[OpenID-Specs-eKYC-IDA] Fwd: Identity Assurance deployment in DENIC's testbed
Marcos Sanz
sanz at denic.de
Thu Apr 23 05:45:46 UTC 2020
Sorry for duplicates, I thought this might be of interest for the group.
(And if you are aware of any other implementations, don't forget to add
them to https://bitbucket.org/openid/ekyc-ida/wiki/Implementations)
Best regards,
Marcos
-------- Mensaje reenviado --------
Asunto: Identity Assurance deployment in DENIC's testbed
Fecha: Wed, 22 Apr 2020 22:11:16 +0200
De: Marcos Sanz <sanz at denic.de>
Organización: DENIC eG
Para: technical_wg at lists.ID4me.org <technical_wg at lists.ID4me.org>
Hi all,
I am happy of making publicly available the results of DENIC's last two
months of work in this area: our test environment supports the newest
OIDF specification, OpenID Connect for Identity Assurance (IA) 1.0,
fruit of the efforts of OpenID Foundation eKYC&IA working group.
The IA specification is about to finish the second public review period
https://openid.net/2020/03/24/second-public-review-period-for-openid-connect-for-identity-assurance-specification-started/
and will probably reach afterwards the status of Second Implementer's
Draft. That being said, it is already today that we believe it has
reached a level of maturity allowing for immediate deployment. DENIC has
been supporting and contributing to this specification since its
inception. We now think that the additional offer of a sandbox IdP
service with open client registration will allow for interoperability
tests, which will further foster the standard.
DENIC's test environment (iss = https://id.test.denic.de) allows for
free self-registration of identifiers at https://id.test.denic.de/signup
After registration, you'll be prompted to store claims about that
identity for test purposes. And then, any RP is ready to go and query
them by means of the new IA standard! You can later change claim values
(among other things) at the user dashboard:
https://id.test.denic.de/dashboard
Please bear in mind: the IA specification deals explicitly with verified
claims. However, and due to the nature of the testbed (which makes use
of self-attestation, s. further up) delivered data actually undergoes no
verification at all. Thus, these data are NOT VERIFIED and output of
this IdP cannot be used for any production purposes whatsoever.
And finally one small technical detail: The Trust Framework parameter in
the auth requests is currently being ignored by our test IdP. We are
having internal discussions as to how to deal with it. We most probably
will define a proprietary framework identifier to move on until we align
our processes and data to a normative trust framework.
Definition of a trust framework is anyway ongoing work at the ID4me
association and you'll soon also hear from it.
Best regards,
Marcos
More information about the Openid-specs-ekyc-ida
mailing list