-
Notifications
You must be signed in to change notification settings - Fork 5
[Additional feature] A more detailed "Entity Listing Response" #67
Comments
In https://openid.net/specs/openid-connect-core-1_0.html#StandardClaims we have also the claim "updated_at" |
The whole idea around Entity Listing is not very well worked out. Now, one of the things it brakes in the overall model of the specification is that the response is unprotected. |
I can understand well, we can optionally protect the endpoint with a self issued bearer token (private_key_jwt, rfc7523 ...) but this would be an option that we handle in the specs. Regarding the response, I'm ok for implementing a HTTP Response with Content-type application/jwt (jose) with a signature. regarding the response I'd have some proposals, and these comes with the following assumptions:
For this reason I'd add this parameter in the www-form-urlencoded if you agree
The response would be something like the following:
The JWT payload would be something like this
|
I'd like to see a very compelling use case before I support this. I'm not convinced we need it. |
Let's assume that:
The use case: Fed1.0 would be used, optionally, with a complementary way to do client registration. At this time we have automatic and implicit client registration and these are both dynamic registration mechanisms. There could be the need to approach a different client registration, completely "offline". An entity would fetch all the entities' metadata that it would register. Instead of taking all the defintions (as actually is in SAML2) it would have a way to know which one have been updated, iterating on these entities (id) it will do request to federation_api (operation=fetch). This approach would have a feedback in 9.1.1.2.1. Processing the Authentication Request, here
Introducing a way to deal with an offline client registration the OP could have a client id registered without doing a dynamic registration in place. This is a choice that could relax the just-in-time-dynamic-only-approach. At the same time this will let the federation to be driven with more options by organization side, without changin the lead approach at the base. The same dynamic registration operations of the clients are performed at a predetermined time and not at the occurrence of a new request. The two approaches don't collide with each other, I just see one more option for organizations. This could facilitate its adoption within organizations that need to have an overall feedback on the population of the requesting clients in the future. |
Well, you could argue that implicit client registration is a sort of static registration since the client never sends a registration request to the OP and the OP has no way of modifying the client configuration. The only reason I really can see for allowing entity listing is for parties that are building WAYF functions. |
So, we could just face these options:
|
|
Ok, let's suppose we have as many JWSs for as many pages. Each page would be something like this
Any modification of the "exp" claim in an entity attribute dictionary would let the requester know whether to update the chain of trust for that entity, if indeed the definition of this previously collected entity were to differ for the exp attribute. Each provider configures the desired number of elements per page, in the example we have only two but they can be 50 or 100 or more per page. elements that have changed their EXPiration attribute MUST stay on top, so the result would be sorted by the exp declaration. |
regarding 2. Federation 1.0 could be also adopted even by single federations (not multilateral!). Scenarios where a single federation authority (belonging to a national digital identity system) acts as single trust anchor, issuing entity statements for more that 60000 relying-parties. Whitout any intermediaries |
Sure, that’s always been a use case.
On 10 Oct 2021, at 18:19, Giuseppe De Marco ***@***.***> wrote:
regarding 2.
Federation 1.0 could be also adopted even by single federations (not multilateral!). Scenarios where a single federation authority (belonging to a national digital identity system) acts as single trust anchor, issuing entity statements for more that 60000 relying-parties. Whitout any intermediaries
—
You are receiving this because you commented.
Reply to this email directly, view it on GitHub <#67 (comment)>, or unsubscribe <https://github.com/notifications/unsubscribe-auth/AAAYMPCNX4UWU36WS3WDCTDUGG4I3ANCNFSM437ZYSQA>.
— Roland
Were it left to me to decide whether we should have a government without newspapers, or newspapers without a government, I should not hesitate a moment to prefer the latter. -Thomas Jefferson, third US president, architect, and author (1743-1826)
|
Actually in 6.3.2. Entity Listing Response we have a result like this
What do you think to have also additional attributes, something to deal with expiration time and last modification time?
expiration can be usefull to predict when that metadata MUST be updated (a http request in the future to /federation_api with that subject).
iat claim would be used to determine when a new metadata for this issues have been issued, it would match the update datetime. This will help to known which metadata would be updated (calling /federation_api with those subject).
Something like this example
regardless of the choice of which claim to use, this kind of structure would allow us a better "expandability" of the preview attributes.
The text was updated successfully, but these errors were encountered: