22.01.2015 Views

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

368 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

3) Types of claims:<br />

Two key classes of claims have been identified concerning entities within<br />

the system:<br />

• Organizational claims, described as “Custodial Identity” in [8], are issued by<br />

the IdP of the entities, <strong>and</strong> represent their organizational role independent<br />

of the applications to be accessed. This includes common attributes such<br />

as nationality, clearance, email address, etc. A unique identifier should be also<br />

included, for which a common format has to be agreed. NATO unique identifiers<br />

will be generated by the NATO Enterprise Directory Service (NEDS),<br />

when deployed in the operational environment (mid 2013);<br />

• Application specific claims, described as “Contextual Identity” in [8], are<br />

issued by the relying party STSs <strong>and</strong> contain application-specific attributes<br />

to support authorization, <strong>and</strong> have little or no validity outside the scope<br />

of the application or service being consumed. These attributes are most likely<br />

to be retrieved from local attribute stores, such as directories or databases,<br />

<strong>and</strong> contain data about the roles of the actor in the application.<br />

In addition, Context claims describe the environment in which the entity is acting,<br />

<strong>and</strong> may be used as further parameters for evaluating authorization decisions.<br />

4) Modality of claims:<br />

When categorizing the requirement to include a claim in a token, modality<br />

values are proposed as follows:<br />

• M<strong>and</strong>atory – only the Unique Identifying Claim should be m<strong>and</strong>ated;<br />

• Recommended;<br />

• Optional;<br />

• Not Recommended;<br />

• Forbidden.<br />

5) Unique Identifying Claim:<br />

The Unique Identifying Claim should be used to identify the source of an entity<br />

as well uniquely identify the entity in all application-specific attribute stores.<br />

Therefore this unique identifier will be an organizational, rather than application<br />

claim. There is still some debate as to what the format of this attribute should be,<br />

though some requirements have been identified:<br />

• it will uniquely identify all entities (users, services, devices, etc.);<br />

• it will allow the identification of the source domain;<br />

• it will be semantically abstracted from the underlying data through the use<br />

of a NATO-specific URI. i.e. even though it may be the user’s email address,<br />

it will have a URI that identifies it as a unique identifier (ID) rather<br />

than email address;<br />

• it may be multi-valued, i.e. it may contain more than one attribute value.<br />

This will allow the use of other values (then e.g. an e-mail address) like

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!