[Openid-specs-ab] Spec call notes 25-Aug-11
Nat Sakimura
sakimura at gmail.com
Mon Aug 29 20:35:35 UTC 2011
One correction.
On Fri, Aug 26, 2011 at 10:19 AM, Edmund Jay <ejay at mgi1.com> wrote:
> Spec call notes 25-Aug-11
>
> George Fletcher
> Nat Sakimura
> Andreas Åkre Solberg
> John Bradley
> Mov Matake
Nov Matake, not Mov. So, you need to do s/Mov/Nov/g.
> Johnny
> Mike Jones
> Johnny Bufu
>
>
> [Agenda]
> ID Token
> Profile Picture Size in UserInfo
> secret_type parameter in Token endpint
>
>
> [ID Token]
>
> 1) Using ID Token as Access Token
>
> After the last call, it was decided that the check session endpoint
> will accept an ID Token as an access token in the authorization header.
> It will also accept optional access token or code in POST parameters.
>
> The current specs call for sending "Bearer ID_Token" in authorization
> header.
> Mov runs into the problem of not being able to distinguish between an ID
> Token
> and a regular "bearer" access token in middleware (Ruby RACK).
>
> Mov would like to define a new token type for use as authorization header in
> the
> check session endpoint.
>
> George points out that using ID Token which is not an access token would
> lead to
> confusion.
>
> Defining new type would be time consuming at this point.
>
> Conclusion :
> Check Session endpoint is NOT an OAuth protected endpoint.
> ID Token, Access Token, Code will be sent as POST parameters.
>
> 2) Putting hash of access token/code in ID Token
>
> Breno would like to put the hash of the access token or code in the
> ID Token when both are requested at the same time to bind them to
> each other so as to prevent attacks.
>
> Breno was not available for discussion.
>
> Awaiting more input from Breno.
> Will discuss in next call if possible.
>
>
> [Profile Picture Size]
> Previously, Allen Tom brough out the issue of being able to request
> different profile picture sizes using query parameters in the request.
>
> The Userinfo endpoint does not support query parameter support.
>
> An alternative is to add "small", "medium", "large" profile pictures
> to the UserInfo endpoint schema.
>
> John offered the following options:
> a) new scope for requesting picture sizes
> b) RP makes explicit claim request
> c) Expand schema to include "small", "medium", and "large"
>
> Edmund asked Breno for opinion. Awaiting reply.
>
> Need more input from Providers before making changes.
> Specs will remain unchanged for now.
>
>
> [Implementation Status for September OpenID Interop]
>
> Following people are working on implementations:
> Mov
> Ito-san in Japan
> NRI (will not support distribute/aggregated claims)
>
> Andres is doing research/learning implementation in javascript with
> JWT/ID Token.
> His team will implement with Python.
>
> Johnny - a) Janrain will support sign-in with OpenID Connect provider in
> Engage product
> b) Enhance provider support to enable people' user database
> as providers.
> Awaiting for stable specs and OAuth 2.0 Java library.
>
>
> Attending InterOp:
> NRI will be sending 1 engineer
> Johnny Bufu
> Someone from Google
> Mov, remotely if possible
> NIH, possibly depending on Andrew Arnot
> Andres said Rolan(sp?) will attend, but most likely will not have
> implementation ready
>
>
> [Parameter secret_type in Token Endpoint]
> Andres said there is not enough information regarding the secret_type
> parameter
> in the Redirect Binding Spec.
>
> Edmund pointed out that Redirect Binding spec contains client_secret
> parameter in the
> Token endpoint, but the current Messages & Standard spec refers client
> authentication
> to the OAuth 2.0 specs.
>
> John points out that OAuth 2.0 does not address asymmetric client secrets
> and
> the secret_type parameter was intended to address such.
>
> John suggests having an extension and do an asymmetric key profile for
> OpenID Connect.
>
> Edmund, John, Mike, and Andres to discuss offline.
>
>
> _______________________________________________
> Openid-specs-ab mailing list
> Openid-specs-ab at lists.openid.net
> http://lists.openid.net/mailman/listinfo/openid-specs-ab
>
>
--
Nat Sakimura (=nat)
Chairman, OpenID Foundation
http://nat.sakimura.org/
@_nat_en
More information about the Openid-specs-ab
mailing list