<div dir="ltr">The interop spec for the IdP scenario has been updated to include an example of how the "record" claim in the JWT should relate to the response payload from the AuthZEN resource search call.<div><br></div><div>See <a href="https://authzen-interop.net/docs/scenarios/idp/#expected-response">https://authzen-interop.net/docs/scenarios/idp/#expected-response</a></div><div><br></div></div><br><div class="gmail_quote gmail_quote_container"><div dir="ltr" class="gmail_attr">On Thu, Nov 20, 2025 at 11:22 AM gerry gebel via Openid-specs-authzen <<a href="mailto:openid-specs-authzen@lists.openid.net">openid-specs-authzen@lists.openid.net</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div dir="ltr"><h2 id="m_-7121566683295434511gmail-Attendees" style="color:rgb(0,0,0)">Attendees</h2><ul style="color:rgb(0,0,0)"><li>Jonas Iggbom</li><li>Julio Auto De Medeiros</li><li>Gerry Gebel</li><li>Omri Gazitt</li><li>Dave Hyland</li><li>Jeff Lombardo</li></ul><h2 id="m_-7121566683295434511gmail-Agenda" style="color:rgb(0,0,0)"><a href="#m_-7121566683295434511_Agenda" title="Agenda"><span></span></a>Agenda</h2><ul style="color:rgb(0,0,0)"><li>Draft05 published - does not change the 60 day review process</li><li>Gartner interop: latest integrations and on-site logistics</li></ul><h2 id="m_-7121566683295434511gmail-Notes" style="color:rgb(0,0,0)"><a href="#m_-7121566683295434511_Notes" title="Notes"><span></span></a>Notes</h2><ul style="color:rgb(0,0,0)"><li>Draft05: New link published this week:<span> </span><a href="https://openid.net/specs/authorization-api-1_0-05.html" rel="noopener" target="_blank">https://openid.net/specs/authorization-api-1_0-05.html</a><ul><li>The 60 review period is not impacted by this latest change</li></ul></li><li>Gartner interop:<ul><li>IDPs added: Duende. Others known to be in progress: Keycloak, Ping, Thales and EmpowerID</li><li>PDPs added: SGNL and WSO2</li><li>Slight technical issue with implementations: The handling of the result and placing that data in the token is not consistent. We recommend that all implementations follow the example set by the Auth0 implementation by just using the array in the response and populating the token with that</li><li>On site logistics<ul><li>Overview session:<ul><li>Tuesday Dec 9, 10:30-11:00</li></ul></li><li>Interop sessions (Austin 1):<ul><li>Tuesday Dec 9: 12:00-12:30, 2:00-2:30 & 3:45-4:15</li><li>Wednesday Dec 10: 10:30-11:00 & 12:00-12:30</li><li><a href="https://www.gartner.com/en/conferences/na/identity-access-management-us/sessions?Track=866079551&Topic=632634010&Day=Day-2,Day-3" rel="noopener" target="_blank">https://www.gartner.com/en/conferences/na/identity-access-management-us/sessions?Track=866079551&Topic=632634010&Day=Day-2,Day-3</a></li></ul></li></ul></li></ul></li><li>Other: Call next week is cancelled (holiday in the US)</li></ul></div>
-- <br>
Openid-specs-authzen mailing list<br>
<a href="mailto:Openid-specs-authzen@lists.openid.net" target="_blank">Openid-specs-authzen@lists.openid.net</a><br>
<a href="https://lists.openid.net/mailman/listinfo/openid-specs-authzen" rel="noreferrer" target="_blank">https://lists.openid.net/mailman/listinfo/openid-specs-authzen</a><br>
</blockquote></div>