[Openid-specs-risc] Call notes - and a call to action
Atul Tulshibagwale
atul at sgnl.ai
Tue Jan 9 19:33:11 UTC 2024
Hi all,
Here are the call notes from today's call - thanks to Shayne for taking
these notes. They are also stored here
<https://hackmd.io/@oidf-wg-sse/wg-meeting-20240109>.
One question I would like to draw everyone's attention to is whether they
are in favor of appointing the following two as co-chairs:
- Shayne Miel (Cisco) - who has contributed extensively to the SSF ID-2
spec
- Sean O'Dell (Disney) - who has implemented SSF / CAEP internally at
Disney and has been active on the WG calls recently
Please respond by email to one of the current co-chairs (Tim or me) with
your thoughts.
Thanks,
Atul
--
<https://sgnl.ai>
Atul Tulshibagwale
CTO
<https://linkedin.com/in/tulshi> <https://twitter.com/zirotrust>
<atul at sgnl.ai>
--
WG Meeting: 2024-01-09
<https://hackmd.io/sM1Fd_WDSWaSfRepSh20Xw?view#Agenda>Agenda
- New co-chairs
- Interoperability meetings
- Apoorva’s Interoperability spec PR
<https://github.com/openid/sharedsignals/pull/134>
- Opaque format PR <https://github.com/openid/sharedsignals/pull/137>
<https://hackmd.io/sM1Fd_WDSWaSfRepSh20Xw?view#Attendees>Attendees
- Atul Tulshibagwale (SGNL)
- Apoorva Deshpande (Okta)
- Tom Sato (VeriClouds)
- Shayne Miel (Cisco)
- Peter Travers (MongoDB)
- Mike Kiser (SailPoint)
- Stan Bounev (VeriClouds)
- Sean O’Dell (Disney)
<https://hackmd.io/sM1Fd_WDSWaSfRepSh20Xw?view#Notes>Notes
<https://hackmd.io/sM1Fd_WDSWaSfRepSh20Xw?view#Apoorva%E2%80%99s-Interoperability-spec-PR>Apoorva’s
Interoperability spec PR <https://github.com/openid/sharedsignals/pull/134>
- Apoorva: Adds details about how OAuth will be helpful
- Apoorva: Details around the scopes, TLS version, flows
- Shayne: Downplay how much the interop is “about” OAuth, as per Atul’s
feedback
- Atul: Instead of saying this is a profile of OAuth, let’s say this
specifies a profile of an OAuth server when used with an SSF Transmitter
<https://hackmd.io/sM1Fd_WDSWaSfRepSh20Xw?view#Opaque-format-PR>Opaque
format PR <https://github.com/openid/sharedsignals/pull/137>
- Shayne: If we want verification events, we must provide opaque ID
subjects for the stream ID
- Apoorva: Can we specify that we *only* support opaque for the
verification event?
<https://hackmd.io/sM1Fd_WDSWaSfRepSh20Xw?view#New-co-chairs>[New co-chairs]
- Atul: We’ve asked Anabelle to step down and she has agreed
- Atul: Shayne Miel and Sean O’Dell are interested in stepping up as
co-chairs
- Atul: We’ll send out an email about proposal and next meeting make it
official
- Apoorva: Do co-chairs need to be limited to a single working group?
- Atul: That’s a question for Gail
<https://hackmd.io/sM1Fd_WDSWaSfRepSh20Xw?view#Interoperability-meetings>[Interoperability
meetings]
- Atul: Interest from Cisco (Duo), Cisco (Webex), Okta, SGNL,
VeriClouds, SailPoint, Disney
- Atul: We need to agree what are the use cases
- Atul: Need to identify what changes need to be made to the interop spec
- Atul: Propose 30 min every week to work on interop (first 30 min of
standard biweekly meeting and an additional 30 minutes on off-weeks)
- Mike: What are the details of the event?
- Atul: Gartner providing venue, there is a session (Atul is speaker),
Gartner is providing a room where implementors can demo their Transmitters
and Receivers
- Atul: Implementations do not have to be production code. Prototypes
are ok
- Apoorva: What should we do about versions for CAEP?
<https://hackmd.io/sM1Fd_WDSWaSfRepSh20Xw?view#Use-Cases>[Use Cases]
- Stan: When promoting SSF/CAEP/RISC, it would help to know the use cases
- Stan: We want to move from just the events to a full end-to-end use
case. Tell a story about an org that wants to increase security and how
these tools can make that easier.
- Atul: All of the events are about security, but the use case varies
from event to event and company to company.
- Atul: Agree that we do need to have these end-to-end use cases on the
SSF website.
- Stan: We can share the use cases we are building around.
- Sean: Use cases have been golden for us
- Shayne: Do we want to add info about why SSF is important here, in
terms of re-usability etc
- Sean: Yes, and the openness of the standard
- Stan: Are we doing something secure when transmitting these
potentially sensitive events?
- Sean: If it is internal within your company, a signed JWT is fine. If
it is external it should be a JWE. But then you have to swap certificates,
etc. It also depends on how sensitive the data in the event is.
- Stan: Thoughts about using CAEP for CIAM use cases?
- Sean: Assume you subscribe to a streaming service. Whenever it seems
like someone has logged into your account, they sign you out of everything.
But with SSF we could use Session-Revoked with a device identifier and only
log you out of specific devices. This does 2 things: lets your user know
you care and lets you collect feedback from users about false positives
<https://hackmd.io/sM1Fd_WDSWaSfRepSh20Xw?view#Tokyo-OpenID-event>[Tokyo
OpenID event]
- Tom: Next Thursday there is an OpenID hybrid workshop in Tokyo. We’ll
be there giving an overview of SSF and what VeriClouds has been working on.
- Tom: On Friday, the OpenID Japan summit. More than 300 people
attending. FIDO did a large meeting last month. At the summit, Tom will be
talking about SSF, including info about the interop event.
<https://hackmd.io/sM1Fd_WDSWaSfRepSh20Xw?view#Action-Items>Action Items
- Shayne: Update Opaque PR to limit to verification event only
- Apoorva: Add versioning info re: CAEP to the interop spec
- Stan/Sean: Add use cases to repo
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs-risc/attachments/20240109/e8dee5b7/attachment-0001.html>
More information about the Openid-specs-risc
mailing list