<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=us-ascii">
<meta name="Generator" content="Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
{font-family:Tahoma;
panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0in;
margin-bottom:.0001pt;
font-size:11.0pt;
font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:#0563C1;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-priority:99;
color:#954F72;
text-decoration:underline;}
span.EmailStyle17
{mso-style-type:personal;
font-family:"Calibri","sans-serif";}
span.EmailStyle18
{mso-style-type:personal-reply;
font-family:"Calibri","sans-serif";
color:#1F497D;}
.MsoChpDefault
{mso-style-type:export-only;
font-size:10.0pt;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang="EN-US" link="#0563C1" vlink="#954F72">
<div class="WordSection1">
<p class="MsoNormal"><span style="color:#1F497D">All,<o:p></o:p></span></p>
<p class="MsoNormal"><span style="color:#1F497D">Torsten’s slides from IIW on Identity Proofing with OpenID Connect can be at
<a href="https://www.slideshare.net/TorstenLodderstedt/identity-proofing-with-openid-connect">
https://www.slideshare.net/TorstenLodderstedt/identity-proofing-with-openid-connect</a>.<o:p></o:p></span></p>
<p class="MsoNormal"><span style="color:#1F497D"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="color:#1F497D">BR,<o:p></o:p></span></p>
<p class="MsoNormal"><span style="color:#1F497D">Bjorn<o:p></o:p></span></p>
<p class="MsoNormal"><span style="color:#1F497D"><o:p> </o:p></span></p>
<div>
<div style="border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in 0in 0in">
<p class="MsoNormal"><b><span style="font-size:10.0pt;font-family:"Tahoma","sans-serif"">From:</span></b><span style="font-size:10.0pt;font-family:"Tahoma","sans-serif""> Openid-specs-ab [mailto:openid-specs-ab-bounces@lists.openid.net]
<b>On Behalf Of </b>Mike Jones via Openid-specs-ab<br>
<b>Sent:</b> Monday, October 29, 2018 5:41 PM<br>
<b>To:</b> openid-specs-ab@lists.openid.net<br>
<b>Cc:</b> Mike Jones<br>
<b>Subject:</b> [E] [Openid-specs-ab] Spec Call Notes 29-Oct-18<o:p></o:p></span></p>
</div>
</div>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">Spec Call Notes 29-Oct-18<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">Nat Sakimura<o:p></o:p></p>
<p class="MsoNormal">John Bradley<o:p></o:p></p>
<p class="MsoNormal">Bjorn Hjelm<o:p></o:p></p>
<p class="MsoNormal">Brian Campbell<o:p></o:p></p>
<p class="MsoNormal">Edmund Jay<o:p></o:p></p>
<p class="MsoNormal">Rich Levinson<o:p></o:p></p>
<p class="MsoNormal">Mike Jones<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">Agenda<o:p></o:p></p>
<p class="MsoNormal"> Editor's report for Errata and Logout<o:p></o:p></p>
<p class="MsoNormal"> Open Issues<o:p></o:p></p>
<p class="MsoNormal"> Report from IIW<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">Report from IIW<o:p></o:p></p>
<p class="MsoNormal"> Nat asked Mike to give a report from the Internet Identity Workshop (IIW)<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal"> Torsten presented verified claims JWT proposal<o:p></o:p></p>
<p class="MsoNormal"> There was strong interest in standards in this area<o:p></o:p></p>
<p class="MsoNormal"> Expect a proposal from Torsten soon<o:p></o:p></p>
<p class="MsoNormal"> Mike believes that this work belongs in the Connect working group<o:p></o:p></p>
<p class="MsoNormal"> Nat has heard interest in this capability from European banks<o:p></o:p></p>
<p class="MsoNormal"> Kim Cameron is interested in being able to request aggregated claims from a particular issuer<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal"> The FastFed working group held a 3-hour Thursday afternoon<o:p></o:p></p>
<p class="MsoNormal"> Darin McAdams updated FastFed draft to focus on Connect and not SAML<o:p></o:p></p>
<p class="MsoNormal"> Attendees included Chuck Mortimore, Karl McGuiness, Dick Hardt, Darin, ADT, Googlers, and Mike Jones<o:p></o:p></p>
<p class="MsoNormal"> Chuck advocated starting with "brown field" scenarios<o:p></o:p></p>
<p class="MsoNormal"> Converting a small number of username/password logins to an enterprise-wide federation<o:p></o:p></p>
