Hi Mauro,
At User-Managed Access (UMA) WG, we explored some use-cases about attributes aggregation and third party attribute authority to provide a claim-based authorization system, that we call it Trusted Claims. Now, UMA protocol leverages Openid Connect specification for this specific interactions.
Last December, Smart team at Newcastle Univ showed a basic UMA-Openid connect integration (demo) for this purpose.
Here are some pointers:
http://kantarainitiative.org/confluence/display/uma/loan_scenario
http://identitycube.blogspot.com/2010/12/oauth-uma-and-enterprise.html
http://identitycube.blogspot.com/2011/07/uma-openid-connect.html
Domenico
On Jan 3, 2012, at 7:43 PM, Mauro L
Hello everyone,
I am starting a thesis work on attributes management and aggregation in a federated identity environment and I am trying to figure out how to address attributes resolution in a scenario where there are multiple Attribute Providers. The main issue is: how does a relying party know which AP is responsible for a given attribute? As I am doing a research, I would like to know if in Kantara this problem has been faced and, if so, how you have solved it.
Thank you for your time and consideration.
Best Regards,
Mauro
-- Mauro L Polytechnic University of Turin _______________________________________________ Community mailing list Community@kantarainitiative.org http://kantarainitiative.org/mailman/listinfo/community