[Openid-specs-ab] OpenID Connect WG Call (Atlantic) Meeting Notes (2025-04-14)

David Waite david at alkaline-solutions.com
Tue Apr 15 01:17:29 UTC 2025


# OpenID Connect WG Call (Atlantic) Meeting Notes (2025-04-14)

## Attendance

* Michael Jones (MJ) - Chairing
* David Waite
* Dick Hardt - Chairing
* Aaron Parecki
* Andrii Deinega
* John Melati
* Michael Fraser (MF)
* Tom Jones

## Event Retrospective 

### OpenID Workshop and IIW, Apr 7-10, Mountain View, California

Dick: 

> Cloudflare released information on how to use OpenID as part of SSH
> negotiation
> 
> OpenPubKey works by putting information into a nonce
>
> Use a `cnf` claim in an `id_token` for DPOP.

MJ: OpenID Connect UserInfo Verifiable Credentials was proposed for much of the
same reasons but will be discussed later as inactive, was there overlap?

Dick: Yes but the use cases are complicated, and it would be difficult to adapt

### OpenID Federation Interop, April 28-30, hosted by SUNET in Stockholm

MJ:

> Putting together final logistics for OpenID Federation Interop, in 2 weeks in
> stockholm. Please look at the attendee spreadsheet in the agenda - 
> specifically if you plan to attend and have dietary restrictions.

## Inactive Specifications

OpenID Connect Claims Aggregation: 
   No updates since draft -02 in September 2021

OpenID Connect UserInfo Verifiable Credentials: 
   No updates since draft -00 in May 2023

Self-Issued OpenID Provider v2:
   No updates since draft -13 in November 2023

MJ:

> Unfortunately the authors of these specifications aren't all on the call
> today, so I'll take an action item to reach out to find out if these should
> be marked as being inactive

## OpenID Connect Relying Party Metadata Choices

MJ:

> Is it time for an Implementer’s Draft? Federation has a normative reference
> to it and we'd like to lock in the IPR.

MF: I did raise an issue https://github.com/openid/rp-metadata-choices/issues/2
about complications in use with Federation

MJ: Agreed, we should have a discussion on this before calling for an
implementer's draft

## OpenID Provider Commands - Issues/PRs

### Main PR

Misc PR - expected to be non-controversial normative changes
https://github.com/openid/openid-provider-commands/pull/12

Has several issues which it attempts to resolve:

[Rename commands URI to commands endpoint](
    https://github.com/openid/openid-provider-commands/issues/2 )

Dick: This is meant to align with terminology elsewhere in OpenID/OAuth

Aaron agreed

[Add Audit command](
    https://github.com/openid/openid-provider-commands/issues/3 )

[Add error event](
    https://github.com/openid/openid-provider-commands/issues/6 )

Dick: Add to SSE so RP can indicate to the OP a critical failure

[Add sub and tenant to command responses](
    https://github.com/openid/openid-provider-commands/issues/8)

[SSE not dependent on HTTP/1.1](
    https://github.com/openid/openid-provider-commands/issues/9)

Dick: Clarified text there

[Add streaming response error message…](
    https://github.com/openid/openid-provider-commands/issues/10)

Dick: Used if the SSE request attempts to revive a stream which the RP no
longer recognizes

## Other issues

[client_id / aud values](
    https://github.com/openid/openid-provider-commands/issues/4)

Dick: Should the client_id be a claim and the aud is the command endpoint?

Aaron: Does this have overlap with the FAPI audience mismatch issue

MJ: we decided to use the id across the board rather than the endpoint address

Andrii: in this case aud will be the command endpoint on the RP side

Dick: there should only be confusion if the client_id and command endpoint were
the same value

Aaron: One explicit call out by the researchers who discovered the issue was
that multiple audience values should not be used

Dick: agree we should research why FAPI did not decide to make it the endpoint

MJ: we should also ask the researchers (who discovered the FAPI issue) this
question, since they seem happy to contribute

["roles" claim per IPSIE IL3](
    https://github.com/openid/openid-provider-commands/issues/11)

Aaron: text may be premature in that the IPSIE work has not agreed to use
commands yet

Dick: will make sure we send the right message - that the idea seemed valid in
IPSIE, so worth applying the same model to commands

[202 response for async command processing](
    https://github.com/openid/openid-provider-commands/issues/5)

Dick: in drupal community, deleting/suspending an account does not happen
synchronously - it is done using a queue. Using a 202-style response would
support this, but then the RP needs to tell the OP that it is completed

[notifications](
    https://github.com/openid/openid-provider-commands/issues/7)

Dick:

> How the RP tells the OP that it should perform a command, e.g. there's new
> data for you to fetch. There's a notification to an OP endpoint, possibly RP
> authenticated, otherwise the OP includes entropy for each RP that rotates

Aaron: A 202 location can indicate a location to determine if a command 
completes

Dick: thats polling; what I'm proposing is that a notification is pushed to
the OP

Aaron: the request can also include a notification response endpoint to
side-step a lot of these issues

Dick: how would we do this for a new metadata command or audit

Aaron: I don't think of those as notifications

DW: Would this work with the SSE mechanism already there?

Dick: Some of these could go through a lot of manual workflow, so could take
hours/days

Dick: in some cases people were worried about a network socket being held open
for extended periods of time

Dick:

> one motivation is to try to keep things optional, although there's a
> potential that a RP will act two different ways, but we want complexity at
> the OP
>
> Another thing during the IIW session was brainstorming about RP->OP events
> and OP->RP commands.

DW:

> I think you have a few choices - push vs pull, single event stream vs per
> command, (one more forgotten)  - once you decide those you'll have your
> mechanism.
>
> If you do not want the OP to have a way to authenticate the RP, that will
> steer you a particular way - or require you put significant restrictions on
> how the OP responds to RP notifications

## Other

Aaron: I noticed that there were a few issues on the old openid-commands repo
which were not moved over

Dick: I will double-check those

Call ended


More information about the Openid-specs-ab mailing list