<p class="MsoNormal"> These result from viral adoption of products like Slack or Teams<o:p></o:p></p>
<p class="MsoNormal"> Others thought that "green field" - enabling federation from day 1 - is also important<o:p></o:p></p>
<p class="MsoNormal"> Dick Hardt should be sending notes to the FastFed mailing list<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal"> Roland Hedberg described updates he and Andreas Solberg made to the OpenID Connect Federation draft<o:p></o:p></p>
<p class="MsoNormal"> Now every entity has an entity descriptor - previously RPs didn't<o:p></o:p></p>
<p class="MsoNormal"> Added the ability to use JWT client IDs without pre-registration<o:p></o:p></p>
<p class="MsoNormal"> Continuing to use syntax defined by Discovery and Dynamic Client Registration<o:p></o:p></p>
<p class="MsoNormal"> People are highly encouraged to review draft 5 at
<a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__openid.net_specs_openid-2Dconnect-2Dfederation-2D1-5F0-2D05.html&d=DwQFAg&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=NMZJHCV8pjvGIH2fTx9z6l7g7-V-a2xW7ISf9uHdz0A&m=JMpJf-BC-wdLStp0L2nPVLf0VHovxrmhF75FC0JrU08&s=WRb3z0ITpd5Vha6UcYjn58nS4dg_jmsMT89Wo5LPR7M&e=">
https://openid.net/specs/openid-connect-federation-1_0-05.html</a><o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal"> Interest in RISC<o:p></o:p></p>
<p class="MsoNormal"> Some large companies have production RISC endpoints now<o:p></o:p></p>
<p class="MsoNormal"> These are based on the RISC Implementer's Drafts<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal"> Mike gave an Introduction to OpenID Connect "101" talk<o:p></o:p></p>
<p class="MsoNormal"> It was well attended<o:p></o:p></p>
<p class="MsoNormal"> Among others there were attendees from the banking and R&E sectors<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">Editor's report for Errata and Logout<o:p></o:p></p>
<p class="MsoNormal"> Mike plans to focus on completing the Errata and logout spec edits after IETF<o:p></o:p></p>
<p class="MsoNormal"> There are some open issues that need to be decided both for Errata and for some of the logout specs<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">Open Issues<o:p></o:p></p>
<p class="MsoNormal"> <a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__bitbucket.org_openid_connect_issues-3Fstatus-3Dnew-26status-3Dopen&d=DwQFAg&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=NMZJHCV8pjvGIH2fTx9z6l7g7-V-a2xW7ISf9uHdz0A&m=JMpJf-BC-wdLStp0L2nPVLf0VHovxrmhF75FC0JrU08&s=agwZHU7NyNaHfrfYjhpqaNUENX7Lq2p41kMoQKkV14o&e=">
https://bitbucket.org/openid/connect/issues?status=new&status=open</a><o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal"> #1052 make clear that nonce is always required for Hybrid flows<o:p></o:p></p>
<p class="MsoNormal"> Mike and Brian spoke to this<o:p></o:p></p>
<p class="MsoNormal"> A nonce request parameter may not be strictly necessary for the code+token response type<o:p></o:p></p>
<p class="MsoNormal"> Both agreed that reasonable people could interpret this differently for code+token<o:p></o:p></p>
<p class="MsoNormal"> Brian made the case that we shouldn't introduce breaking changes via errata<o:p></o:p></p>
<p class="MsoNormal"> Mike pointed out that this change would probably require removing this particular test from the certification suite for code+token<o:p></o:p></p>
<p class="MsoNormal"> Mike will write up this possibility in the issue for review<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal"> #1032 rp-initiated logout - proposal for client_id parameter<o:p></o:p></p>
<p class="MsoNormal"> Mike asked what the security implications are of passing the client_id a non-tamper-resistant manner<o:p></o:p></p>
<p class="MsoNormal"> We will discuss this on the next European-friendly call<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">Next Call<o:p></o:p></p>
<p class="MsoNormal"> We will keep the Thursday call despite it being IETF week<o:p></o:p></p>
<p class="MsoNormal"> It will be at 9pm in Bangkok<o:p></o:p></p>
</div>
</body>
</html>