[Openid-specs-ab] OpenID AB/C WG Call Meeting Notes 2023-Sep-07

Naohiro Fujie naohiro.fujie at eidentity.jp
Thu Sep 7 23:47:59 UTC 2023


It was me. I started to catch up with the OIDC Federation spec for my
customer in Japan.

> (sorry I missed some, I don't remember the name ... my bad, please add
anyone I miss)

Naohiro

2023年9月8日(金) 1:16 Giuseppe De Marco via Openid-specs-ab <
openid-specs-ab at lists.openid.net>:

> # Attendees
>
> Brian Campbell
> Giuseppe De Marco
> Joseph Heenan
> Andrii Deinega
> Michael Jones
> Roland Hedberg
> Tom Jones
> George Fletcher
> (sorry I missed some, I don't remember the name ... my bad, please add
> anyone I miss)
>
> Mike: Agenda of two days ago for the proposed topics
>
> Events:
>
>  - reports from OAS WS in london:
>    - Roland's impressions:
>      - many presentations on security evaluation of the OAuth2 and its
> extensions
>      - many discussion about OIDC Federation 1.0
>    - Mike:
>      - they didn't have trust anchors but several trust chains without
> knowing how to validate these
>    - Roland:
>      - Other uses cases using Proxies that handles registrations and trust
> evaluation for its registered entities
>
> Mike: Federation is mature enough but it is important to make it a
> standard for promoting implementations and adoptions
>
>  - Actionable things for IIW:
>    - Andrii: pleased to be there and meet people
>
> Mike: New WG started last week, Digital Credentials Protocols WG, with the
> scope to continuing working on the OpenID4VC specs and the ecosystem around
> it. We will share the SIOP Special Call timeslot with DCP for the time
> being.
>
> We did the github migrations for these specs at https://github.com/openid/,
> the migrations of the issues was automatic and really impressive. However
> the PR required to be migrated by hands.
>
> Federation specs:
>
> We can migrate oidc federation as well to github when we'll merge the
> pending three PRs we still have in bitbucket.
>
> - agreement for the implmentors draft, to be published very soon
>
> - we should discuss what PR we want to be in the impl draft looking for
> getting these merged today
> - PR https://bitbucket.org/openid/connect/pull-requests/609:
>   - it reworks the explicit registration text, to be able to address
> issues and simplify then implementations
>   - 4 approvals, then MERGED.
>
> - PR https://bitbucket.org/openid/connect/pull-requests/613
>   - it largely better specifies the federation endpoints urls, saying what
> can be included within the urls
>   - merely editorial that clarifies things that are already true and
> implictly known
>   - MERGED
>
> - PR https://bitbucket.org/openid/connect/pull-requests/607
>   - it gives more description about how the policies interacts each other
>   - in particular the language about the operator parameter `one_of`
>   - to be merged later since it has merge conflicts to be resolved by
> Vladimir
>
> - PR https://bitbucket.org/openid/connect/pull-requests/589
>   - Metadata coming from locations that are not Entity Statements
>   - Torsten and Kristina called for review in response to their claims
> about the discussion on the trust and security models
>   - there's a division within our community on this PR since there are ppl
> in favor of that and others not
>   - George Fletcher:
>     - is there any way to allow in federation to fetch metadata from
> external locations, I heard ppl that arguing on that, it seems that the
> agreement is not explicit yet
>     - Mike: it would be a mess if several entities gives the metadata in a
> place and other of the same type and for the same purpose in another place.
>     - George: the Federation approach is quite clear
>     - Roland: explains the rationale about the requirement of fetching
> verifiable metadata
>     - Mike: we have text in the PR about how this is addressed that's an
> implementation choice
>     - George: concerns about the possibility to give a way to publish
> metadata in multiple ways.
>     - Mike: this help the infrastructure to be migrated from legacy trust
> models to federation
>     - Roland: to be part of a federation all the entities must publish
> their entity configurations to be attestable under one or more Trust
> Anchors.
>     - Tom Jones: There seems to be some assumption that federation spec
> only works for on-line cases.  Is that the case?
>     - Giuseppe: Federation can work with static trust_chain in carried
> within the JWS header parameter, this allows the offline flows
>     - Tom: concerns about how to apply the trust model with federation
> with wallet 2 wallet intaractions, we need to talk about on that when the
> flow is wallet 2 wallet flows.
>     - Giuseppe: the Trust Model for these kind of interaction relies on
> the Wallet Instance Attestation, where the trust chain related to the
> Wallet Provider attests the reliability of the wallet instance
>    - Tom: more discussion is required to get all the required
> clarifications
>    - Giuseppe: Agreed
>
> Issues:
>  -
> https://bitbucket.org/openid/connect/issues/2060/federation-515-applying-policies-specify
>    - assinged to Vladimir
>  -
> https://bitbucket.org/openid/connect/issues/2002/federation-please-add-a-visual-diagram
>    - Kristina comments will be committed, assigned to Giuseppe
> _______________________________________________
> Openid-specs-ab mailing list
> Openid-specs-ab at lists.openid.net
> https://lists.openid.net/mailman/listinfo/openid-specs-ab
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs-ab/attachments/20230908/7d795f7f/attachment.html>


More information about the Openid-specs-ab mailing list