[Openid-specs-authzen] Open issues and PRs

David Brossard david.brossard at gmail.com
Tue Aug 19 09:28:35 UTC 2025


Already fixed it: https://github.com/openid/authzen/pull/356

On Tue, Aug 19, 2025 at 11:27 AM Lombardo, Jeff <jeffsec at amazon.com> wrote:

> I know where it is.
>
>
>
> Leave me 5 minutes.
>
>
>
> *Jean-François “Jeff” Lombardo* | Amazon Web Services
>
>
>
> Architecte Principal de Solutions, Spécialiste de Sécurité
> Principal Solution Architect, Security Specialist
> Montréal, Canada
>
> ( +1 514 778 5565
>
> *Commentaires à propos de notre échange? **Exprimez-vous **ici*
> <https://urldefense.com/v3/__https:/feedback.aws.amazon.com/?ea=jeffsec&fn=Jean*20Francois&ln=Lombardo__;JQ!!Pe07N362zA!0k9CkAV8Djpw_8EfIAKrbhP3TQrJr0oMnznlUgBJ3V3NoEk6hihx7dNHnQuejn6SSH2CP8Iow3G-tTzppHeg$>
> *.*
>
>
>
> *Thoughts on our interaction? Provide feedback **here*
> <https://urldefense.com/v3/__https:/feedback.aws.amazon.com/?ea=jeffsec&fn=Jean*20Francois&ln=Lombardo__;JQ!!Pe07N362zA!0k9CkAV8Djpw_8EfIAKrbhP3TQrJr0oMnznlUgBJ3V3NoEk6hihx7dNHnQuejn6SSH2CP8Iow3G-tTzppHeg$>
> *.*
>
>
>
> *From:* David Brossard <david.brossard at gmail.com>
> *Sent:* August 19, 2025 11:24 AM
> *To:* Lombardo, Jeff <jeffsec at amazon.com>
> *Cc:* AuthZEN Working Group List <openid-specs-authzen at lists.openid.net>
> *Subject:* RE: [EXT] [Openid-specs-authzen] Open issues and PRs
>
>
>
> *CAUTION*: This email originated from outside of the organization. Do not
> click links or open attachments unless you can confirm the sender and know
> the content is safe.
>
>
>
> *AVERTISSEMENT*: Ce courrier électronique provient d’un expéditeur
> externe. Ne cliquez sur aucun lien et n’ouvrez aucune pièce jointe si vous
> ne pouvez pas confirmer l’identité de l’expéditeur et si vous n’êtes pas
> certain que le contenu ne présente aucun risque.
>
>
>
> I'll have to check the metadata section - we have a duplicate HTML anchor
> ID which is breaking the build process.
>
>
>
> /home/runner/work/authzen/authzen/api/authorization-api-1_0.xml(2033):
> Warning: Duplicate xsd:ID attribute anchor="iana-wk-registry" found.  This
> will cause validation failure.
> api/authorization-api-1_0.xml(2033): Error: Invalid attribute anchor for
> element section, at /rfc/middle/section[14]/section[3]
> /home/runner/work/authzen/authzen/api/authorization-api-1_0.xml(15):
> Error: Invalid document before running preptool.
> Unable to complete processing api/authorization-api-1_0.xml
> Error: Process completed with exit code 1.
>
>
>
> On Tue, Aug 19, 2025 at 11:13 AM Lombardo, Jeff <jeffsec at amazon.com>
> wrote:
>
> Hi,
>
>
>
> I took action on the two items under my name:
>
>    - Gerry will check the status of issue 300
>    <https://github.com/openid/authzen/issues/300>. Jeff L., you were
>    working on it.
>
>
>    - Updated the proposal for metadata
>       - Pushed a new PR:
>
>
>    - Decision: Preserved the usage of the iss metadata document parameter.
>
>
>    - Rationale:
>
>
>    - iss is only required is signature of metadata is enforced by the PDP
>                - Preserving the same taxonomy allows convergence with
>                OAuth2 Protected Resource Metadata RFC
>                - iss (issuer) is pointing to the entity ensuring the
>                metadata anti-tampering protection by exposing the JWKS there. While the
>                iss might point to the PDP server itself, it is not
>                mandatory as the function of acting as PDP and signing metadata can be
>                provided by two different components
>                - Therefore iss does not provide any confusion with the
>                notion of PDP even if coming from the OAuth2 world
>                - Doing otherwise would have AuthZEN having to declare new
