; board preso] of 7-Apr-2008, specifically the &amp;quot;Kerberos on the Web&amp;quot; major section, and have been slightly edited along with apparent questions/comments inserted, especially towards the end after the &amp;quot;Broader Authentication&amp;quot; topic header.  &lt;br /&gt;
&lt;br /&gt;
==Kerberos on the Web Preso &amp;amp; Notes==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Kerberos on the web - Contents:&lt;br /&gt;
  o understand and analyze web services&lt;br /&gt;
    + WS-&lt;br /&gt;
    + Soap&lt;br /&gt;
    + XML DSIG/encryption&lt;br /&gt;
    + REST&lt;br /&gt;
    + SAML&lt;br /&gt;
  o Gateways between Kerberos, SAML and other federation technologies&lt;br /&gt;
  o Kerberos through firewalls&lt;br /&gt;
  o Authentication within the enterprise&lt;br /&gt;
  o Managing identity&lt;br /&gt;
  o Broader authentication&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* web services&lt;br /&gt;
  o Examine and analyze&lt;br /&gt;
    + Protocols&lt;br /&gt;
    + How Kerberos is implemented today?&lt;br /&gt;
    + Implementation quality&lt;br /&gt;
    &lt;br /&gt;
  o Gap analysis&lt;br /&gt;
    + Can kerberos be used to secure all parts of a web services  &lt;br /&gt;
    infrastructure&lt;br /&gt;
      # Should only need one security system. Deploying them is hard and  &lt;br /&gt;
      costly.&lt;br /&gt;
      &lt;br /&gt;
    + Will extensions to kerberos break kerberos integration into web  &lt;br /&gt;
    services&lt;br /&gt;
      # Has had issues with using raw cert instead of AP-REQ&lt;br /&gt;
     &lt;br /&gt;
    + Are implementations and standards sufficiently avilable to meet  &lt;br /&gt;
    customer needs&lt;br /&gt;
    &lt;br /&gt;
    + Sufficient documentation&lt;br /&gt;
    &lt;br /&gt;
  o What we can do?&lt;br /&gt;
    + improve standards and docs&lt;br /&gt;
    + add necessary support for kerb implementation&lt;br /&gt;
    + Identify gaps, but not write web services ourselves&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Gateways to federation&lt;br /&gt;
  o Used alongside SAML/OpenID etc&lt;br /&gt;
  &lt;br /&gt;
  o Several challenges:&lt;br /&gt;
    + Authority to convert from one tech to another&lt;br /&gt;
    &lt;br /&gt;
    + Translating information such as entitlements from one format to  &lt;br /&gt;
    another&lt;br /&gt;
    &lt;br /&gt;
    + Determining trust to assign to an authentication that has crossed  &lt;br /&gt;
    mech boundaries&lt;br /&gt;
      # If you have a chain like KRB -&amp;gt; SAML -&amp;gt; OpenID -&amp;gt; KRB should I  &lt;br /&gt;
      trust it?&lt;br /&gt;
      &lt;br /&gt;
    + Policies are an important property of Federation&lt;br /&gt;
      # What policies should we look at? Where do we go?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Firewalls&lt;br /&gt;
  o Several companies developed solutions to deliver Kerberos over the  &lt;br /&gt;
  same port as web traffic&lt;br /&gt;
    + Firewalls near client and server&lt;br /&gt;
    + Kerberos needs to follow same path as application&lt;br /&gt;
    &lt;br /&gt;
  o tools.ietf.org/id/dtraft-zhu-ws-kerb-03 may be part of the answer&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Authentication in Enterprise&lt;br /&gt;
  o Both Kerb and certs today&lt;br /&gt;
  &lt;br /&gt;
    + Required for security today&lt;br /&gt;
    &lt;br /&gt;
    + If either has a problem, you're in trouble&lt;br /&gt;
    &lt;br /&gt;
    + Kerb for privacy instead of certs?&lt;br /&gt;
      # easier to make arbitrary (self-singed) certs&lt;br /&gt;
      # Would have to re-implement a lot of the stack&lt;br /&gt;
      # Strongest argument is TLS problems that might not exist in KRB&lt;br /&gt;
      # Provided only have to do one deployment, most problems go away&lt;br /&gt;
      &lt;br /&gt;
  o Could improve user experience and config&lt;br /&gt;
  &lt;br /&gt;
    + web browsers all support KRB but tend to turn it off by default.&lt;br /&gt;
