Skip to main content

9. Security Considerations

9. Security Considerations

This architecture relies on the security of the underlying protocols (DTLS, SRTP, ICE) and the web security model (SOP, TLS for HTTPS). Key considerations include:

  • IdP Trust: Users must trust the IdP not to forge assertions.
  • CS Trust: While the CS cannot decrypt media, it can control metadata and signaling. A malicious CS could try to trick the user or perform DoS.
  • Privacy: Identity assertions reveal information. UAs should allow users to control when identity is shared.