[Openid-specs-fapi] SET Specs are available

Ralph Bragg Ralph.Bragg at openbanking.org.uk
Sun Jul 23 06:55:28 UTC 2017

Thanks Torsten,

My initial thoughts:

  *   ?The functional payloads i.e the "What" seems to be the focus, unsurprisingly there's a lot of overlap with OB's specs (multiple bodies are defining the same standards across Europe).
  *   The "How" still has a huge way to go to be properly specified.
     *   No Detailed Security Profile... just use OAuth 2.0?
     *   No MA / Certificate Validation / Role Extraction Process Detailed for how parties are to use Certs.
     *   No validation / confirmation of how the QTSP's need to cut certs in order for them to inter-op.
     *   No thought given to trust framework issues when multiple parties are relying on different QTSPs how are QTSPs to become trusted by all participants.
     *   No detailed spec of How the "request Id" is sent to the AZ for authorization? Is it the intent that this is identified by different redirect urls? Which OAuth feature are they using to convey a variable consent id from the TPP to the OAuth 2.0 AZ?
     *   Consent management and obligations on all parties is missing entirely.
     *   No specification for registration and onboarding / mangaement of clients. There's a reference to the original OAuth 2.0 RFC but no reference even to OAuth 2 client registration spec.
     *   No liability model / accreditation / revocation processes for QTSP's and / or subsequently ASPSPs responsibilities to validate continued accreditation of TPP's.
     *   The signing mechanism is leveraging cavage's HTTP signing specification but no information on how the / where the Key's are too be retrieved, what the standards are for key retrieval etc etc. Cavage's spec explicitly leaves the specification of all the necessary bits to make an implementation work in a scheme up to the scheme. SET hasn't defined any of it.
     *   No normative or non normative examples given for how TPP's should interact with OAuth 2.0 AZ's
     *   Generally the spec for how RP's and OAuth 2.0 AZ's communicate is currently inadequate for this to operate as a common standard across the french banking industry but i'm sure it will be all ironed out soon.

Is there another document that's missing that describes how the trust framework / security profile is going to cover the above?

It will be interesting to see how successful this is for TPP's as a standard though it is good too see that there may be some functional synergies once each TPP has technically negotiated access to each ASPSP.

From: Openid-specs-fapi <openid-specs-fapi-bounces at lists.openid.net> on behalf of Torsten Lodderstedt via Openid-specs-fapi <openid-specs-fapi at lists.openid.net>
Sent: 22 July 2017 21:32
To: openid-specs-fapi at lists.openid.net
Subject: [Openid-specs-fapi] SET Specs are available

Hi all,

just in case you didn't notice: https://www.stet.eu/en/news/news1/stet-psd2-api-is-now-available.html

kind regards,

Please consider the environment before printing this email.

This email is from Open Banking Limited, Company Number 10440081.  Our registered and postal address is 2 Thomas More Square, London, E1W 1YN.  Any views or opinions are solely those of the author and do not necessarily represent those of Open Banking Limited.  

This email and any attachments are confidential and are intended for the above named only.  They may also be legally privileged or covered by other legal rights and rules.  Unauthorised dissemination or copying of this email and any attachments, and any use or disclosure of them, is strictly prohibited and may be illegal.  If you have received them in error, please delete them and all copies from your system and notify the sender immediately by return email.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs-fapi/attachments/20170723/88c2dd7b/attachment.html>

More information about the Openid-specs-fapi mailing list