      # Why?&lt;br /&gt;
      # Work on user experience.&lt;br /&gt;
      &lt;br /&gt;
    + Make it easier to use Kerberos and other mech on the server side&lt;br /&gt;
    &lt;br /&gt;
    + Work on client config issues&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Managing identity&lt;br /&gt;
  o Kerberos identity management (which id to use)&lt;br /&gt;
  &lt;br /&gt;
  o Other ID frameworks have a variety of privacy mechanisms; can we  &lt;br /&gt;
  take these mechanisms or something similar and use them in Kerberos&lt;br /&gt;
  &lt;br /&gt;
  o How do you make this usable?&lt;br /&gt;
  &lt;br /&gt;
  o Need to understand user use cases for privacy and how that fits  &lt;br /&gt;
  into KRB&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Broader authentication&lt;br /&gt;
  o finish requirements work for web authentication&lt;br /&gt;
  &lt;br /&gt;
  o participate in discussion of web authentication in standards  &lt;br /&gt;
  organizations&lt;br /&gt;
  &lt;br /&gt;
  o Understand tech challenges, but not use cases.&lt;br /&gt;
    + Where will this benefit people?&lt;br /&gt;
    &lt;br /&gt;
    + Working with IETF and financial services industry.&lt;br /&gt;
    &lt;br /&gt;
      # workshop to bring together major web sites with security community  &lt;br /&gt;
      and find out where they would use other authentication technologies  &lt;br /&gt;
      (not just kerberos)&lt;br /&gt;
      &lt;br /&gt;
      # KRB community should be in place to...(?)&lt;br /&gt;
      &lt;br /&gt;
    + only current web services for kerberos is WS- where kerberos is a  &lt;br /&gt;
    profile&lt;br /&gt;
    &lt;br /&gt;
      # business to business is difficult&lt;br /&gt;
&lt;br /&gt;
        * no way to send claims&lt;br /&gt;
&lt;br /&gt;
        * No way of sending policy&lt;br /&gt;
&lt;br /&gt;
        * Kerberos has everything you need in protocol, but no standardized  &lt;br /&gt;
        implementation&lt;br /&gt;
&lt;br /&gt;
        * No facility to acquire and then act on policy, communicates all  &lt;br /&gt;
        attributes to services&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Strong connection to ACL based authorization today&lt;br /&gt;
&lt;br /&gt;
  o Would like to see a capability based model&lt;br /&gt;
  &lt;br /&gt;
  o in ACL model, only thing you have is the principal name, so fewer  &lt;br /&gt;
  interesting things to do&lt;br /&gt;
  &lt;br /&gt;
  o Don't try to be OpenID as it's messy and complicated?&lt;br /&gt;
  &lt;br /&gt;
    + If we don't make sure we can interact with technologies in that  &lt;br /&gt;
    space, then people will find they can't use it&lt;br /&gt;
    &lt;br /&gt;
    + Our goal is not to be competitive but complementary (at least in  &lt;br /&gt;
    marketing)&lt;br /&gt;
      # We probably need to solve most of the problems they're solving anyway.&lt;br /&gt;
      &lt;br /&gt;
      # OpenID is wonderful for web browsers but bad for most other things&lt;br /&gt;
&lt;br /&gt;
        * For going after the blogging identity market, would need to  &lt;br /&gt;
        understand where we would provide benefit&lt;br /&gt;
&lt;br /&gt;
        * For business, need to have some of the properties of OpenID such as  &lt;br /&gt;
        lower infrastructure costs&lt;br /&gt;
&lt;br /&gt;
  o Prefer to keep Kerberos as the foundation and let the vendors deal  &lt;br /&gt;
  with the higher level stuff?&lt;br /&gt;
  &lt;br /&gt;
    + This is a fundamental disagreement with basis of the presentation&lt;br /&gt;
&lt;br /&gt;
    + One of the assumptions is that consortium should be doing the  &lt;br /&gt;
    &amp;quot;dreaming&amp;quot;&lt;br /&gt;
  &lt;br /&gt;
  o Basic message: understand tech, but need to know what use case  &lt;br /&gt;
  we're trying to solve and why we have a better solution than others&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>=JeffH</name></author>	</entry>

	</feed>