Skip to main content

System for Cross-domain Identity Management: Protocol
draft-ietf-scim-api-19

Yes

(Barry Leiba)

No Objection

(Alia Atlas)
(Benoît Claise)
(Brian Haberman)
(Deborah Brungard)
(Jari Arkko)
(Martin Stiemerling)
(Spencer Dawkins)

Note: This ballot was opened for revision 16 and is now closed.

Barry Leiba Former IESG member
Yes
Yes (for -16) Unknown

                            
Kathleen Moriarty Former IESG member
(was Discuss) Yes
Yes (2015-05-11 for -18) Unknown
Thank you for your work on this draft as I do think the work is important.  Thank you also for working with me to resolve discusses on security and privacy concerns with the authentication and authorization protocols that may be used with SCIM.  The added text on http authentication methods and security problems with OAuth bearer tokens will be very helpful to implementers and customers evaluating/negotiating security services of their service providers for provisioning.
Alia Atlas Former IESG member
No Objection
No Objection (for -18) Unknown

                            
Alvaro Retana Former IESG member
No Objection
No Objection (2015-05-12 for -18) Unknown
Small nit in Section 1.2

s/Throughout this documents all figures MAY contain spaces/Throughout this document all figures may contain spaces
Ben Campbell Former IESG member
(was Discuss) No Objection
No Objection (2015-05-14 for -18) Unknown
Update: I've released my DISCUSS on this. All my DISCUSS items have been resolved save the last one that I am moving to a comment. My point was to make sure the concern was discussed--if the authors answer that the working group thought about this want to keep it as is, that's okay with me.

Former Discuss Point:

It's optional (MAY) to include the API version. If the version is missing, the service provider SHOULD perform the operation using the most recent supported version. This seems to allow the client and service provider to disagree on the version being used. Does this cause an interop problem if the later version is not backwards compatible? (Are all new versions expected to be backwards compatible with old versions?)

[ I've removed comments that I think have been addressed.]

[...]

-- 2.1, last paragraph:

Just SHOULD? Do you invision situations where it might be reasonable _not_ to take the threats into account?

Also, the reference to oath-assertions needs to be normative

-- 2.2, "... it MAY be acceptable"

[...]

-- 3.3, 3rd bullet:

How does a service provider know which attributes a client understands?

[...]


As worded, that sounds like a statement of fact.

-- 7.3:

That needs to be a normative reference. Also, why is this a SHOULD? Can you envision scenarios where it might be reasonable for implementors NOT to take the countermeasures into account?

-- 7.4:

Reference to oauth-assertions needs to be normative.

-- 7.6, 2nd bullet

[...]
Benoît Claise Former IESG member
No Objection
No Objection (for -18) Unknown

                            
Brian Haberman Former IESG member
No Objection
No Objection (for -18) Unknown

                            
Deborah Brungard Former IESG member
No Objection
No Objection (for -18) Unknown

                            
Jari Arkko Former IESG member
No Objection
No Objection (for -18) Unknown

                            
Joel Jaeggli Former IESG member
No Objection
No Objection (2015-05-09 for -17) Unknown
"   o  Limit the number of requests any particular client MAY make in a       period of time."

Great so we going to limit the extent to which an attacker can spam the  the thing. that sounds comforting.

"
These    recommendations include but are not limited to:  
o  Provide injection attack counter measures (e.g., by validating all       inputs and parameters),  
o  No cleartext storage of credentials,  
o  Store credentials using an encrypted protection mechanism, and
"

I don’t really think of that as being a recommendation so much as a requirement . if you’re storing clear text passwords somebody needs to take away all your toys.
Martin Stiemerling Former IESG member
No Objection
No Objection (for -16) Unknown

                            
Spencer Dawkins Former IESG member
No Objection
No Objection (for -18) Unknown

                            
Stephen Farrell Former IESG member
No Objection
No Objection (2015-05-13 for -18) Unknown
Feel free to ignore any of these that overlap with earlier
comments, I've not been following all discussion on this one.

- section 2 says that bearer tokens based on no authenticaton
may be used (as the exception to the "SHOULD NOT be used").
Why is that ok? Maybe s/SHOULD NOT/MUST NOT/ here would be
better and justified?

- 3.1: seems odd to define schema but then say it's entirely
fine to ignore all of that - or am I reading this wrong?

- p9, figures and tables should have captions and be numbered
and this looks like a table of HTTP methods (not
"operations") that has neither.

- general: I came across a bunch of places where some forward
reference would help (e.g. 3.3 assumes I get what readOnly
means; 3.4.2.1 does the same for a "json attribute"). An
editing pass to try improve that before the RFC editor would
be good I think.

- 3.4.2 says: "This SHALL NOT be equal to the number of
elements in the resources attribute of the list response if
pagination (Section 3.4.2.4) is requested. " What if I ask
for pagination with 10 per page and there are a total of 10
matching results? That SHALL NOT seems broken.

- 3.4.2.2: Is "pr()" true when a client didn't send a value
to the server at creation time but the server included the
default value in the response to the PUT? (And what happens
to pr() and eq() when the default value changes?)

- 3.4.2.2, p21: eq() is case insensitive?  I think you badly
need a fwd ref to sections 3.8 and 5.

- 7.4, para 2 looks truncated