Skip to Content.
Sympa Menu

oidc-deploy - Re: [oidcre] Slides from October 22 OIDF meeting at VMware

Subject: OIDC Deployment Working Group

List archive

Re: [oidcre] Slides from October 22 OIDF meeting at VMware


Chronological Thread 
  • From: Andreas Solberg <>
  • To: "" <>
  • Cc: Nick Roy <>, "" <>, "" <>
  • Subject: Re: [oidcre] Slides from October 22 OIDF meeting at VMware
  • Date: Tue, 23 Oct 2018 15:44:57 +0000
  • Accept-language: nb-NO, en-US
  • Authentication-results: spf=none (sender IP is ) ;
  • Ironport-phdr: 9a23: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
  • Spamdiagnosticmetadata: NSPM
  • Spamdiagnosticoutput: 1:99

23. okt. 2018 kl. 00:50 skrev Nick Roy <>:

You may have noticed that I talked about API access as a use case in these slides. Torsten Lodderstedt noted that it seems like we need a federation of OAuth 2 Authorisation Servers, and would also need AS discovery, which is a need shared with the FAPI/banking work in the OIDF. He is interested in talking with us about these needs and figuring out if we can collaborate.

Great slides, Nick.

The OAuth federations mostly consists of placeholders in the latest -05 rewrite of the spec. I am very intestering in discussions on the OAuth federation part. I and Roland has mostly focused on making the OpenID part as complete as possible. A base level support for OAuth federations is reasonable to be defined in the spec. Off course the Oauth federation base level profile needs to be extended in order to support all kind of various use cases and environments.

There is placeholders for spec-ing OAuth entities:

There already exists standards for OAuth metadata. We need to review these, and possibly extend these with federation related claims.

We also need a OAuth specific flow description, like what chapter 8 is for OpenID: https://openid.net/specs/openid-connect-federation-1_0.html#rfc.section.8

In this description, we need to decide how to resolve OAuth metadata from the API base URL (or similar), and discuss whether support client regsitration and symmetric credentials, like the one flow with OpenID and / or to rely on assymetric keys.

The Federation API entity listing is supposed to support basic discovery function. If you know a trust issuer, you can ask it for metadata for a specific type of entities, like Oauth resource servers. The same API can be used to list OpenID Providers to list users institutions to choose from.

Even more interesting than OAuth, is the discussions that will make Oauth redundant, with a more robust trust framework there is no longer need to ask the oauth resource to authenticate the end user. The protected API may instead indicate which trust roots it accepts for authenticated end users, and client may directly insteract with the OpenID Providers and gather the neccessary proof in order to access the protected protected resource. This may include a package of information that proofs the end user identity (idtoken-ish JWT with API as audience, fetched from a token exchange service), an authorization statement and a user consent statement from a user consent service.

I would like to be able to setup API alllowing end user to store and fetch data, and to bring their own ID(provider). And the API would not be in charge of authenticating the end user, but still make sure that data cannot leaf between identities from the different ID providers.

I would like to be able to setup an API accepting any client registrered by eduGAIN to fetch data from the norwegian SIS (student information system) with foreign guest students authenticated with eID in another country.


Andreas



Archive powered by MHonArc 2.6.19.

Top of Page