[Openid-specs-authzen] Notes from today's call
David Brossard
david.brossard at gmail.com
Tue Feb 18 20:09:12 UTC 2025
Also available here <https://hackmd.io/@oidf-wg-authzen/wg-meeting-20250218>
.
Meeting Notes 2025-02-18 <#Attendees>Attendees
- Roland Baum
- Budhaditya Bhattacharya (Budha) - Tyk
<#Agenda>Agenda
- Partial evaluation update (David B)
- Action Search (David H)
- Interop participation update (Omri)
- Security review process by OpenID Foundation (David B)
<#Notes>Notes <#Partial-Evaluation-Meeting>Partial Evaluation Meeting
- Vladi, Michiel, and David met to discuss the spec
- We received feedback from Pablo (Axiomatics)
- David to publish
- We need to generalize the function concept so we can allow for nested
functions (e.g. lower(stringEqual()))
- We agree to follow the AuthZEN request structure
- Only one unknown category
- What about context?
- We agree partial evaluation will be exposed on a separate endpoint
- We agreed we would have profiles to convert partial evaluation
responses into target system filters e.g. SQL, GraphQL…
- We agreed there would be an extension mechanism for functions not
supported by all vendors
- *Next step:* David to write the formal part of the partial evaluation
spec
<#Action-Search-Profile>Action Search Profile
- Presented by Dave Hyland
- https://hackmd.io/DQcL9fXfSW6EsxEp_DefRg?view
- Questions
- Are actions assumed to be flat? (George)
- Yes - there is generally no hierarchy
- Vladi: the action full access could include read and write
- Conclusion: the evaluation doesn't have any hierarchy.
- Should there be a context category in the request?
- Should the action category be removed?
<#Interop-Update>Interop Update
- 2 confirmed scenarios: the demo and the gateway
- 3 interop sessions with 5 slots (tables) each
- 10-15 slots
- about 8 people showing up
- 2 possible new PDPs: Okta OpenFGA and AWS AVP
- 4 gateway implementations: AWS API Gateway, Kong, Zuplo, Envoy.
- Tyk and WSO2 are likely gateways as are 42crunch and Layer 7
<#OpenID-Security-Review-Process>OpenID Security Review Process
- Gail has reached out to the chairs to talk about the testing process
of the AuthZEN spec as part of the steps to standardization.
- It sounds like this would require additional funding
- We're trying to understand what we need to do specifically
- Has anyone gone through this process previously?
- George: see FAPI's attacker model
<https://openid.net/specs/fapi-2_0-attacker-model-ID2.html>
- Are requests immutable? Can the PDP trust the request coming from
the PEP? Can the PDP trust the PEP to enforce the decision? Can
the PDP be
manipulated?
- The process is from the University of Stuttgart
- We need to identify the core threats we see in AuthZEN
<#Repository-Structure>Repository Structure
- The OpenID AuthZEN repository will contain the spec
- The AuthZEN github repository <https://github.com/authzen/> will
contain code
<#Next-Steps>Next Steps
- Dedicated partial evaluation meeting on Wednesday - see mailing list
for details
- Schedule Alex B's OSW presentation for a future call after the AuthZEN
interop
- David to follow up with Gail re. security testing
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs-authzen/attachments/20250218/c7d288b9/attachment.htm>
More information about the Openid-specs-authzen
mailing list