>                attribute to IANA
>
>
>    - Added the capabilities metadata document field
>          - Added the declaration of the associated IANA registry
>
>
>    - Jeff, we need clarification on issue 268
>    <https://github.com/openid/authzen/issues/268> re. authentication.
>
>
>    - While it was pretty clear from the beginning that this was not a
>       proposal to make authentication mandatory, I added a new statement in #268
>       and the associated PR
>       - To answer the comments:
>
>
>    - Realm is notion defined by HTTP when using a response header of
>          format WWW-Authenticate. There is nothing new, nothing fancy.
>          - There is no typo (double checked with 2 other spelling tools)
>          - the only MUST is that a 401 has to be returned
>          - Any other information is covered by a SHOULD already
>          - If one does not one authentication, then the initial if makes
>          it sure that the conditions does not apply cause, when no authentication is
>          required, there are no ways you can provide a bad credential, a bad
>          authentication scheme, nor a bad authentication proof.
>
>
>    - Still the text as been updated to:
>
> If the protected resource request does not include the *proper* authentication
> credentials, does not contain an the proper the correct authentication
> scheme, or does not have a valid authentication scheme proof that enables
> access to the protected resource, the resource server MUST respond with a
> 401 HTTP code and SHOULD include the HTTP "WWW-Authenticate" response
> header field; it MAY include it in response to other conditions as well.
> The "WWW-Authenticate" header field uses the framework defined by HTTP/1.1
> [RFC2617] and indicate the expected auth-scheme as long as the realm that
> has authority for it.
>
>
>
> Jeff
>
>
>
> *Jean-François “Jeff” Lombardo* | Amazon Web Services
>
>
>
> Architecte Principal de Solutions, Spécialiste de Sécurité
> Principal Solution Architect, Security Specialist
> Montréal, Canada
>
> ( +1 514 778 5565
>
> *Commentaires à propos de notre échange? **Exprimez-vous **ici*
> <https://urldefense.com/v3/__https:/feedback.aws.amazon.com/?ea=jeffsec&fn=Jean*20Francois&ln=Lombardo__;JQ!!Pe07N362zA!0k9CkAV8Djpw_8EfIAKrbhP3TQrJr0oMnznlUgBJ3V3NoEk6hihx7dNHnQuejn6SSH2CP8Iow3G-tTzppHeg$>
> *.*
>
>
>
> *Thoughts on our interaction? Provide feedback **here*
> <https://urldefense.com/v3/__https:/feedback.aws.amazon.com/?ea=jeffsec&fn=Jean*20Francois&ln=Lombardo__;JQ!!Pe07N362zA!0k9CkAV8Djpw_8EfIAKrbhP3TQrJr0oMnznlUgBJ3V3NoEk6hihx7dNHnQuejn6SSH2CP8Iow3G-tTzppHeg$>
> *.*
>
>
>
> *From:* Openid-specs-authzen <
> openid-specs-authzen-bounces at lists.openid.net> *On Behalf Of *David
> Brossard via Openid-specs-authzen
> *Sent:* August 19, 2025 9:59 AM
> *To:* AuthZEN Working Group List <openid-specs-authzen at lists.openid.net>
> *Cc:* David Brossard <david.brossard at gmail.com>
> *Subject:* [EXT] [Openid-specs-authzen] Open issues and PRs
>
>
>
> *CAUTION*: This email originated from outside of the organization. Do not
> click links or open attachments unless you can confirm the sender and know
> the content is safe.
>
>
>
> *AVERTISSEMENT*: Ce courrier électronique provient d’un expéditeur
> externe. Ne cliquez sur aucun lien et n’ouvrez aucune pièce jointe si vous
> ne pouvez pas confirmer l’identité de l’expéditeur et si vous n’êtes pas
> certain que le contenu ne présente aucun risque.
>
>
>
> Dear all,
>
>
>
> We still have 11 issues <https://github.com/openid/authzen/issues/> and 2 pull
> requests <https://github.com/openid/authzen/pulls> open on the
> specification draft. In order to move forward to final spec, we need to
> close these out.
>
>
>
