[Openid-specs-risc] Notes from today's call

Atul Tulshibagwale atul at sgnl.ai
Tue Jul 11 18:29:00 UTC 2023


Hi all,
Here are the notes from today's meeting. They are also stored here
<https://hackmd.io/@oidf-wg-sse/wg-meeting-20230711>.

Atul

-- 

<https://sgnl.ai>

Atul Tulshibagwale

CTO

<https://linkedin.com/in/tulshi> <https://twitter.com/zirotrust>
<atul at sgnl.ai>
WG Meeting: 2023-07-11
<https://hackmd.io/XtEW50GdRRir1mI-ZSC7uA?view#Agenda>Agenda

   - sub_id at the top level
   - -standardized scopes / authorization server endpoint Issue 74
   <https://github.com/openid/sharedsignals/issues/74>
   -

<https://hackmd.io/XtEW50GdRRir1mI-ZSC7uA?view#Attendees>Attendees

   - Atul Tulshibagwale (SGNL)
   - Mike Kiser (SailPoint)
   - Shayne Miel (Cisco)
   - Steve Venema (ForgeRock)
   - Apoorva Deshpande (Okta)
   - Tim Cappalli (Microsoft)
   - Phil Hunt (IndependentID)

<https://hackmd.io/XtEW50GdRRir1mI-ZSC7uA?view#Notes>Notes
<https://hackmd.io/XtEW50GdRRir1mI-ZSC7uA?view#sub_id-at-the-top-level>sub_id
at the top-level

[Phil]

   -

   SCIM Events spec doesn’t have to refer to SSF because it refers only to
   the “sub_id”
   -

   There may be scenarios where you need to keep the event payload
   confidential (no spec for that yet)
   -

   In CAEP / RISC you have subjects that are added or removed from the
   stream, so those can be the top-level “sub_id” claim, but other subject
   information (if needed) can be inside the event
   -

   [Steve] Could JWE cover the event payload encryption?
   -

   [Phil] It could be that the event has a claim that is JWE
   -

   [Steve] Sometime back we had talked about just using TLS, and not
   needing encryption in any use-case
   -

   [Phil] If we have a multi-hop environment, where you do not want to
   reveal the content of the event to intermediaries, then you may need
   encryption
   -

   [Steve] So the motivation seems to be scaling. Have any of the
   implementers on this call run into this issue?
   -

   [Phil] We just need to avoid getting into a situation where SSF is
   un-routable based on sub_ids
   -

   [Shayne] Do we have a way of doing this in a less “breaking” way, e.g.
   adding “sub_id” at the top-level in addition to being in the event?
   -

   [Tim] We need to make the change now, if we are thinking of it, because
   it will be harder to make the change later.
   -

   [Phil] Having duplicate information is OK for now, especially if we are
   going to deprecate on of them later
   -

   [Steve] We’d have to be very clear about which field takes priority
   -

   [Apoorva] The subject duplication is going to remain for some time due
   to existing implementations
   -

   [Steve] If people are already using “subject” in the event, and you are
   required to ignore any top-level claims that you don’t understand, then
   won’t it not break anything?
   -

   [Apoorva] If “sub_id” get included in the SSF spec, then won’t it be
   inconsistent with CAEP and RISC specs?
   -

   [Atul] The top-level claim will be “sub_id”, but the CAEP And RISC
   events reamin the same.
   -

   [Atul] We should just remove the “required subject field in every event”
   language from the SSF spec
   -

   [Atul] Conclusion: Add sub_id at the top-level, keep “subject” in
   events, but note that such usage is deprecated for new events being defined.

<https://hackmd.io/XtEW50GdRRir1mI-ZSC7uA?view#Standardizing-scopes>Standardizing
scopes

   - [Apoorva] The current proposal is likely to break current
   implementations, so can we define it in a way that doesn’t break existing
   implementations, e.g. by putting the new information in top-level claims

  {
     "issuer":
       "https://tr.example.com",
     "jwks_uri":
       "https://tr.example.com/jwks.json",
     "delivery_methods_supported": [
       "urn:ietf:rfc:8935",
       "urn:ietf:rfc:8936",
     ],
     "configuration_endpoint": "https://tr.example.com/ssf/mgmt/stream"
     }
     "status_endpoint":
       "https://tr.example.com/ssf/mgmt/status",
     "add_subject_endpoint":
       "https://tr.example.com/ssf/mgmt/subject:add",
     "remove_subject_endpoint":
       "https://tr.example.com/ssf/mgmt/subject:remove",
     "verification_endpoint":
       "https://tr.example.com/ssf/mgmt/verification",
     "critical_subject_members": [ "tenant", "user" ]
     "supported_scopes": {
         "poll_endpoint": ["scope1", "scope2"],
         "status_endpoint": ["scope1"],
         "configuration_endpoint": ["scope3", "scope4"]
     },
     "authorization_servers": [
         { "scopes" : ["scope1", "scope2"],
        "servers" : [ "https://server1/.well-known",
"https://server2/.well-known"]
         }
         {
           "scopes" : ["scope3", "scope2"]
           "servers": ["https://server2/.well-known",
"https://server3/.well-known"]
         }
     ]
   }

<https://hackmd.io/XtEW50GdRRir1mI-ZSC7uA?view#Action-Items>Action Items

   - Atul to write drafts for both issues discussed today
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs-risc/attachments/20230711/665cc9ae/attachment-0001.html>


More information about the Openid-specs-risc mailing list