|Mary McRae||Mar 19, 2010 10:18 am|
|Subject:||[id-cloud] Call for Participation: OASIS Identity in the Cloud Technical Committee|
|From:||Mary McRae (mary...@oasis-open.org)|
|Date:||Mar 19, 2010 10:18:40 am|
To: OASIS members & interested parties:
A new OASIS technical committee is being formed. The OASIS Identity in the
Cloud Technical Committee has been proposed by the members of OASIS listed
below. The TC name, statement of purpose, scope, list of deliverables, audience,
and language specified in the proposal will constitute the TC's official
charter. Submissions of technology for consideration by the TC, and the
beginning of technical discussions, may occur no sooner than the TC's first
The eligibility requirements for becoming a participant in the TC at the
first meeting are:
(a) you must be an employee of an OASIS member organization or an individual
member of OASIS, and (b) you must join the Technical Committee, which members may do by using the
"Join this TC" button on the TC's home page at [a].
To be considered a voting member at the first meeting, you must:
(a) join the Technical Committee at least 7 days prior to the first meeting
(on or before 16 April 2010); and (b) you must attend the first meeting of the TC, at the time and date fixed
below (23 April 2010).
Of course, participants also may join the TC at a later time. OASIS and the TC
welcomes all interested parties.
Non-OASIS members who wish to participate may contact us about joining OASIS
[b]. In addition, the public may access the information resources maintained for
each TC: a mail list archive, document repository and public comments facility,
which will be linked from the TC's public home page at [c].
Please feel free to forward this announcement to any other appropriate lists.
OASIS is an open standards organization; we encourage your participation.
Mary P McRae Director, Standards Development Technical Committee Administrator OASIS: Advancing open standards for the information society email: mary...@oasis-open.org web: www.oasis-open.org twitter: @fiberartisan #oasisopen phone: 1.603.232.9090
CALL FOR PARTICIPATION OASIS IDENTITY IN THE CLOUD TECHNICAL COMMITTEE
1a. Name: OASIS Identity In the Cloud Technical Committee
1b. Statement of Purpose:
Cloud Computing is turning into an important IT service delivery paradigm. Many
enterprises are experimenting with cloud computing, using clouds in their own
data centers or hosted by third parties, and increasingly they deploy business
applications on such private and public clouds. Cloud Computing raises many
challenges that have serious security implications. Identity Management in the
cloud is such a challenge.
Many enterprises avail themselves of a combination of private and public Cloud
Computing infrastructures to handle their workloads. In a phenomenon known as
"Cloud Bursting", the peak loads are offloaded to public Cloud Computing
infrastructures that offer billing based on usage. This is a use case of a
Hybrid Cloud infrastructure. Additionally, governments around the world are
evaluating the use of Cloud Computing for government applications. For instance,
the US Government has started apps.gov to foster the adoption of Cloud
Computing. Other governments have started or announced similar efforts.
The purpose of the OASIS Identity in the Cloud TC is to collect and harmonize
definitions, terminologies and vocabulary of Cloud Computing, and develop
profiles of open standards for identity deployment, provisioning and management.
Where possible, the TC will seek to re-use existing work. The TC will collect
use cases to help identify gaps in existing Identity Management standards. The
use cases will be used to identify gaps in current standards and investigate the
need for profiles for achieving interoperability within current standards, with
a preference for widely interoperable and modular methods.
Additionally, the use cases may be used to perform risk and threat analyses.
Suggestions to mitigate the identified risks and the threats and vulnerabilities
will be provided.
The TC will focus on collaborating with relevant standards organizations such as
the Cloud Security Alliance and the ITU-T, in the area of cloud security and
Identity Management. Liaisons will be identified with other standards bodies,
and strong content-sharing arrangements sought where possible, subject to
applicable OASIS policies.
The purpose of the TC is to harmonize definitions/terminologies/vocabulary of
Identity in the context of Cloud Computing; to identify and define use cases and
profiles; and to identify gaps in existing Identity Management standards as they
apply in the cloud.
1. The TC will identify and may collect and publish new and/or existing
definitions, terminologies and vocabulary of Identity for Cloud Computing as the
2. The TC will define use cases for identity deployment, provisioning and
management in a Cloud Computing context. These may be existing use cases or new
use cases as the TC determines.
