-
Notifications
You must be signed in to change notification settings - Fork 2
Define our needs for authentication in Prototype, MVP (and consider beyond) #89
Comments
@willusds would it make sense to split this into 2 tickets-
1 seems urgent to me, like definitely needs to be done this coming sprint. 2 could take more time and has more room for research and planning. |
Doesn't really make that much of a difference—we might select a different short term strategy than long term, but the decision-making process needs to look at the options either way. I am still not sure what other people are doing in this space, but I think we probably have most of the data we need for this, and can get the rest pretty quickly. |
That sounds right to me. What do we need to do to get to a decision? |
Not quite off the top of my head: Business questions in general:
Business questions for the pilot:
Candidate questions for auth:
Wild cards, probably can be deferred:
|
Oh, and for the longer term, we should pay attention to whether using this tool constrains us in the future in ways that we will not like. 😕 |
Nick Robinson can help us get this. Let's assume there is only one role for the pilot, but likely we will have multiple roles in the future. |
@RickHawesUSDS @jlusds @drew-usds can you answer this?
Let's say no more than ~1000 unique users at ~100 organizations. If that's a problem let's talk about it.
No.
I think this is a problem for the data hub right? @RickHawesUSDS thoughts? |
Let's defer the wildcards if possible. Universities likely will want to use their own SSO auth systems longer term. If we can do that soon great, if not we can push it out, but that's not the first priority. |
Hi folks. Chiming in with a couple of thoughts. I think for the shorterm/longterm phases of the project, both should target HHS Okta for authentication. Given that PHI data requires LOA (or whatever it's called now) level 3, we need some way to ensure that associated accounts meet these requirements. At CMS, we synchronized with user databases between a number of different auth systems, so if we end up in a position where we need to work with another organization's SSO, we can make that happen. There will still need to be specific processes in place to ensure RIDP happens. There are a couple of ways to make this happen. For HHS Protect, we do paper access forms with PIV signing, which I believe meets those requirements. Kevin Duvall in OCIO would have more information there. Do you have an existing contact on the HHS Okta account? If not, I can probably help set something up. I've work with the Okta federal folks before, they're pretty solid. We can work with specific role authorizations as we get further along, it's a pretty simple matter of adding additional assertions to the Okta record. Likewise, we can do role synchronization between federated partners, if we want. I know we've done SAML passthrough before, which would easily make CDC SAMS available, if that's not already done. Not sure if this is helpful or not, happy to help facilitate more in-depth discussions going forward. |
@nickrobison-usds That would be excellent to get an OKTA trial account. Can you help facilitate that? Thanks for your help! |
Word on the street: SAMS accounts might be able to be linked through OKTA! |
Memorializing a recent discussion: under applicable laws/regs, HHS requires users who are requesting access to sensitive or non-public information (which PHI certainly is), to complete IAL2 verification, which may be remote (using Okta) or in-person (using SAMS). Since SAMS does not appear to support IAL2 remote verification, it's pretty much guaranteed to be a bottleneck if we use SAMS with IAL > 1. |
Considering that we are pretty definitely deploying to Azure for the pilot, we can strike Amazon Cognito off the list. This leaves the below candidates for the pilot. Definition of terms in case of confusion:
Building a role-management system, either hosted on the same database as our primary data store or otherwise, is something we will eventually probably want to do, but if we can avoid it, we should. That being the case, I think we should strike the first two options. And, as noted, nobody seems to much care about using a federated approach, at least for the first few users, so I think we can dismiss that one (and we already dismissed the AWS-native solution, because, well). |
Has the auth provider been decided? @nickrobison-usds @benwarfield-usds @RickHawesUSDS @timothybest-usds |
Yes, we're going with HHS Okta, starting with a trial account and moving towards a full provisioning soon. |
I think we're ready to close this! |
User story:
As a developer for the POC app, I need to know the type and scale of authentication services for different use cases for our app to fully function.
Describe the solution you'd like and the specific acceptance criteria to be completed
Narrow our needs for authentication services for the Prototype and MVP of the POC app, considering also the long term scale beyond the MVP. Define the security needs, user classes, authentication levels and other specific needs to help inform our decision on selecting an Auth solution.
Additional context
Collecting research and notes here: https://drive.google.com/drive/folders/1gFnRUE91LGCaIuWZ-sJe6S0lUAL9bDzf
Acceptance Criteria
A detailed explanation of the number of users, authentication processes needed for launching a prototype, mvp, and beyond we can compare against vendor offerings to make a decision.
The text was updated successfully, but these errors were encountered: