[Openid-specs-ab] Spec Call note 12-Sep-2013

Edmund Jay ejay at mgi1.com
Thu Sep 12 18:16:59 UTC 2013


Spec Call notes 12-Sep-2013


Attendees
  Nat Sakimura
  Brian Campbell
  George Fletcher
  Justin Richer
  Roland Hedberg
  John Bradley
  Edmund Jay



Agenda
  Spec Refactoring
  Planning for Final Draft
  New Issues
  Unsolicited authentication flow using ID Tokens



Spec Refactoring
  Some members prefer the monolithic version with all components in one place. Reference lookups are easier.
  Monolithic version may be too long with too many features, but it may be solved by having a separate 
  authentication document and keeping the monolithic document as the full version.  
  It has a perception problem of being overly complex.
  A version with chapters/partitions may alleviated the perception.
  The spec needs a roadmap/guide for specific features.
  Different profiles for OpenID Connect can be produced once a definitive normative spec is finalized. Current specs
  have a synchronization problem.
  The sentiment of the group seems to be in favor of the monolithic spec.

  Nat asked whether the current ordering of the code flow and implicit in the monolithic version should be switched.
  The group decided to keep the current order of code flow before implicit flow.
  
  People should review the refactored specs at http://nat.sakimura.org/2013/08/27/refactoring-openid-connect-drafts/
  Nat will add the refactored version to Bitbucket and add it to the issue tracker for reported problems.



Planning for the Final Draft
  There is not much time if the group is planning to finalize the spec by the end of December.
  Roland, Justin, John have volunteered to do detailed review.

  Even though JWS/JWE hasn't been finalized, there should not be normative impact on the specs.


New Issues
  #870 - Standard 3.2.1. Refresh Token Response - return of id_token prohibited, conflicts with Messages 2.2.3
      It has been decided that an ID Token can be returned from the token endpoint for grant types other than 
      authorization_code 
      This is part of the synchronization problem between current specs.
      It's decided that normative fixes to the current specs will continue in parallel with the new refactored specs.


Unsolicited Authentication Flow using ID Token
  Zendesk/Salesforce and others are starting to use ID Token for IdP initiated SSO for parties with pre-established
  relationships.  Some security requirements may be skipped because they may be mitigated by out of band means.

  The current specs does not allow this. ID Tokens must include a nonce if the ID Token is returned in the front
  channel. Nonce requirement can be soften by changing it to a SHOULD and including some extra security considerations.
  Current specs are focused on a request and response protocol.  It does not specify responses in cases where there are no requests.

  Justin/George feels that this is not OAuth anymore. It should start with OAuth as the base with other protocols built on top of it.
  OpenID Connect should not change to accommodate foreign(SAML) concepts.

  We should have a separate document that details how to perform authentication with ID Tokens but is not part of OpenID Connect.
  John will post to the list with this decision.

  Will also need to develop a response to the question of why others are using this alternative IdP initiated login instead of OpenID Connect itself.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs-ab/attachments/20130912/a3ed4deb/attachment-0001.html>


More information about the Openid-specs-ab mailing list