« Previous -
Version 5/10
(diff) -
Next » -
Current version
David Groep, 06/25/2012 07:44 AM
Mission¶
The CAOPS Working Group, part of the Standards Security Area, is concerned with the organization of operational aspects of 'cross-grid' authentication. As such, it maintains strong links with the International Grid Trust Federation (IGTF, see http://www.igtf.net/), concerned with the actual implementation of guidelines and accreditation of authentication providers.
Closely related activities occur in the area of conveying authentication decisions, and the associated standards in the WS and PKI domains.
Documents¶
Published GFDs¶
- Policy Management Authority Model Charter (http://www.ogf.org/documents/GFD.62.pdf) (editors: R. Cowles, T. Genovese, P. Gietz, M. Helm)
- Grid Certificate Profile (http://www.ogf.org/documents/GFD.125.pdf) (editors: D. Groep, M. Helm, J. Jensen, M. Sova, S. Rea, R. Karlsen-Masur, U. Epting, M. Jones) - currently under review for an updated (recommendations-track) document
- Audit Guidelines (http://www.ogf.org/documents/GFD.169.pdf) (editor: Yoshio Tanaka, Matt Viljoen, Scott Rea)
- Relying Party Defined Namespace Policies (http://www.ogf.org/documents/GFD.189.pdf) (editors: David Groep, Olle Mulmo, Von Welch)
Documents currently under consideration by the CAOPS-WG¶
- Authentication Service Profile (http://redmine.ogf.org/dmsf_files/29) (editors: Christos Kanellopoulos, David Groep)
- Definition of what and Authentication Profile is
- Requirements for writing Authentication Profiles
- ''this acts as the document template for the Authentication Profiles used in the IGTF''
- A gap analysis of current LoA definitions versus LoA requirements in e-Science/Grid context (http://redmine.ogf.org/dmsf_files/46) ''(editor: Mike Jones, et.al.)''
- give an overview of current LoA definitions and the related efforts
- identify gaps between these definitions and the potential use of LoA in the e-Science/Grid context.
Stalled documents¶
- OCSP requirements for Grids (Informational Document, editors: Olle Mulmo, Mike Helm, Jesus Luna, Oscar Manso, Milan Sova)
- requirements on relying parties and responders,
- service architecture options,
- site caches, clearing house, high-level responders
- A risk analysis in relation to LoA and use case gathering in an e-Science context (editor: Mike Helm)
- Present a risk analysis from the prospective of relying parties (or service providers)