[Openid-specs-authzen] Meeting notes for Nov 14, 2023

Gerry Gebel gerry at strata.io
Wed Nov 15 23:54:13 UTC 2023


Hi all,

These meeting notes are also posted in the new HackMD section of the GitHub
repo, accessible here: https://github.com/openid/authzen/wiki/Meetings

Thanks to David Brossard for setting it up.

Feel free to add items to the agenda for the next meeting, likely on Nov 28

Meeting Notes for November 14, 2023
<https://hackmd.io/@oidf-wg-authzen/wg-meeting-20231114#Attendees>Attendees

   - Elie Azerad (independent)
   - Gerry Gebel (Strata Identity)
   - David Brossard (Axiomatics)
   - Atul Tulshibagwale (SGNL)
   - Omri Gazitt (Aserto)
   - Roland Baum (Umbrella Associates)
   - Alex Babeneau (3edges)
   - Victor Lu ()
   - Mike Leszc (OIDF)
   - John Bradley (Yubico)
   - Bjorn Hjelm (OIDF)
   - Tom Clancy (MITRE)
   - George Fletcher (CapitalOne)

<https://hackmd.io/@oidf-wg-authzen/wg-meeting-20231114#Notes>Notes
<https://hackmd.io/@oidf-wg-authzen/wg-meeting-20231114#Logistics>Logistics

   - Atul shares how shared signals is using HackMD for agenda management
   and meeting notes. David will set it up for us so we can use it going
   forward.
   - There is a poll in slack for whether a meeting should be held next
   week due to the Thanksgiving holiday in the US. Please indicate your
   preference here and we will make a decision by the end of this week:
   https://oidf.slack.com/archives/C0630873JGK/p1699981993068479
   - Andrew has stepped down as a co-chair due to an employment change.

<https://hackmd.io/@oidf-wg-authzen/wg-meeting-20231114#General-discussion>General
discussion

   - Alex incorporated comments into the design patterns document
   - Roland began writing a document on use cases and is up to 9 pages so
   far. Omri and others asked to see the draft before it is shared with the
   wider group

<https://hackmd.io/@oidf-wg-authzen/wg-meeting-20231114#GitHub-issues>GitHub
issues

We spent most of the call on issue #52, which covered a lot of ground.

   - Roland suggested that the PDP send additional information to the PEP
   regarding the response, particulary in situations where the PDP evaluation
   resulted in some kind of error condition
   - Atul pointed out the error codes and status fields in section 3.11
   - David: there are standard codes like 200, 4xx, 500, etc, but need to
   be careful about revealing too much information that an attacker could abuse
   - Roland: there is a difference between the HTTP interaction ad the
   authorization interaction
   - George: getting deep into design, but need to make decision on HTTP vs
   REST principles. Agree that we should not release too much info to
   attacker. But, can client do something based on error returned, then it is
   useful to add error messaging. If you have a 500, then you have some
   internal system error - then you know to retry. Whereas a 429 is a
   different kind of error.
   - David: My experience is that developers are use to handling
   permit/deny, but not for handling error conditions. A lot depends on how
   the PDP handles error messaging. Agree that we should use error messages
   accord to REST model.
   - Alex: If the response is other than Permit/Deny, then the error
   messaging needs to accommodate those use cases
   - David: XACML has model to provide additional information with
   advice/obligation statements, but specific to how dev handles it. Looking
   at 3.9.2, not sure PDP should respond with a reason - don’t want to make it
   a MUST
   - Atul: Spirit of API is PDP is instructing the PEP what to do. Reason
   is a MUST but could be given as an identifier.
   - Omri: Whether we want to have one specific API for simple use cases
   and have an additional API for extended queries - do we have one or two
   APIs? I would prefe to define a strict API and have an additional API for
   other use cases
   - Atul: Current doc has both, or are you suggesting something different?
   Current approach is to send an array of requests and return an array of
   responses.
   - Omri: There may be systems that can evaluate multiple requests at the
   same time and may be hard to assume all PDPs operate this way. There are a
   lot of similarities but lots of differences in underlying authZ systems.
   - Atul: Approach is the PEP can be as simple as you need and PDP can be
   as complex as you need. The way the API has been designed will require the
   PDP to support more complexity.
   - Roland: Can we use the SAML metadata approach to expose functionality
   that is supported?
   - George: Do we need a couple of patterns here? The simple one is the
   PEP is going to do what the PDP says. There may be other cases - do we need
   to have layers or profiles? In the context of OAuth and the step up RFC,
   would be nice to receive DENY plus what you need to do to ask for access.
   Also, some apps will want to know what user can do (admin button, transfer
   limit, etc). Need to create different APIs or ways to layer in this
   functionality.
   - Atul: It’s been a while since we first shared the doc, so I can do an
   overview of the doc on the next call to summarize the existing spec - all
   agree

<https://hackmd.io/@oidf-wg-authzen/wg-meeting-20231114#Reviewedclosed-issues>Reviewed/closed
issues

   - #51 “Subject Lookup Query”
   - #49 rename “Resource Query” -> “Resource Lookup Query”

<https://hackmd.io/@oidf-wg-authzen/wg-meeting-20231114#Useful-links>Useful
links

   - GitHub issues list: https://github.com/openid/authzen/issues
   - Draft authorization API: https://openid.github.io/authzen/
   - Draft use cases document:
   https://docs.google.com/document/d/1pOoqKkPgM_VNOfeB6wNSK_H2C--iZeIxR0DHKzeT3rI/edit#heading=h.c6l7q38c1zpl
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs-authzen/attachments/20231115/e5d08155/attachment-0001.html>


More information about the Openid-specs-authzen mailing list