Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Probably build on Linux VM.

Need to write security advisor for OpenSAML v2 release.

Next release will ship without JSR-223 scripting engines due to lack of activity in those projects, we will now rely on built-in Java 6 support (Rhino). 

...

Yes, Velocity support is needed in the LDAP DC. Revisit Velocity instantiation later.

Will provide a second template impl for template tests.

Ian

Release of xmlsectool is downstream of IdP 2.4.0.

Build VM.

Rod
  • Finished legacy support for Scripting (enough for the AACLI release anyway)
  • Started on configuration for Attribute resolvers:
    • Building 'test framework' as well
    • Making changes to the AttributeResolvers as implicated by the realities of parsing (e.g. <Dependency/>)
    • Realized that we will need to do work to build syntax,parsers and implementations of the Criteria.  But not for AACLI release.
    • No looking at the DataConnectors
  • Plan for next week: More of same, there is probably 2 calendar weeks work in doing the wiring.

AI : Look at JOST-191

Scott

 IdP 2.4.0 release next Wednesday, coordinating with Brent.

Looking for feedback and decision regarding Spring neutral Web Flow adaptor.

 Looking for feedback regarding recently checked-in storage service alternate coding style.

Some issues with v3 Attribute Resolver Action dependencies on relying party configurations, since Context hierarchy is not complete.

Continued work on v3 AACLI.

Tom

Spent time working on IdPv3 configuration, installation, jetty, etc.

...

CAS work consists of two parts : (1) get a ticket and (2) validate a ticket. Initial work done on the first part, what next ? (Authn)

Authentication will be handled by a yet-to-be-determined subflow.

Integration looking good, persistence manager API was fine satisfactory for ticket store.

How long lived are flows? Short (their output is long lived).

...

What is the cardinality between a session and a principal : ? One and only one canonical principal per session. When we see two prinicpals we are forced into doing something (kill the old session, fail the authn). This is a critical thing that V2 got wrong and there are a series of issues in there.

Should we talk about how we capture request state. Protocol neutral? Protocol dependant? Base hierarchy with Protocol specific concrete classes. Maybe Marvin start by defining the contexts he needs and see how that works. OK, but what does SAML need? SAML sample flows capture it, in an oblique way. Can we define base context classes with protocol neutral info (motivated by SAML/CAS)?

Understanding the context tree is the critical, and a lot of it ties back to OpenSAML (because of the profiles), not IdP. Equally Security.

Next step is to for Scott and Marvin to coordinate with Scott regarding work on authentication.

AI for Marvin: document Context objects needed for authentication.

AI for Scott : Authentication Actions, Contexts, and flows.

AI for Tom : document current state of Action API, inputs and outputs.

...

Tabled for further discussion.

Maven-plugin version updates

Wait until after 2.4.0 release to update maven-plugin versions in parent poms.