[Openid-specs-ab] Meeting notes: August 14th, 2025
Frederik Krogsdal Jacobsen
frederik.krogsdal at criipto.com
Thu Aug 14 15:12:36 UTC 2025
Date: 14/08/2025
Attendees: Ethan Heilman, Mike Jones, Frederik Krogsdal Jacobsen, Dick
Hardt, Andy Barlow, George Fletcher, Lukasz Jaromin, Aaron Parecki, Chris
Phillips, Filip Skokan, Andrii Deinega
Ethan is a cryptographer at Cloudflare. He had a now acquired company which
provided a technology to put public keys into ID tokens (OpenPubKey, see
https://eprint.iacr.org/2023/296). This can be used for software supply
chain security, SSH connections, proxy connections and other applications.
This is related to the spec proposal we will discuss later in the meeting.
Events:
- IIW dates have changed. See https://internetidentityworkshop.com/.
- Does anyone know if DICE will happen this year? It was postponed to
November, but no date has been set so far. See https://diceurope.org/.
Frederik will ask in the OIDF Slack.
Connect PRs:
- FedCM binding of OIDC:
https://bitbucket.org/openid/connect/issues/2179/fedcm-binding-of-oidc
- Some people have volunteered to work on this.
- Mozilla announced in the W3C call yesterday that they are no longer
actively working on FedCM support. Apple has not publicly done
any work on
FedCM. This leaves Chrome as the only active implementation.
- Clarification on additional metadata:
https://bitbucket.org/openid/connect/pull-requests/750
- This will be merged.
- id token claims should not be null:
https://bitbucket.org/openid/connect/pull-requests/751
- Remaining issues were resolved at the meeting and this will be
merged.
- All open PRs have been resolved.
Discussion of OpenID Connect Enterprise Extensions:
- The claim aud_sub represents the identifier that the RP uses for an
account.
- In OpenID Provider Commands, the aud_sub can be sent from the RP to
the OP to “transfer” an account from the RP to the OP using the manage
command (and the other way around).
- Use case: user initially created a “standalone” account without SSO,
and later this needs to be transferred into the SSO system.
- In OpenID Provider Commands, the RP can use the managed_by claim to
tell the OP who manages an account.
- Question: does managed_by mean identity lifecycle management or
session management or both? This should be aligned with IPSIE terms.
- The RP can state aud_sub_required in its metadata to state that they
require support for aud_sub.
- Question: is this similar for SCIM? Yes, one way to think about
Provider Commands is SCIM for OIDC.
- Question: how do you establish trust that the IdP is authoritative for
the user account? This is part of the OpenID Provider Commands setup. The
trust should be specific to a tenant within the OP.
- Question: how is the scope of authorization for account transfers
handled? This is out of scope for the spec and must be handled between the
RP and the user. Guidance around this should be put into the security
and/or privacy considerations in the spec.
- No decisions were made for now.
- Dick will make some changes to the draft to make it easier to get an
overview.
Discussion of new proposed spec OpenID Connect Key Binding:
- Mechanism to bind a key to an ID token.
- Builds on DPoP by adding a new scope dpop and including the dpop_jkt
in the auth request. Then in the token request, add DPoP header with code
as the nonce for DPoP. Token response then contains cnf claim with the
public key from the DPoP header.
- The new element is putting the dpop public key in the ID token.
- Use case: for SSH, look at claims in the ID token to determine access.
Binding the token to a key prevents session replay.
- Variations on this idea are already in use for many use cases.
- Comment: there is ongoing work on an extension to WebAuthn to allow
signing of arbitrary data, and this may be relevant. See
https://github.com/w3c/webauthn/pull/2078
- Comment: you could put c_hash into the token to bind the key instead
of using DPoP nonce.
- Comment: should ID tokens be used for “just anything”? Or should we be
careful about what we use them for? Ethan’s point of view: the cat is
already out of the box.
- We will make more time for further discussion of this topic next week
since the meeting is running over time.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs-ab/attachments/20250814/a8a69928/attachment-0001.htm>
More information about the Openid-specs-ab
mailing list