1F/ OpenID Connect Credential Provider
OpenID Credential Provider
Tuesday 1F
Convener: Tobias Looker
Notes-taker(s): Lionello Lunesu
Tags for the session - technology discussed/ideas considered:
OpenID Connect, Credential https://mattrglobal.github.io/oidc-client-bound-assertions-spec/
Discussion notes, key understandings, outstanding questions, observations, and, if appropriate to this discussion: action items, next steps:
Extension to the OpenID Connect Core spec
New scope: “openid_credential”
Adds “sub_jwk” and/or “did” to request object = used to sign the request object and the public key to be used for the response
Adds “credential” to the request object “claims” (in addition to “userinfo” and “id_token”)
Discussions around having both/either “sub_jwk” vs “did”
Using the “did” as the “kid” inside “sub_jwk”?
New OpenID Discovery fields: “dids_supported”, “did_methods_supported”, “credential_supported”, “credential_format_supported”
Question around necessity of having new scope, new “credential” response
Zoom chat:
From Lio Lunesu : OK if I take some notes in the google form?
From Wayne Chang : No apologies necessary, I prefer ascii art!!
From Orie Steele : Can we get w3cvc-jsonld -> w3c-vc-jsonld :)
From Dmitri Zagidulin : and waste an extra character??
From Dmitri Zagidulin : think of the bandwidth and/or the children!
From Nat Sakimura : It could be ephemeral as well.
From Wayne Chang : imo, it’s a different trust model between just using the included key vs. DID resolution
From Wayne Chang : specifically if you rely on sub_jwk then you are trusting the direct presenter, whilst with the DID you are trusting the DID method’s resolution process
From Dmitri Zagidulin : for an introduction to dpop - https://link.medium.com/B1c7jI94Jab
From Oliver Terbu : Well, you have to trust the authentication step in OIDC. I assume this can be anything from social login to a national eID scheme.
From Dmitri Zagidulin : tobias - this vc request spec syntax is fabulous. I’d love to unify/integrate it with the CCG vp-request-spec
From Oliver Terbu : The provider knows the user and issues a VC to the wallet
From Wayne Chang : https://openid.net/wg/ekyc-ida/
From Sascha Preibisch : I do not see a hands-up icon
From David Waite : in the participants list
From Wayne Chang : @sasha, you may need to open the participants list
From Xavier Vila : Click on participants button, From Wayne Chang : hah From Sascha Preibisch : thanks
From Wayne Chang : https://xkcd.com/927/ <- glad we’re moving to prevent this
From Nat Sakimura : FYI: eKYC/IDA WG product that Wayne mentioned: https://bitbucket.org/openid/ekyc-ida/src/master/openid-connect-4-identity-assurance.md
From Orie Steele : Massive ID tokens
From Orie Steele : Nested base64url is one of my least favorite things
From Lio Lunesu : :D
From Nat Sakimura : What Lio talked about is called distributed claims.
From Lio Lunesu : correct From Nat Sakimura : It is like “claims by reference”. It is got many nice characteristics if you are not concerned about the RP anonymity towards the CP.
From Vittorio Bertocci : it seems what yu want is response_type; scope isn't really the right place
From Sascha Preibisch : That comes close, yes
From Wayne Chang : +1 to embedding things as a workable path
From Orie Steele : I think its more likely That DIF PE would offer this as a channel
From Wayne Chang : Just need to be super explicit about the layers of trust here and how they’re transversed by different pieces
From Vittorio Bertocci : did I read "auth0" in the URL? :)
From Oliver Terbu : haha
From Orie Steele : yep
From Nat Sakimura : bit.ly/3jhuRF6
From Orie Steele : userinfo seems like maybe a better place
From Orie Steele : But then the id_token still needs to be updated in some way I think.
From Wayne Chang : Without getting too ahead of ourselves, I feel that a keycloak module would be a powerful demonstration for this
From Lio Lunesu : Please, folks, check and add to the notes
From Orie Steele : “Use the protocol features, don’t overload unless you are forced to"
From Lio Lunesu : The notes I took might be biased to things I noted
From Dmitri Zagidulin : @Lio - do you have a link to the notes?
From Lio Lunesu : It’s in the qiqo, click on Session 1F On top
From Dmitri Zagidulin : thx
From Oliver Terbu : OIDC CP = issuance flow
From Alec Laws : Thanks! Very interesting
From Richard Astley : Thanks Tobias, great session.
From Thomas (Evidence) : Thanks ! Was very nice !
From Wayne Chang : tyty; Great stuff