[Openid-specs-ab] Spec Call Notes 31-Jan-22

Mike Jones Michael.Jones at microsoft.com
Tue Feb 1 02:00:34 UTC 2022


Spec Call Notes 31-Jan-22

Mike Jones
Vittorio Bertocci
Tony Nadalin
Nat Sakimura
John Bradley
Brian Campbell
David Waite
Edmund Jay

Outstanding Implementer's Draft Approval Votes
     https://openid.net/foundation/members/polls/261 - prompt=create
     https://openid.net/foundation/members/polls/266 - SIOPv2 and OIDC4VP
              Please participate!

Updated SIOPv2 and OIDC4VP drafts were published addressing editorial issues
              See the note at the end of https://openid.net/2021/12/17/first-public-review-period-for-openid-connect-siopv2-and-oidc4vp-specifications-started/

These in-person and hybrid 2022 identity events are upcoming:
              IETF 113 in Vienna, March 19-25
                            https://www.ietf.org/how/meetings/113/
              OpenID Workshop and IIW in Mountain View, April 25-28
                            https://internetidentityworkshop.com/
              OAuth Security Workshop in Trondheim, Norway, May 4-6
                           https://oauth.secworkshop.events/
              European Identity and Cloud Conference (EIC) in Berlin, May 10-13
                       https://www.kuppingercole.com/events/eic2022
                           Submissions are open until February 28th
              FIDO Plenary in Munich, May 24-26
              RSA Conference in San Francisco, June 6-9
                           https://www.rsaconference.com/usa
              Identiverse in Denver, June 21-24
                           https://identiverse.com/

Open PRs
              https://bitbucket.org/openid/connect/pull-requests/
              PR #119: adds security consideration for confidentiality response (same-device)
                           Nat asked that a corresponding issue be filed
                           Nat agreed to review it
              Edmund has PRs #59, #60, #63, and #74
              PR #60: fixes #1311 - Require refresh tokens
                           Edmund updated this per working group feedback
                           After re-review, this is probably ready to merge
              PR #63: fixes #1284 - Require Sender Constrained Tokens
                           Edmund updated this per working group feedback
                           After re-review, this is probably ready to merge
              PR #59: fixes #1225 - clarifies discovery metadata for IA
                           This hasn't been updated recently
                           Edmund asked whether we want to have an array of arrays of claim sets
                           Mike asked whether having a flat array of the union of possible claims would be adequate
                           Nat suggested that a separate issue be filed
                                         Edmund agreed to do this
              PR #74: adds parameter for requesting credential type format - #1276
                           Kristina and Torsten had suggested reusing mechanisms being defined in other Connect specs

Open Issues
              https://bitbucket.org/openid/connect/issues?status=new&status=open
              #1415: re-using ID Token as a source of third party attested user-claims
                           Noone seemed to think that this is a good idea
                           As Nat said on the call, this violates the audience validation
                                         Unless perhaps if there were multiple audiences
                           Vittorio said that asking for an access token with the correct audience would be preferable
                                         He said that such an access token might be a lot like an ID Token but would have differences
                           The issue asks for no specification changes
                           Given there is no support for the idea, we proposed to close the issue on that basis in a week
              #1411: specify how ekyc-ida syntax can be used with Verifiable Credentials
                           The next step seems to be to create a concrete proposal
              #1402: Cross device flow w/ and w/o authorization_endpoint
                           People are asked to review
              #1401: Advanced cross device flow for SIOP
                           Torsten agreed to create a PR
              #1400: Issuer Handling in SIOP
                           Torsten proposes indicating that the token is self-issued by having "iss" be equal to "sub"
                                         This is similar to what is done in self-signed certificates
                           Vittorio asked whether we want to rule out scenarios for which the values would be different
                                         In the chat, he wrote "it sounds like forcing those two values to be the same would constrain the range of possible scenarios, hence it would be interesting if we could list some of the combinations that would no longer be possible and have one-liners explaining why they aren't interesting"
                           John said that Stephane Durand raised similar issues in the comments

Next Call
              The next Connect call will be the SIOP Special Topic call on Thursday, February 3rd, 2022 at 7am Pacific Time
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs-ab/attachments/20220201/4596cf5d/attachment.html>


More information about the Openid-specs-ab mailing list