<div dir="ltr">=================================================<br>OpenID AB/Connect WG Meeting Notes (2024-02-05)<br>=================================================<br>* Date & Time: 2024-02-05 23:00 UTC<br>* Location: <a href="https://zoom.us/j/97622169761?pwd=ek5kZUg3QnI1cCt6bTE3QzA3ZVlOQT09">https://zoom.us/j/97622169761?pwd=ek5kZUg3QnI1cCt6bTE3QzA3ZVlOQT09</a><div>* Self: <a href="https://bitbucket.org/openid/connect/wiki/Connect_Meeting_Notes_2024-02-05_Pacific">https://bitbucket.org/openid/connect/wiki/Connect_Meeting_Notes_2024-02-05_Pacific</a></div><div><br>1.   Roll Call</div><div>============</div><div>Attendees: Aaron, Mark Verstege, Edmund Jay, David Waite, Nat Sakimura, Tom Jones, Dima Postnikov </div><div>Regrets: Mike Jones<br><br>2.   Events</div><div>===========</div><div>2.1.   OAuth Security Workshop 2024</div><div>------------------------------------------------------<br>Submissions are open.<br><br>Deadline: 11th February for early submissions.<br><br><a href="https://oauth.secworkshop.events/osw2024">https://oauth.secworkshop.events/osw2024</a><br><br>The next deadline is March 10 for submissions.<br><br>2.2.   OpenID Foundation Workshop</div><div>------------------------------------------------------<br>April 15 @ Google. Details to be published this week.<br><br>3.   Liaisons</div><div>==========<br>N/A<br><br>4.   PRs</div><div>==========<br>Merged following PRs * <a href="https://bitbucket.org/openid/connect/pull-requests/692">https://bitbucket.org/openid/connect/pull-requests/692</a> * <a href="https://bitbucket.org/openid/connect/pull-requests/693">https://bitbucket.org/openid/connect/pull-requests/693</a> * <a href="https://bitbucket.org/openid/connect/pull-requests/694">https://bitbucket.org/openid/connect/pull-requests/694</a><br><br>The following conflicts<br><br><a href="https://bitbucket.org/openid/connect/pull-requests/695">https://bitbucket.org/openid/connect/pull-requests/695</a><div><br>5.  Issues</div><div>==========<br>Opened the following issues:<br><br><a href="https://bitbucket.org/openid/connect/issues/2108/track-national-identity-schems-that-uses">https://bitbucket.org/openid/connect/issues/2108/track-national-identity-schems-that-uses</a><br><a href="https://bitbucket.org/openid/connect/issues/2111/federation-location-and-scope-of">https://bitbucket.org/openid/connect/issues/2111/federation-location-and-scope-of</a><br><a href="https://bitbucket.org/openid/connect/issues/2112/syntax-error-in-trust-mark-request-example">https://bitbucket.org/openid/connect/issues/2112/syntax-error-in-trust-mark-request-example</a><br><a href="https://bitbucket.org/openid/connect/issues/2113/specify-private_key_jwt-as-the-default">https://bitbucket.org/openid/connect/issues/2113/specify-private_key_jwt-as-the-default</a><br><a href="https://bitbucket.org/openid/connect/issues/2114/client-authentication-and-the-federation">https://bitbucket.org/openid/connect/issues/2114/client-authentication-and-the-federation</a><br><a href="https://bitbucket.org/openid/connect/issues/2110/federation-multiple-entity_type-at-the">https://bitbucket.org/openid/connect/issues/2110/federation-multiple-entity_type-at-the</a><br><a href="https://bitbucket.org/openid/connect/issues/2078/federation-specify-the-applicable-json">https://bitbucket.org/openid/connect/issues/2078/federation-specify-the-applicable-json</a><br>Questions regarding the AS requirement on POST came up.<br><br><a href="https://gitlab.com/openid/conformance-suite/-/issues/1293">https://gitlab.com/openid/conformance-suite/-/issues/1293</a></div><div><br>In 3.1.2.1 of OIDC Core, it says:<br><br>Authorization Servers MUST support the use of the HTTP GET and POST methods defined in RFC 7231 [RFC7231] at the Authorization Endpoint.</div><div><br>However, the current test suite does not test the support of POST. It was suggested that it should be added. Now that 3rd party cookie restriction is kicking in, the POST is becoming obsolete. It was suggested that perhaps we should remove the requirement. Tom will add an issue on this. Separately, Aaron will create an issue to align to OAuth 2.1.<br><br>The call adjourned at 23:52 UTC.<br></div></div></div>