Where it began

A large part of the new security specification being developed will be based on an earlier project called the Security Services Markup Language (S2ML).

S2ML was designed to provide a framework for sharing security objects on the Internet. It uses a set of two so-called XML schemas (name assertion and entitlement) and an XML-based request/response protocol for two services (authentication and authorization).

Name assertions and entitlements are two concepts central to S2ML: n S2ML name assertions are created as a result of a successful authentication. An identity assertion describes the type of authentication, the authenticator (e.g., a security engine) and the subject authenticated (i.e., a user or an entity). Entitlements are collections of data that carry information describing authentication, authorization and profile.

n Entitlements travel with the user (or entity) across domains throughout the transaction process. An entitlement is issued at a certain time, for a certain length of time, and addresses a specific audience. In S2ML's context, an entitlement is analogous to an authorization token.

Featured

  • IT Modernization
    Eisenhower Executive Office Building (Image: Wikimedia Commons)

    OMB's user guide to the MGT Act

    The Office of Management and Budget is working on a rules-of-the-road document to cover how agencies can seek and use funds under the MGT Act.

  • global network (Pushish Images/Shutterstock.com)

    As others see us -- a few surprises

    A recent dinner with civil servants from Asia delivered some interesting insights, Steve Kelman writes.

  • FCW Perspectives
    cloud (Singkham/Shutterstock.com)

    A smarter approach to cloud

    Advances in cloud technology are shifting the focus toward choosing the right tool for the job and crafting solutions that truly modernize systems.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.