On 11/08/2011 14:41, Mike Jones wrote:
Guys,
Are we any closer to forming this group?
There might be some Attribute assertion behaviour that needs to be considered in a parallel topic.
Hi Mike, Apologies for the delayed reply; I have been on leave for the past week. I've mailed Paul a few times and not got any reply... :-( However, that doesn't mean we shouldn't do something. Remember the motto: "We must do something. This is something. Therefore we must do this." Bearing in mind that "delegation" means different things to different people, perhaps we should start at the practical coal face end of things, i.e. stuff that is running "out there" today. Personally I would be interested in: 1. Commonalities between current delegation schemes 2. Interoperation I can imagine other topics: 3. LoA (eg credential management, crypto-security level) 4. Revocability (if that's a word) 5. Controllability - ie how do you grant or restrict what the delegated credential can do. And of course if there is enough weight behind a scheme, a standard. Any other thoughts? Cheers -j -- Scanned by iCritical.