[Openid-specs-ab] Spec Call Notes 5-Dec-19

Mike Jones Michael.Jones at microsoft.com
Thu Dec 5 18:58:10 UTC 2019

Spec Call Notes 5-Dec-19

Mike Jones
Tom Jones
Marcos Sanz
Filip Skokan
John Bradley
George Fletcher
Brian Campbell
Bjorn Hjelm

Identity Assurance Specification
              This was approved as an Implementer's Draft
              A new Identity Assurance Working Group has been approved
              The Connect Working Group will cease work on it
              Issues on the spec will be copied to the new working group when it forms
              Tony and Torsten proposing use of the spec for electronic driver's licenses at ISO
              There's Doodle poll for scheduling the first working group meeting

Logout Specifications and Certification
              OP logout tests are available at https://openid.net/certification/logout-op-testing/
              RP logout tests are being tested by the certification team and planned for release later this month
              (FAPI RP tests also launched this week)
              The logout testing is exposing ambiguities in the specs, which we will clean up before making them final

              The Second Implementer's Draft was approved
              There will be a Federation hackathon at the Internet2 Conference next week
              This is a great time to review the spec
              Tom Jones asked about defining sector-specific metadata
                           Federation metadata is extensible like Discovery metadata is
                           Mike asked Tom to send his definitions to the mailing list for feedback when they're ready

Open Issues
              #1133 Clarify that logout notifications to RPs are idempotent
                           Added a comment about Back-Channel Logout specifics
              #1134 Clarify that OPs must send a logout notification to the RP that requested RP-Initiated Logout
                           George wants us to suggest that the RP should clear its logged in state before sending the request
              #1125 *_hash algorithm for EdDSA ID Tokens?
                           We decided to use SHAKE256(x, 114) for Ed448
                           We could also say this in errata
              #1127 Are duplicate "kid"s in jwks permitted under OpenID Connect
                           We agreed that we should enforce "kid" uniqueness in the certification suite
              #1101 Clarify expected OP behaviour upon unsupported prompt parameter value
                           Mike espoused ignoring new values not understood, like for OAuth and JWTs
                           George said that the problem is that there's no way for the RP to know whether the value was acted upon

Next Call
              The next call is Thursday, Dec 5 at 7am Pacific Time
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs-ab/attachments/20191205/5dc7fd6f/attachment.html>

More information about the Openid-specs-ab mailing list