Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SL3 - and optional processing of shared state #56

Open
gffletch opened this issue Mar 4, 2025 · 1 comment
Open

SL3 - and optional processing of shared state #56

gffletch opened this issue Mar 4, 2025 · 1 comment
Labels

Comments

@gffletch
Copy link
Contributor

gffletch commented Mar 4, 2025

Given that SL2 allows for the concept of step-up, I think the IDP MUST be able to reset the session to the "base" authentication level within the application. Such that even if the session within the application is currently "stepped-up", that session state will be changes ensuring that the next "high risk" transaction will be forced to step-up again.

The Identity Service communicates changes in the account and device posture to the application, enabling the application to take actions it determines are necessary based on its own policies about these changes. Neither application nor identity services are obliged to act upon any state changes, the policies for responding to state changes are not in scope for SL3.

Maybe the key here is that we need more than a session-termination event that MUST be acted upon, we need a session-downgrade event as well.

@mcguinness
Copy link

mcguinness commented Mar 6, 2025

Can you expand on your use case, its not clear why this isn't just an app's responsibility if the app-specific transaction doesn't meet assurance requirements. Assurance decreases over time so SL2 just enables the app to request an assurance level from the IdP when needed and gives the IdP a chance to enforce its security controls when issuing/renewing a token.

@aaronpk aaronpk added the sl3 label Mar 7, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

3 participants