[Openid-specs-ab] Minutes from 2025-11-20 Connect WG Call

Frederik Krogsdal Jacobsen frederik.krogsdal at idura.eu
Thu Nov 20 16:20:17 UTC 2025


   - Meeting attendees: Mike Jones, Frederik Krogsdal Jacobsen, Chris
   Phillips, Joe DeCock, Roland Hedberg, John O’Leary, Filip Skokan, Pam
   Dingle, Łukasz Jaromin, Aaron Parecki, George Fletcher, Samuel Rinnetmäki,
   Stefan Santesson, Rachel O’Connell
   - John O’Leary is new to the group. He is interested in AuthZEN and is
   sitting in to get acquainted with OpenID specs and work in general.
   - Date and time of meeting: November 20th, 2025
   - Agenda: The agenda sent by Mike before the meeting was accepted with
   no changes.
   - Events:
      - W3C TPAC was last week. WebAuthn level 3 will probably be published
      soon. FedCM developed a bit. There is an idea there about putting
      unmodified Connect flows into FedCM.
      - OSW: Are there any updates about it? No.
      - TIIME will have an OpenID Federation workshop (
      https://tiime-unconference.eu/). They will host an interop event on
      their testbed during this. Time and location: February 9-13 2026,
      Amsterdam. Niels van Dijk reports that he is co-chairing the Federation
      Interop at TIIME with Davide Vaghetti from GARR
   - OpenID Federation
      - Almost ready for 1.0.
      - Almost all issues and PRs are now done.
      - Choice of trust anchors:
         - Stefan: Is there normative language that requires anyone to take
         action?
         - Mike: There is normative language defining the mechanism. The RP
         MAY choose at registration time to pass along the trust chains. It is
         optional for the RP to do so. The OP MAY ignore the trust chains.
         - Stefan: The main thing is that we don’t impose any requirements
         that someone trust someone else. Everyone should be able to
make their own
         trust decisions.
         - Mike: That is still the case. See
         https://openid.github.io/federation/main.html#section-4.4
         - Roland: The mechanism here is that the RP says: “I would like to
         use this trust anchor”. The OP is free to not do so if it
does not trust
         that anchor for some reason.
      - Mike: The editors now believe that it is time to start the 2 week
      working group last call to move Federation 1.0 to Final. Nobody
was opposed
      to this at the meeting.
      - Mike will try to fix any spelling and grammar errors etc. then
      start the working group last call on the new draft.
      - Issue 290:
         - https://github.com/openid/federation/issues/290
         - Mike: I am in favor of defining a small number of reasons for
         trust mark revocation in the spec, to mirror the historical
keys revocation
         reasons.
         - Stefan: In X509, this was over-engineered. I’m not aware of any
         good reasons to be too granular about this. It is unlikely to
be used a
         lot, so don’t put too much effort into defining too many reasons.
      - PR 289:
         - https://github.com/openid/federation/pull/289
         - Mike: This is a mix of good editorial changes and model changes.
         I have asked the author to remove the model changes.
      - Issue 288:
         - https://github.com/openid/federation/issues/288
         - There are multiple very long comments on the issue.
         - This was a very long discussion with many technical opinions.
         The notes below are a brief summary.
         - Mike: Can we have a unified client ID syntax model across OAuth
         and OpenID? No, because other specs have defined things in a
way that makes
         client ID prefixes not necessarily compatible. But Federation and VP
         actually happen to be compatible.
         - Łukasz: I don’t think it’s the right time to make this change
         now.
         - Pam: If we need two levels of discovery, we have a problem. How
         is an AS supposed to know what they’re using? We need to fix
the problem
         now if there is one. The issue is that the client ID needs to
be resolvable.
         - Mike: There is not a problem necessarily.
         - Stefan: Since the entity can also be resolved in other ways, I
         am not too scared. I am writing a draft with the missing
piece, which is a
         way to discover subordinate entity statements using a
top-down approach.
         - Łukasz: The tendency is that ecosystems decide in a
         non-machine-readable way. In the future, this will create
interoperability
         problems.
      - Native SSO for Mobile Apps
      - Mike: Vladimir requested a particular set of changes in an email
      title “Re: [Openid-specs-ab] Next steps for the Native SSO for
Mobile Apps
      specification” on November 11.
      - George: I did not see it yet, but I will respond to his email.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs-ab/attachments/20251120/5cb1e622/attachment.htm>


More information about the Openid-specs-ab mailing list