Using quantified trust levels to describe authentication requirements in federated identity management

  • Authors:
  • Ivonne Thomas;Michael Menzel;Christoph Meinel

  • Affiliations:
  • Hasso-Plattner-Institute, University of Potsdam, Potsdam, Germany;Hasso-Plattner-Institute, University of Potsdam, Potsdam, Germany;Hasso-Plattner-Institute, University of Potsdam, Potsdam, Germany

  • Venue:
  • Proceedings of the 2008 ACM workshop on Secure web services
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

Service-oriented Architectures (SOA) facilitate the dynamic and seamless integration of services offered by different service providers which in addition can be located in different trust domains. Especially for business integration scenarios, Federated Identity Management emerged as a possibility to propagate identity information as security assertions across company borders in order to secure the interaction between different services. Although this approach guarantees scalability regarding the integration of identity-based services, it exposes a service provider to new security risks. These security risks result from the complex trust relationships within a federation. In a federation the authentication of a user is not necessarily performed within the service provider's domain, but can be performed in the user's local domain. Consequently, the service provider has to rely on authentication results received from a federation partner to enforce access control. This implies that the quality of the authentication process is out of control by the service provider and therefore becomes a factor which needs to be considered in the access control step. In order to guarantee a designated level of security, the quality of the authentication process should be part of the access control decision. To ease this process, we propose in this paper a method to rate authentication information by a level of trust which describes the strength of an authentication method. Additionally, in order to support the concept of a two-factor authentication, we also present a mathematical model to calculate the trust level when combining two authentication methods.