Alert.png The wiki is deprecated and due to be decommissioned by the end of September 2022.
The content is being migrated to other supports, new updates will be ignored and lost.
If needed you can get in touch with EGI SDIS team using operations @

Difference between revisions of "EGI-Engage:TASK JRA1.1 Proposal for Levels of Assurance"

From EGIWiki
Jump to navigation Jump to search
Line 20: Line 20:

#1 Persistent non-re assignable identifier
# Persistent non-re assignable identifier

== LoA: 2 ==
== LoA: 2 ==

Revision as of 12:35, 4 October 2016

EGI-Engage project: Main page WP1(NA1) WP3(JRA1) WP5(SA1) PMB Deliverables and Milestones Quality Plan Risk Plan Data Plan
Roles and
WP2(NA2) WP4(JRA2) WP6(SA2) AMB Software and services Metrics Project Office Procedures


This wiki pages is a work in progress and it contains a draft proposal for the categorization of the levels of assurance in the scope of the EGI CheckIn service. The CheckIn service aggregates authentication and authorization information from different sources, which have different levels of assurance and may release only a subset of the required attributes. The combined information from the aggregated sources of authentication information results in an overall LoA that is embedded in the assertion sent to the services provider in the EGI Federation.

Level of Assurance

This section contains the proposed categories of level of assurance as interpreted and published by the EGI AAI Proxy (CheckIn service).

LoA: 0

This category groups the credentials with basically no LoA associated. Examples are social-identity credentials with no vetting and no uniqueness of the ID guaranteed.

This LoA does not allow to access most of the EGI services, but could be used to access read-only open datasets and track in a qualitative way the number of accesses to a dataset. No sensitive activities can be accessed with this basic credential.

LoA: 1

This category groups the credentials that are usable in a federated environment, but may require additional attributes to be used in all applications.The credentials with LoA:1 or higher can access the online CA "RC Auth" to retreive X.509 proxy.


  1. Persistent non-re assignable identifier

LoA: 2

This category groups the credentials that have a level of assurance that is considered aligned with all the EGI policies and allows to access all EGI services. The requirements are the following:

  1. The accounts in the Home Organisations must each belong to a known individual person
    • Accounts must not be shared and the Home Organisation must be able to trace each account back to its holder
  2. Persistent user identifiers (i.e., no reassignment of user identifiers)
  3. Documented identity vetting procedures
    • The Home Organisations must have a documented identity vetting process for its user accounts. The documentation must be available in English and follow a widely established structure.
  4. Password authentication
    • Or higher security authentication mechanisms
  5. Departing user’s eduPersonAffiliation must change promptly

Self-assessment of the requirements is allowed, but it must be documented.

LoA: 3

This category groups credentials with an higher LoA for both the authentication and the attributes distributed in the assertion. At the moment EGI does not have use cases for an higher LoA than #2 but some applications have stricter requirements and therefore a placeholder is created. Service providers in EGI shall not expect LoA higher than #3


REF1: AARC MNA3.1:Recommendations on Minimal Assurance Level Relevant for Low-risk Research Use Cases

History of edits

First version from Peter Solagna 30-09-2016