[Openid-specs-ab] Meeting notes from 19-Jun-25 Connect WG call
Frederik Krogsdal Jacobsen
frederik.krogsdal at criipto.com
Thu Jun 19 14:44:07 UTC 2025
Attendees:
Mike Jones, Avalur Venkata Monika, Frederik Krogsdal Jacobsen, Chris
Phillips, Brian Campbell, Joseph Heenan
External events:
- IETF 123 in Madrid, July 19-25, 2025
- Submission deadline is July 7th
New working group specification:
- OpenID Connect Enterprise Extensions
RP Metadata Choices:
- Review to become an implementer's draft ends in 8 days
- Voting will start soon
EAP ACR values:
- Passed the vote and is now a final specification
- It defines two new acr_values for phishing-resistant authentication
- It also defines a new authentication method value indicating that
proof-of-possession was used
Connect Claims Aggregation:
- Was republished, but unclear what next steps are (authors were not
present)
Enterprise Extensions:
- Published
- Defines "tenant" claim, which is relevant for IPSIE and OP commands
- Next steps might involve integration into OP commands
Ephemeral Subject Identifier:
- Call for adoption ended today
- Nat added some information about motivation and the relation to SAML
on the mailing list
- There is a proof in an ISO specification that ephemeral subject
identifiers guarantee certain properties
- Nat will add motivation to the spec after adoption
- There was only positive feedback, so it will be adopted
Deferred Token Response:
- Can be taken off as an active discussion point until further
motivation appears on the list
- There is ongoing discussion about use cases - let Frederik know if you
are interested in participating
- DCP group has stabilized the Deferred Credential Response flow, so it
can be used as inspiration
OpenID Federation:
- Open issues and proposed resolutions were discussed after interop event
Other business:
- Congrats to Aaron for getting some OAuth/OIDC into the new MCP
specification.
- Link:
https://www.linkedin.com/posts/aaronparecki_modelcontextprotocol-mcp-oauth-activity-7341285511312887808-mRYo
- Question on OpenID Federation: what is issue #100 about?
- Researchers at University of Stuttgart have identified that if you
do a federation flow where the RP and OP choose different trust anchors,
you don't get federation integrity, i.e. you don't share a common trust
infrastructure.
- This is only possible because inter-federation and membership in
multiple federations is allowed.
- There is a proposal to add a trust path, i.e. a sequence of entity
IDs, in a call such that you can verify that you use a common
trust anchor.
- There is a discussion with the researchers about redoing the
security analysis. The editors of the spec intend to address all
security-relevant PRs and new features before redoing the
analysis. Gail is
managing the scope of this.
- Chris: It is similar to proxying: how do I know which rule set to
follow? The "standard" solution is to use the union of both rule
sets. But
how do you know that the policy of the two trust anchors is compatible?
- Where should the issue be discussed? It can happen in the WG call,
in the GitHub issues, etc.
- Another interoperability event is planned - either in person or online
Best regards,
*Frederik Krogsdal Jacobsen*
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs-ab/attachments/20250619/46545513/attachment-0001.htm>
More information about the Openid-specs-ab
mailing list