[Openid-specs-ab] Spec call notes 26-Mar-15

Nat Sakimura sakimura at gmail.com
Fri Mar 27 01:43:19 UTC 2015


FYI, after the call, Brian, John and me  discussed this a bit more, and came to the conclusion that returning auth_time=0 may also be a good. There are times that you really do not know what it was, and in that case, returning the epic would be a reasonable thing. In google's case, it can always return auth_time=0 when asked indicating that google is unwilling to disclose this data. 
 
So, the semantics of auth_time=0 is either the IdP does not know the last active authentication time or is not willing to disclose it for various policy reasons, including both security and privacy. 

=nat via iPhone

2015/03/26 9:54、Mike Jones <Michael.Jones at microsoft.com> のメッセージ:

> Spec call notes 26-Mar-15
>  
> John Bradley
> Brian Campbell
> Nat Sakimura
> Mike Jones
> Edmund Jay
> Justin Richer
> Roland Hedberg
>  
> Agenda
>                Open Issues
>                UserInfo access passing access token in the body
>                Google not wanting to support max_age and auth_time
>                JOSE/JWT/OAuth Assertions specs status
>  
> Open Issues
>                #123: redirect_URI tests still reporting wrong results.
>                               John will close as resolved
>                No other issues were immediately pertinent to certification
>                Mike has placed two issues not needed for v1 certification on hold
>  
> UserInfo access passing access token in the body
>                It's a MAY in 6750
>                This there to enable JavaScript clients and others which may not be able add an Authorization header
>                Let's make this a WARNING rather than an ERROR now
>                In v2, we should probably add this to the Dynamic profile as required
>                Roland will make this a warning and send a note to the list when it's done
>  
> Google not wanting to support max_age and auth_time
>                Possibly reply asking if they can return an auth_time that actually reflects when the user authorized/was in possession of the device
>                User presence signal that doesn't require a password
>                               Such as a native application on a mobile device
>                A screen unlock is a valid user presence indicator
>                But device authentication time is a different semantic, which could be added, but it's different
>                Reauthentication may make more sense in the context of a particular action by the user
>                               Real-time consent for an action, as a step-up action, rather than just re-login
>                               Then the user has context for the action
>                Mike will send a response asking for more discussion
>  
> JOSE/JWT/OAuth Assertions specs status
>                These have exited RFC Editor "EDIT" status
>                They are now in "RFC-EDITOR" status: Undergoing final internal review before AUTH48
>                This means the authors will soon be asked to verify that the edited specs are correct
>                This is called AUTH48 because authors are supposed to respond within 48 hours
> _______________________________________________
> Openid-specs-ab mailing list
> Openid-specs-ab at lists.openid.net
> http://lists.openid.net/mailman/listinfo/openid-specs-ab
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs-ab/attachments/20150326/0d37da4d/attachment.html>


More information about the Openid-specs-ab mailing list