-
Notifications
You must be signed in to change notification settings - Fork 140
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Request to add eduGAIN as IdP #740
Comments
Thank you for the details! Can you share the discovery URL? Would there be any way to have an allow list of email domains that eduGAIN is allowed to issue certificates for? I assume they're all .edu, but is there any other type of list we could use? |
eduGAIN (edugain.org) is a big federation - about 6000-10000 orgs - in research and education globally. Each org runs their own IdP. If we the project decides to go ahead with this edugain would deploy a gateway OP for sigstore. To answer your second question; edugain covers much more than the US so its not just .edu but it would be possible to include info about this in each claim. |
Assuming the identity is an email, we can either add this as an Before adding any new IDPs, I'd like to make sure the new IDPs meet the requirements under #397. |
The requirements look reasonable at first glance. Some questions/thoughts inline:
I'm sure this is just a configuration issue for the OIDC2SAML gateway we would deploy.
This is of course tricky to absolutely guarantee given that we're talking about several thousands of organizations under multiple policies but I will say that during the 15+ years eduGAIN has been in operations we have had a single case of identity reuse which was dealt with within a couple of hours.
Configuration requirement for the OIDC2SAML gateway - should be a no-brainer.
Is this requirement about specific ways keys must (or must not) be stored or about having a policy at all?
Not a problem whatever those are.
Another configuration requirements. Should be straight-forward.
I'm curious about the use of email actually. In eduGAIN the long term identifier is an email-like scoped identifier (sorta like a kerberos principal name) which looks like but may to actually be an email address. Typically email gets re-used a lot over time because people get assigned email addresses based on real names. Avoiding real-name duplication/reuse in an organization is pretty hard (impossible). So why insist on email?
Really? How often? Once or every few hours/days/weeks/months? Typical enterprise email assignment kinda makes it unnecessary to challenge the address since its the same directory/ad/goolge/o365/whatever that drives the email system as feeds identities to the IdP.... The use of email as an identifier seems strange at the scale we're talking about but its not really problematic for eduGAIN as such... just curious about the thinking behind the use of email as a primary identifier. |
Thanks for going through these! We're planning to formalize these, as they're a little rough and unclear at the moment.
To confirm, the expectation is that identities cannot be reused, enforced by the backend? In this case, there was some bug?
To me, this is not a hard requirement on how keys are stored, just a policy and adequate protection. For example, using either a key management service like Vault or KMS, or having keys encrypted on disk and decrypted on start up using a managed key, would be ideal.
We will define this! Probably 99.9.
Email isn't a hard requirement, we do have support for other types of identifiers (for example, a generic [username identifier](https://github.com/sigstore/fulcio/blob/main/docs/oidc.md#username or a URI). For most of our current OIDC providers, they use email. Each IDP doesn't support email reuse. However, like you alluded to, you can reuse an email across IDPs, there's no guarantee that the same person is behind each, so we are working on requiring that clients check both the identity and issuer in a verification policy.
We were thinking just initially, on account set up. |
Hi all, is there any interest still in adding this? If so, feel free to submit a PR to update the configuration (this can be an |
I will get back to this next week. |
Something to clarify, is eduGain a federated identity provider in that it issues tokens for various upstream providers? Will emails differ for identity tokens, or do all tokens have the same address (such as [email protected])? Another question, would we expect that users are interacting with Sigstore clients or would signing occur through automation, such as service accounts, machine identities, etc? If the former, then no PR is needed, but the Sigstore-managed federated identity provider will need to be registered the identity provider to get a client secret. |
edugain is an identity federation, not an email provider. IdPs connected to edugain provide a uniform set of security promises to relying parties. Email address is one of the attributes that can be released from an OP (assuming the user and home organization consents). Email addresses belong to the domain that owns the IdP so its not @edugain.com for anyone. |
Thanks for clarifying. Let's add eduGAIN then, that should unblock a lot of educational organizations. |
Description
This is a request to add eduGAIN to the trusted IdP list. eduGAIN provides an interface to access over 70+ identity federations around the world. This will enable researchers and students from all those different institutes (over 4500 identity providers) to use sigstore.
I volunteer myself to work as a bridge with the eduGAIN team.
The text was updated successfully, but these errors were encountered: