[Openid-specs-ab] Revised submission :: OpenID Connect Key Binding
george at practicalidentity.com
george at practicalidentity.com
Tue Oct 7 13:45:11 UTC 2025
Hi Dick and Ethan,
Thanks for the updated version. The scope is much more clear in this version.
In Security Considerations section 3.3 there is a prohibition with using the id_token as an access token. Yet in the kubeclt example that has been mentioned a few times in the email thread, the id_token IS used as an access token. This is driven partly from the existing behavior of stuffing attributes for ABAC and roles for RBAC into the id_token.
I also believe that there is a need for an identity token that is intended to cross trust-domain boundaries. I’m thinking it may make sense to define a mechanism that serves both the single RP (and its components) as well as the larger use case of crossing trust-domain boundaries. I’d expect that decentralized systems will need this capability (e.g. bluesky).
George Fletcher
Identity Standards Architect
Practical Identity LLC
> On Oct 1, 2025, at 7:13 AM, Dick Hardt via Openid-specs-ab <openid-specs-ab at lists.openid.net> wrote:
>
> Attached is a revised submission in HTML taking into consideration the feedback from the recent call for adoption.
>
> repo: https://github.com/dickhardt/openid-key-binding
> online html: https://dickhardt.github.io/openid-key-binding/main.html
>
> The authors would like to thank Jacob for his review and feedback.
>
> /Dick & Ethan
> <main.html>_______________________________________________
> Openid-specs-ab mailing list
> Openid-specs-ab at lists.openid.net
> https://lists.openid.net/mailman/listinfo/openid-specs-ab
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs-ab/attachments/20251007/bcedf5f5/attachment.htm>
More information about the Openid-specs-ab
mailing list