The research and education sector has over the past decades developed a global identity federation ecosystem which has simplified access to content, services and resources for their community. The eduGAIN interfederation comprises over 80 national federations connecting more than 8,000 Identity and Service Providers. On a national level even more services and institutions are connected. The sector has been able to achive this by creating a highly interoperable ecosystem, where both a high level of technical, as well as policy and trust interoperability has been accomplished, through the joined implementation of various specifications. The joined journey of establishing this ecosystem has enabled the emergance of a global research and education trust and identity comunity with strong bonds and decades of experience in deploying and operating identity federation at scale.
REFEDs, the Research and Education FEDerations group, has been instrumental in providing an open meeting place for articulating the mutual needs of research and education identity federations worldwide. Over the years, REFEDS has addressed issues and topics based on the interests and requirements of its participants. This includes mostly policy, but also some technical and outreach topics in areas such as interfederation, privacy, assurance, relationships with partner communities, marketing, and support of emerging federations.
While REFEDs as such has no bias towards a specific technical implementation, the fact that the SAML 2.0 specification is currently the dominant protocol in identity federation in R&E has had some impact on various specifications created by REFEDs. This ranges for protocol specific sections, to assumption on how a specification would be implemented operationally. The rise of protocols like OpenID Connect, OpenID Federation and the emergence of decentralized, wallet based ecosystems requires a revisit of the specifications. Not only should it be investigated in what way the specifications may be implemented in these protocols, in addition we must assume a multi-protocol ecosystem will emerge and exist for several years to come. This means the specifications may also need to take into account how to go between protocols as it meay be required to translate between not just technical credentials, but also policy and trust frames.
This document provides a first assesment on how the current REFEDs specifications (Nov 2023) may be leveraged in an OpenID Federation (Draft 31) based federation and in a wallet ecosystem based on OpenID Federation and the OpenID4VC specifications. For the latter it should be noted that as this ecosystem and its standards are still being developed, the statments and assumptions on how REFEDs specification may be relevant should be considered speculative.
source: https://refeds.org/specifications (Nov 2023)
REFEDs identify 5 types of specifications:
Generally speaking, the information from the specifications is distributed in two ways:
When a specification defines specific metadata elements to be be present, if is often required to have a protocol specific section in the specification. Not only is the technical format different (XML vs JSON), but there is also a difference in the way certain capabilities are expressed, e.g. Entity Categories vs Trustmarks, see later). When the specification only deals with 'on the wire' information, which is transmitted as part of the transaction, like e.g. attribute assurance, it if often much easier to adopt the specification to use in OIDC and OpenID federation, as often it suffices to just use the equivelent OIDC claim to transport the same values that were defined in tha SAML based specification.
OpenID Federation shares many concepts with the existing SAML based federations as currently deployed in R&E. The basic entities (OP, RP and trusted third parties like TA or IA) and the interactions between these can all be represented in OpenID Federation in a similar fashion as these exist in a SAML R&E federation.
Table 1 provides an overview of the specifications that were evaluated, and identifies the areas in the specification that would need modification to adopt OIDC and OpenID federation. Because of the commonalities in the structure of the Personalized Access, the Anonymous Access and the Pseudonymous Access Entity Category, only the first one was extensivly evaluated, see Chapter 6. It was assumed similar modificatiosn will be required for the Anonymous Access and Pseudonymous Access specification.
specification name | type | Applies to entity | Asserted by | Level of Modification needed? | In scope for OpenIDFed | In scope for wallets | Attribute profile | SAML Specific Protocol requirements |
---|---|---|---|---|---|---|---|---|
Personalized Access v.2 | Entity Category | IdP/OP | Registrar |
| ||||
Personalized Access v.2 | Entity Category | SP/RP | Registrar | ^^^ | ||||
Anonymous Access v.2 | Entity Category | SP/RP | Registrar |
| ||||
Anonymous Access v.2 | Entity Category | IdP/OP | IdP/OP | ^^^ | ||||
Pseudonymous Access v.2 | Entity Category | SP/RP | Registrar |
| ||||
Pseudonymous Access v.2 | Entity Category | IdP/OP | IdP/OP | ^^^ | ||||
Research and Scholarship (R&S) v1.3 | Entity Category | SP/RP | Registrar |
| ||||
Research and Scholarship (R&S) v1.3 | Entity Category | IdP/OP | IdP/OP | ^^^ | ||||
Hide From Discovery v.1 | Entity Category | IdP/OP | IdP/OP |
| ||||
Assurance v.1 | Framework | IdP/OP | IdP/OP |
| ||||
MFA Profile v.1 | Profile |
| ||||||
SFA Profile v.1 | Profile |
| ||||||
Sirtfi v1 & v2 | Assurance Certification | SP/RP | Registrar | |||||
Sirtfi v1 & v2 | Assurance Certification | IdP/OP | IdP/OP | |||||
Security Contact | Metadata Extension | IdP/OP, SP/RP | IdP/OP, SP/RP |
|
Legenda for relevance column: Under investigation;
Not relevent;
Relevant; (T) Trustmark required
Indication of required changed: No changes required;
Minor updates to wording required;
Significant updates to wording required;
Significant updates to wording and/or implementation required