3. The TC will define interoperability profile(s) of existing protocols and
formats for usage of Identity in the Cloud, based on the identified use cases.
Profiles are subsets of specifications and combinations of such subsets.
4. The TC will identify gaps in existing Identity Management interoperability
protocols and formats standards at OASIS and other standards bodies and utilize
the OASIS liaison process for communicating the gaps.
5. In all of its work, the TC should, to the extent feasible, prefer widely
implementable, widely interoperable, modular standards, extensions, profiles and
methods that permit use by a variety of participants.
6. The TC will build on and use existing standards and specifications when
possible. When there is a need to extend existing OASIS Standards, then the TC
will not undertake that exercise but will work with the Technical Committee
representing the standard to provide the extension as part of that Technical
Committee. As an example, if the TC requires extensions in standards such as
SAML or WS-Trust, then this TC will identify the remaining work to be undertaken
by the TCs responsible for those standards, or their successors.
7. The TC will build profiles for Identity in Cloud Computing.
Out of Scope:
1. Access Control methods, Levels of Assurance (LOA) for security, and
definitions and structures for expressing Personally Identifiable Information
(PII). The TC may reference or suggest re-use or extension of such methods in
the context of Cloud Computing, but will not develop them.
2. APIs or Implementations
3. Creation of new protocols or formats.
1d. List of Deliverables:
1. A document calling out in detail the specific use cases of identity
deployment, provisioning and management in a Cloud Computing context that the
TC plans to address in their work product. This document will be completed and
approved by the TC by July 2010.
2. A set of profiles and gaps, as described in paragraphs #3 and #4 under
'Scope', to be approved as a Committee Specification by December 2010, and the
remainder if any to be approved by Committee Specifications by June 2011. The TC
may elect to create one or more of such deliverables in whatever combination it
3. Optionally, such other deliverables within the scope listed in paragraphs 1-6
(including collections of definitions, terminology and vocabularies, and
risk/threat assessments), as the TC may elect, until the later of June 2011 or
such later date as the TC may elect to conclude.
1e. IPR Mode under which the TC will operate: Royalty Free on Limited Terms
1f. Anticipated Audiences:
Enterprises interested in providing or using identity management capabilities in
a Cloud Computing infrastructure.
1g. Language: English
(2) Non-normative information regarding the start-up of the TC, which includes:
(2)(a) Identification of similar or applicable work that is being done in other
OASIS TCs or by other organizations, why there is a need for another effort in
this area and how this proposed TC will be different, and what level of liaison
will be pursued with these other organizations.
The proposed “Identity In The Cloud TC” will be incorporating several
definitions, terminologies, vocabulary and standards from OASIS standards bodies
as well as standards work done by non-OASIS organizations. The TC will use
standards from several OASIS TCs and standards from non-OASIS organizations, as
it sees fit. Liaisons may be established, and the TC may agree to concurrent
work items with other TCs and organizations, within the scope defined here.
Among other things, the TC may establish liaisons with ISO JTC1 SC 38, ITU-T SG
17, and the Cloud Security Alliance and the DMTF, and such other standards
organizations as it may choose. The TC also may reference identity management
and federation work from other standards organizations, such as IETF, the
Kantara Initiative, ENISA, ETSI, CAB Forum and OIX.
(2)(b) The date, time, and location of the first meeting, whether it will be
held in person or by telephone, and who will sponsor this first meeting. The
first meeting of a TC shall occur no less than 30 days after the announcement of
its formation in the case of a meeting held exclusively by telephone or other
electronic means, and no less than 45 days after the announcement of its
formation in the case of a meeting held face-to-face (whether or not a telephone
bridge is also available).
The proposed “Identity In The Cloud TC” will hold the first official meeting on
April 23rd, 2010 at 1pm ET by telephone and will use a free conference call
(2)(c) The projected on-going meeting schedule for the year following the
formation of the TC, or until the projected date of the final deliverable,
whichever comes first, and who will be expected to sponsor these meetings.
The TC will meet biweekly or as otherwise agreed upon by the members of the
(2)(d) The names, electronic mail addresses, and membership affiliations of at
least Minimum Membership who support this proposal and are committed to the
Charter and projected meeting schedule.
