[Openid-specs-risc] Call notes
Atul Tulshibagwale
atul at sgnl.ai
Tue Apr 19 17:50:56 UTC 2022
Hi all,
Here are today's call notes, also stored here
<https://hackmd.io/@oidf-wg-sse/wg-meeting-20220419>.
WG Meeting: 2022-04-19
<https://hackmd.io/@oidf-wg-sse/wg-meeting-20220419#Agenda>Agenda
- Intros and Reintros
- Gail & OIDF Workshop at IIW
- Quick Overview: HackMD
- Token revocation use case {Tim}
- Complex subject into its own spec? {Tim}
- eKYC use case for Token Claims Change {Tim}
- RISC draft review period {Atul}
<https://hackmd.io/@oidf-wg-sse/wg-meeting-20220419#Attendees>Attendees
- Atul Tulshibagwale (SGNL)
- Tim Cappalli (Microsoft)
- Monty Wiseman ()
- Nancy Cam Winget (Cisco)
- Gail Hodges (OpenID Foundation)
- Asad Ali (Thales)
- Tom Sato (VeriClouds)
- Frank Taylor (VMWare)
<https://hackmd.io/@oidf-wg-sse/wg-meeting-20220419#Notes>Notes
<https://hackmd.io/@oidf-wg-sse/wg-meeting-20220419#OIDF-Workshop-at-IIW>OIDF
Workshop at IIW
Key Message to share with the workshop group
- Refresher on SSE and its activities
- Use cases
- Plans for the rest of the year
Token Revocation Talk
- Could token revocation be a separate event?
Sushi Dinner hosted by VeriClouds / Tom Sato!
- Message Tom if you would like to go
- Sunday night
<https://hackmd.io/@oidf-wg-sse/wg-meeting-20220419#HackMD>HackMD
- Any feedback on HackMD?
<https://hackmd.io/@oidf-wg-sse/wg-meeting-20220419#Token-Revocation-Use-Case>Token
Revocation Use Case
-
Add event named “token-revoked”, contains the SAML assertion Id or “jti”
claim
-
What other fields should be included
-
The only other mechanism that exists is the OAuth token revocation spec,
which has some limimtations
-
What about similar other use cases: step-up and SCIM updates? Those seem
unrelated, becuase they are prescriptive and not descriptive
-
Token revocation could be “this is an action that has occured, and you
can do what you want with it”. The SCIM event could be similar
-
Are there best practice issues with conflating SCIM provisioning with
SSE updates?
-
The SSE event could be an observation that “there is a group membership
change”
-
Having a SCIM receiver ignore SSE notifications could be disastrous
-
Consumers other than IdPs or IAMs could use the SSE updates
-
Two peers may use SCIM for different purposes. One could be IdP, but
another could be serving other functions beyond IdP and IAM (e.g. SaaS
provider, vulnerability assessor)
-
We can define the intent and usage, but actual implementations may use
the same protocol features in other ways
-
CAEP is currently descriptive: A recipient can do anything they want
-
How is a “token revocation” different from a “session revocation”:
- Not all relying parties treat the IdP’s view of the world as far as
sessions is concerned, whereas a token revocation would mean the
recipient
should revoke all sessions associate with the token
- Currently, there is scope for ambiguity, so a tageted event for
token revocation would be good to remove such ambiguity
- Receiver of the event may not be an IdP
-
We need more discussion on other events (step up may already be present,
SCIM related event needs discussion)
<https://hackmd.io/@oidf-wg-sse/wg-meeting-20220419#Complex-Subjects-into-its-own-Spec>Complex
Subjects into its own Spec
- EKYC group wants to use the complex subject spec
- They initially created one big spec and split it out
- They are interested in splitting out the complex subject spec so that
they could reuse it
- Mutually beneficial
- Should keep the complex subject spec in OpenID for now
<https://hackmd.io/@oidf-wg-sse/wg-meeting-20220419#eKYC-group-interest-in-SSE>eKYC
group interest in SSE
- Use case: Pending verification. User signs-in, RP requests “verify X
claim”. Could they use SSE to notify the RP?
- It is a “token claims change”, but it deviates in that the current
event supports changing any claim in the token.
- The eKYC don’t want to send a new value in the event, but request the
RP to obtain a new token
- Can we add an additional optional flag to the event that has a value
“userInfo”, which requires the RP to go fetch the claims again
- Is this actually a “token claims change?”
- Separate use case: Could the “token claims change” event contain a new
ID Token that the RP can use
- We probably need to get the OIDC group’s views on this
- In person discussion at OSW and EIC (Berlin May 10-13)
- Is using the “token claims change” value with a claim that didn’t
previously exist in the token a legitimate use case? Yes, because you can
today send a token claims change event with new claims.
<https://hackmd.io/@oidf-wg-sse/wg-meeting-20220419#RISC-Review-Period>RISC
Review Period
- Reach out again to Mike Jones to start the review
<https://hackmd.io/@oidf-wg-sse/wg-meeting-20220419#Action-Items>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs-risc/attachments/20220419/fb3f6ba0/attachment-0001.html>
More information about the Openid-specs-risc
mailing list