>    - Issue 352 (Michiel) deals with normative HTTP binding paths. I
>    remember early on Omri wanting to formalize the structure of the URLs
>    (/access/v1/evaluation) but the current draft
>    <https://openid.github.io/authzen/> doesn't make any mention of
>    mandatory or normative URLs. In addition, the fact we introduced the
>    metadata endpoint negates the need for normative URLs formats. The only
>    necessary endpoint becomes the metadata endpoint. Given this, Michiel
>    pointed out (and I agree) we probably need to make the metadata endpoint
>    mandatory to be conformant. Today, it's optional.
>
>
>    - If there are no objections, we will therefore close this issue i.e.
>       not make any runtime paths normative
>       - We will make the metadata API path normative
>       - We will make the metadata API mandatory
>
>
>    - Issue 339 is easy to fix: we write 4-tuple in cases when in fact it
>    can be a 3-tuple or an n-tuple. We should just reword to avoid a specific
>    number. I assigned Alex but he's on PTO. Any takers for the fix?
>    - Issue 325 <https://github.com/openid/authzen/issues/325> is
>    outstanding. It has to do with pagination methods. It needs to be wrapped
>
>
>    - Also, pagination is defined in no less than 3 sections (8.3.1,
>       9.3.1, and 10.3.1). They need to be abstracted away. We will use the same
>       pagination method for all API endpoints so no need to rewrite 3 times and
>       risk inconsistencies. Alex B., you were working on this. Do you have time
>       to fix it?
>
>
>    - Gerry will check the status of issue 300
>    <https://github.com/openid/authzen/issues/300>. Jeff L., you were
>    working on it.
>    - Jeff, we need clarification on issue 268
>    <https://github.com/openid/authzen/issues/268> re. authentication.
>    - We need to agree to punt issue 250
>    <https://github.com/openid/authzen/issues/250> to after the 1.0 spec.
>    Or punt the entire Evaluations semantics to after 1.0
>    -  Issues 230 <https://github.com/openid/authzen/issues/230>and 229
>    need work. Roland, this was your baby. We can choose to punt it to after
>    1.0 as well.
>    - Issue 55 <https://github.com/openid/authzen/issues/55>: Elie, can
>    you add a proposal?
>    - Issue 47 <https://github.com/openid/authzen/issues/47> should be
>    rejected given the extensive rewrites
>    - The same applies to 46.
>
>
>
> Thanks all for reading,
>
> David
>
>
>
> --
>
> ---
> David Brossard
> http://www.linkedin.com/in/davidbrossard
> http://twitter.com/davidjbrossard
> http://about.me/brossard
> ---
> Stay safe on the Internet: IC3 Prevention Tips
> <https://www.capefearnetworks.com/wp-content/uploads/2017/05/Internet-Fraud-Prevention-Tips-IC3.pdf>
> Prenez vos précautions sur Internet:
> https://cyber.gouv.fr/bonnes-pratiques-protegez-vous
>
>
>
>
> --
>
> ---
> David Brossard
> http://www.linkedin.com/in/davidbrossard
> http://twitter.com/davidjbrossard
> http://about.me/brossard
> ---
> Stay safe on the Internet: IC3 Prevention Tips
> <https://www.capefearnetworks.com/wp-content/uploads/2017/05/Internet-Fraud-Prevention-Tips-IC3.pdf>
> Prenez vos précautions sur Internet:
> https://cyber.gouv.fr/bonnes-pratiques-protegez-vous
>


-- 
---
David Brossard
http://www.linkedin.com/in/davidbrossard
http://twitter.com/davidjbrossard
http://about.me/brossard
---
Stay safe on the Internet: IC3 Prevention Tips
<https://www.capefearnetworks.com/wp-content/uploads/2017/05/Internet-Fraud-Prevention-Tips-IC3.pdf>
Prenez vos précautions sur Internet:
https://cyber.gouv.fr/bonnes-pratiques-protegez-vous
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs-authzen/attachments/20250819/f3a9a904/attachment-0001.htm>


More information about the Openid-specs-authzen mailing list