[Openid-specs-ab] Spec Call Notes 22-Sep-22
Mike Jones
Michael.Jones at microsoft.com
Thu Sep 22 19:34:52 UTC 2022
Spec Call Notes 22-Sep-22
Mike Jones
Filip Skokan
David Chadwick
Joseph Heenan
Giuseppe De Marco
George Fletcher
Mark Haine
Rifaat Shekh-Yusef
Brian Campbell
prompt=create Specification
George updated the spec with non-normative text improvements yesterday
https://openid.net/specs/openid-connect-prompt-create-1_0-05.html
The working group last call for Implementer's Draft status completed today
We will start the Implementer's Draft review today
The prompt_values_supported metadata value was the last addition to the spec
Mark Haine said that some use cases of the Identity Assurance draft are asking the IdP to perform an assurance process from scratch
We observed there is some semantic overlap with prompt=create
George said that this spec sets up the structure to add other prompt values
Such as prompt=reverify, which could be added to the IDA-eKYC spec
Native SSO for Mobile Apps Specification
The working group last call for Implementer's Draft status completed today
Joseph filed a number of issues
George still needs to update the spec accordingly
One is to add the requirement to validate the ID Token
George found some other things that need clarification
Additional reviews are solicited
At Identiverse, Okta talked about using it to share state between devices
"Frictionless authentication with mobile single-sign-on": https://www.youtube.com/watch?v=8BkblIYjegk
George asked if we want to keep the scope the same or expand it
Mike suggested we go to Implementer's Draft as-is, then discuss possible scope expansion
Rifaat volunteered to review the draft
Brian asked whether it makes sense to progress this document, given its dormancy
George said that there are multiple implementations, including at Yahoo!
Mike said that the working group had decided to take it to Implementer's Draft for IPR reasons
Then we can decide what the next steps are
George said that the pressure from products to reduce user friction continues
He said that having something that's been vetted from a security perspective is important
Public Review Period for Proposed Final Unmet Authentication Requirements Specification
The 60-day public review period is under way
https://openid.net/2022/09/09/public-review-period-for-proposed-final-unmet-authentication-requirements-specification/
Nat privately asked if there were multiple implementations of the spec
Mike said he believes that it's referenced from multiple specifications
Brian said that it's referenced from the OAuth step-up specification
That moved to WGLC today
Mike said that he would ask Torsten about implementations if he joins the SIOP Special Topic call in the next hour
Pull Requests
https://bitbucket.org/openid/connect/pull-requests/
PR #303: fix: [Federation] Federation Entity Discovery in the defined terms
We updated the term to "Federation Entity Discovery"
Merged
PR #302 fix: [Federation] Trust Chain explanatory text made easier
Giuseppe said that this clarifies the composition of a trust chain
The trust chain MAY contain the entity configuration of the trust anchor
Waiting for additional approvals - particularly, hopefully Roland and Vladimir
PR #306: Updates to Native SSO spec
We requested a few changes; George will update
PR #304: Fix pre_authorized_code to be pre-authorized_code
Merged
Issues
https://bitbucket.org/openid/connect/issues?status=new&status=open
#1637: id_token validation?
Joseph talked about missing signature validation
We discussed that the ID Token is being unbound for multiple parties
Brian said that there is weirdness about audience and expiration that at least needs more explanation
George suggested that wording about multiple devices should go into the Security Considerations
and that the ID Token Validation description should go into the spec itself
#1641 feat: [Federation] endpoint for historical federation jwks
Giuseppe said that those doing SAML federations brought up repudiablity of past signatures after keys have been changed
He said that this may result in legal problems
Giuseppe said they are only proposing to retain past keys for trust anchors
People are requested to discuss the issue
Next Call
The next call is the SIOP Special Topic call immediately following this call
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs-ab/attachments/20220922/d6791e9e/attachment.html>
More information about the Openid-specs-ab
mailing list