Hi Mauro, At User-Managed Access (UMA) WG, we explored some use-cases about attributes aggregation and third party attribute authority to provide a claim-based authorization system, that we call it Trusted Claims. Now, UMA protocol leverages Openid Connect specification for this specific interactions. Last December, Smart team at Newcastle Univ showed a basic UMA-Openid connect integration (demo) for this purpose. Here are some pointers: http://kantarainitiative.org/confluence/display/uma/loan_scenario http://identitycube.blogspot.com/2010/12/oauth-uma-and-enterprise.html http://identitycube.blogspot.com/2011/07/uma-openid-connect.html Domenico On Jan 3, 2012, at 7:43 PM, Mauro L <s172556@studenti.polito.it> wrote:
Hello everyone,
I am starting a thesis work on attributes management and aggregation in a federated identity environment and I am trying to figure out how to address attributes resolution in a scenario where there are multiple Attribute Providers. The main issue is: how does a relying party know which AP is responsible for a given attribute? As I am doing a research, I would like to know if in Kantara this problem has been faced and, if so, how you have solved it.
Thank you for your time and consideration.
Best Regards,
Mauro
-- Mauro L Polytechnic University of Turin _______________________________________________ Community mailing list Community@kantarainitiative.org http://kantarainitiative.org/mailman/listinfo/community