Application domain OGC User Management Interfaces for Earth Observation Services

OGC 07-118r9 18 Copyright © 2014 Open Geospatial Consortium 6 System context This section documents special requirements and describes the context of use.

6.1 Application domain

Web service requests are received by Service Providers. These Service Providers should be able to identify who issued the request and react accordingly. The following approach is proposed: 1 A Security Token Service STS provides a Request Security Token operation RST, which returns a SAML token, an artefact representing an authenticated user. Depending whether the STS is in charge of authentication or not, two main cases are defined: a. The STS is in charge of authentication: the RST contains user identifier, password and optionally his identity provider. This service may delegate the authentication and SAML token generation to another STS acting as an identity provider. b. The STS is not in charge of authentication, i.e. this is taken in charge by an external IdP Web-SSO, which is trusted by the STS: the RST just contains a user identifier no password; it shall be signed in order to check that the requester is trusted. This service may delegate the SAML token generation to another STS. 2 Each subsequent service request by the client Web service consumer should include the SAML token as described later in this document. 3 Each Service Provider accepts service requests only via an Authorisation Service or Policy Enforcement Point PEP. The PEP first checks the existence of SAML token and decrypts it. 4 The PEP verifies the SAML token signature and expiry time 5 The PEP decides based on the content of the message body, the contents of the message header including authentication token and the context i.e. applicable policies whether to accept or to refuse the service request or to reroute it. Although this is not imposed, the use of XACML [NR21] or GeoXACML [NR25] for definition of policy rules is recommended. 6 If the request is authorised, then the request is forwarded to and processed by the target SP. If any of the steps from 3 to 5 fails, then a fault response is returned to the client. OGC 07-118r9 19 Copyright © 2014 Open Geospatial Consortium The full authentication authorisation process is detailed in the following figure. This figure highlights the typical sequence of steps from authentication to request authorisation and processing the two authentication cases are here abstracted. Figure 1: Sequence of authenticationauthorisation activities The distinction between steps 1.a. and 1.b, which discriminate on the IdP responsibility, is depicted in the following diagram client A authenticates on STS, client B authenticates on external IdP. Figure 2: Two cases of authentication These two cases are refined and detailed in section 6.4.3. OGC 07-118r9 20 Copyright © 2014 Open Geospatial Consortium

6.2 Protocol bindings