oidc-deploy - Re: [oidcre] Slides from October 22 OIDF meeting at VMware
Subject: OIDC Deployment Working Group
List archive
- From: Andreas Solberg <>
- To: "" <>
- Cc: Nick Roy <>, "" <>, "" <>
- Subject: Re: [oidcre] Slides from October 22 OIDF meeting at VMware
- Date: Tue, 23 Oct 2018 15:44:57 +0000
- Accept-language: nb-NO, en-US
- Authentication-results: spf=none (sender IP is ) ;
- Ironport-phdr: 9a23:6LPbfx9GSPpaf/9uRHKM819IXTAuvvDOBiVQ1KB+0+8VIJqq85mqBkHD//Il1AaPAd2Eraocw8Pt8InYEVQa5piAtH1QOLdtbDQizfssogo7HcSeAlf6JvO5JwYzHcBFSUM3tyrjaRsdF8nxfUDdrWOv5jAOBBr/KRB1JuPoEYLOksi7ze+/94HRbglSmDaxfa55IQmrownWqsQYm5ZpJLwryhvOrHtIeuBWyn1tKFmOgRvy5dq+8YB6/ShItP0v68BPUaPhf6QlVrNYFygpM3o05MLwqxbOSxaE62YGXWUXlhpIBBXF7A3/U5zsvCb2qvZx1S+HNsDtU7s6RSqt4LtqSB/wiScIKTg58H3MisdtiK5XuQ+tqwBjz4LRZoyeKfhwcb7Hfd4CRWRPQNtfVzBPDI2/YYsADesBMvpXoITmvVQCsR6+CBOwCO/z1DNFgGL9060g0+QmFAHLxBAtH9QTv3TOstr6LrwSWv2owqnPyTXMdO1Z2S3y6IPVdR0uu/eMUq9qccXP00YvDBnJjk6XqYzhJDyayP4Ns2eA4up9U+KvimgnpB9tojiz3MssjI7Ji5sTx1vZ+yt5x4M1Kse5SE59edOkF4NQuD+cN4t3X8wuWWdotzgmyrAApJW1fzAKxYwoyhLDcfCLbpSE7xD5WOuROzt0mW5pdb2nixqs7USs1vDwW8y23VpWsiZIl8TAu3UQ2xDO98SKT/hw8lqg1DuL0g3e6f9LIU40mKfeMJEt3qA8m58OvkTNAiP5gl36jKGIeUgn5uSl7uHqb7fpq5KfLYB5jwHzMqosl8ChBOk0LAYDU3aG9em5z7Ls4VD1TKhMg/YriKfWqoraKt4epqOhAw9azIIj6xGnAjmp3tsWgWULIVxcdB2IgIblJkjCIPfjAvihmVislyprx+zdMb3mH5XNKGXMnK35fbZn7E5c1BQ8wsxD55JVDbEBJuj/WkjstNzECh85NAu0w+X9BNph0YMeXHqDAq6fMKzMrV+F/u0iL/WWaIMIpDrwKeIp6v70gXMkhVMQcrGl3Z4NZ3C5GvRmLV+ZYX3pgtoZC2gKuBcxTPb0h1KYSj5ffW2yX6U45j4gFo2mF4jDS5uwgLyH3Se7GINZZnxaClyWF3focJ2IW+0QZyKKPs9hjjsEWKCgS48nyR6uswr6y79gLurS4CEYsojj1Nds6+3UlBE96CB7A92A3G6TV2F0mmQIRj8t0aB7oEx90UuD0bNmj/BCFNxT4e9JXRkgNZ7a0eN6F87+VhjfcdiUVVb1CumhVHs2T9462dImZ0dmB87klB3N0iaxRbgPmPbDUJs1/qnG0lD1Jt1h0DDc2acsg0JgRdFAYz6InKl6oiHVC5TEml7RrKGuf6kG02aZ/WGP12eHpwdDVwp6XL/KdW0ZZ03bsci/4ESUHOzmMqguLgYUkZ3KEaBNcNC8yAweHK25at3Df2K8nXuxDh+Ux7SKKZDnYHgZwD6DWRofiw5G+3GAOEB+HSqnr2/ERB1WXVP0KwKJk6FlrW+jCEo9zgWEdUpkgrOz9gQYjOfaUPQX1L8etw88rTRyEUqhmdTRWJKN
- Spamdiagnosticmetadata: NSPM
- Spamdiagnosticoutput: 1:99
Great slides, Nick.
The OAuth federations mostly consists of placeholders in the latest -05 rewrite of the spec. I am very intestering in discussions on the OAuth federation part. I and Roland has mostly focused on making the OpenID part as complete as possible.
A base level support for OAuth federations is reasonable to be defined in the spec. Off course the Oauth federation base level profile needs to be extended in order to support all kind of various use cases and environments.
There is placeholders for spec-ing OAuth entities:
There already exists standards for OAuth metadata. We need to review these, and possibly extend these with federation related claims.
We also need a OAuth specific flow description, like what chapter 8 is for OpenID: https://openid.net/specs/openid-connect-federation-1_0.html#rfc.section.8
In this description, we need to decide how to resolve OAuth metadata from the API base URL (or similar), and discuss whether support client regsitration and symmetric credentials, like the one flow with OpenID and / or to rely on assymetric keys.
The Federation API entity listing is supposed to support basic discovery function. If you know a trust issuer, you can ask it for metadata for a specific type of entities, like Oauth resource servers. The same API can be used to list OpenID Providers
to list users institutions to choose from.
Even more interesting than OAuth, is the discussions that will make Oauth redundant, with a more robust trust framework there is no longer need to ask the oauth resource to authenticate the end user. The protected API may instead indicate which
trust roots it accepts for authenticated end users, and client may directly insteract with the OpenID Providers and gather the neccessary proof in order to access the protected protected resource. This may include a package of information that proofs the end
user identity (idtoken-ish JWT with API as audience, fetched from a token exchange service), an authorization statement and a user consent statement from a user consent service.
I would like to be able to setup API alllowing end user to store and fetch data, and to bring their own ID(provider). And the API would not be in charge of authenticating the end user, but still make sure that data cannot leaf between identities
from the different ID providers.
I would like to be able to setup an API accepting any client registrered by eduGAIN to fetch data from the norwegian SIS (student information system) with foreign guest students authenticated with eID in another country.
Andreas
|
- Slides from October 22 OIDF meeting at VMware, Nick Roy, 10/22/2018
- Re: Slides from October 22 OIDF meeting at VMware, Nick Roy, 10/22/2018
- Re: [oidcre] Slides from October 22 OIDF meeting at VMware, Mischa Salle, 10/23/2018
- Re: [oidcre] Slides from October 22 OIDF meeting at VMware, Andreas Solberg, 10/23/2018
- Re: [oidcre] Slides from October 22 OIDF meeting at VMware, Nick Roy, 10/29/2018
- Re: [oidcre] Slides from October 22 OIDF meeting at VMware, Maarten Kremers, 10/31/2018
- Re: Slides from October 22 OIDF meeting at VMware, Davide Vaghetti, 10/23/2018
- Re: Slides from October 22 OIDF meeting at VMware, Nick Roy, 10/24/2018
- Re: Slides from October 22 OIDF meeting at VMware, Nick Roy, 10/22/2018
Archive powered by MHonArc 2.6.19.