Jeff Broberg, Jeff...@ca.com (CA) Timothy Brown, timo...@ca.com (CA) Heather Hinton, hhin...@us.ibm.com (IBM) Matt Rutkowski, mrut...@us.ibm.com (IBM) Michael Waidner, wm...@us.ibm.com (IBM) Abbie Barbir, abar...@live.ca (Individual) John Bradley, jbra...@mac.com (Individual) June Leung, june...@gmail.com (Individual) Michael McIntosh, mike...@gmail.com (Individual) Anthony Nadalin, tony...@microsoft.com (Microsoft) Alan Clark; Novell, Inc. acl...@novell.com (Novell) Dale Olds, dol...@novell.com (Novell) Brian Campbell, bcam...@pingidentity.com (Ping Identity) Tomas Gustavsson, tom...@primekey.se (PrimeKey) Khaled Hussein, khal...@rackspace.com (Rackspace) Bret Piatt, bret...@rackspace.com (Rackspace) Anil Saldhana, Anil...@redhat.com (Red Hat) Mark Little, mark...@jboss.com (Red Hat) Bill Becker, Bill...@safenet-inc.com (SafeNet) Russ Dietz, Russ...@safenet-inc.com (SafeNet) Kent Spaulding, kent...@skyworthttg.com (Skyworth TTG Holdings) Tony Rutkowski, to...@yaanatech.com (Yaana Technologies)
(2)(e) Statements of Support
The name, electronic mail address, membership affiliation, and statement of
support for the proposed Charter from the Primary Representative
Paul Lipton, Paul...@ca.com, CA CA approves our participation as co-proposers for this TC.
Dave Ings, in...@ca.ibm.com, IBM
I'm happy to confirm that final approvals have now been received and so as IBM's
primary rep to OASIS I'm happy to approve IBM's participation in this new TC.
Michael Champion, Mich...@microsoft.com, Microsoft
I understand that I need to officially inform you of Microsoft’s intention to
participate in the OASIS Identity in the Cloud TC. As Microsoft’s voting member
in OASIS, please consider this message our confirmation.
Alan Clark; acl...@novell.com Novell, Inc.
As the Primary Representative for Novell, I approve Novell's participation in
this TC and Novell would like to be added as a proposer.
Brian Campbell, bcam...@pingidentity.com, Ping Identity
I confirm and support Ping Identity's participation in the Identity in the Cloud
Tomas Gustavsson, tom...@primekey.se, PrimeKey
As PrimeKey's primary contact in OASIS I hereby authorize PrimeKey's
participation in the IDCloud TC.
Bret Piatt, bret...@rackspace.com, Rackspace I approve Rackspace's participation in the Identity in the Cloud TC.
Mark Little, mark...@jboss.com Red Hat
I approve of Red Hat's participation in this group and that it is very important
for Cloud in general and Red Hat's activities in that area.
Bill Becker, Bill...@safenet-inc.com, SafeNet
SafeNet is committed to supporting and participating in the Identity in the
Cloud TC. The activities called out in the TC scope and purpose will form
important groundwork for the future of cloud computing.
Richard Sand, Rich...@skyworthttg.com, Skyworth TTG Holdings
Skyworth TTG Holdings approves our participation as co-proposers of the Identity
in the Cloud TC. We look forward to working with the committee!
Tony Rutkowski, to...@yaanatech.com, Yaana Technologies I support the Identity in the Cloud TC.
(2)(f) The name of the Convener who must be an Eligible Person. Abbie Barbir.
(2)(g) The name of the Member Section with which the TC intends to affiliate, if
any. OASIS IDtrust Member Section.
(2)(h) Optionally, a list of contributions of existing technical work that the
proposers anticipate will be made to this TC. None.
(2)(i) Optionally, a draft Frequently Asked Questions (FAQ) document regarding
the planned scope of the TC, for posting on the TC's website. To be provided at a later date.
(2)(j) Optionally, a proposed working title and acronym for the specification(s)
to be developed by the TC. To be provided at a later date.
--------------------------------------------------------------------- To unsubscribe from this mail list, you must leave the OASIS TC that generates this mail. Follow this link to all your TCs in OASIS at: https://www.oasis-open.org/apps/org/workgroup/portal/my_workgroups.php