SlideShare ist ein Scribd-Unternehmen logo
1 von 35
Downloaden Sie, um offline zu lesen
OpenID Status Update

January 30, 2018, London



Michael B. Jones

Identity Standards Architect, Microsoft
Overview
§ OpenID Foundation
§ OpenID Connect Standard and Working Group
§ Related OpenID Standards Efforts
§ OpenID Certification
§ Discussion
OpenID Foundation	
•  Authors of OAuth, JWT, JWS, OpenID Connect, trust frameworks,
and certification methods and marks.	Expertise	
•  Intellectual Property Rights regime ensures royalty free, mutual
non-assertion covenant of use by everyone. 	Open	
•  Industry sustaining sponsorship by Google, KDDI, Microsoft, NRI,
Oracle, PayPal, PingIdentity, Symantec, Verizon and more…	Ecosystem	
The OpenID Foundation is a non-profit international standard organization of individuals and
companies committed to enabling, promoting, and protecting OpenID technologies. Since
2007, the foundation has served as a public trust in representing the open community of
developers, vendors, and users.
OpenID Foundation Leadership
OpenID Foundation Working Groups
Working Together
OpenID	Connect
What is OpenID Connect?
§ Simple identity layer on top of OAuth 2.0
§ Enables relying parties to verify identity of end-user
§ Enables relying parties to obtain basic profile info
§ REST/JSON interfaces → low barrier to entry
§ See http://openid.net/connect/
You’re Probably Already Using OpenID Connect!
§ If you log in at AOL, Deutsche Telekom, France Connect,
Google, Microsoft, mixi, NEC, NTT, Salesforce, Softbank,
Symantec, Verizon, or Yahoo! Japan or have an Android phone,
you’re already using OpenID Connect
o Many other sites and apps large and small also use it
OpenID Connect Range
§ Spans use cases, scenarios
o Internet, Enterprise, Mobile, Cloud
§ Spans security & privacy requirements
o From non-sensitive information to highly secure
§ Spans sophistication of claims usage
o From basic default claims to specific requested claims to collecting
claims from multiple sources
§ Maximizes simplicity of implementations
o Uses existing IETF specs: OAuth 2.0, JWT, etc.
o Lets you build only the pieces you need
Design Philosophy
Keep	Simple	Things	Simple	
Make	Complex	Things	Possible
ID Token Example: Claims About the Authentication
{
"iss": "https://server.example.com",
"sub": "248289761001",
"aud": "0acf77d4-b486-4c99-bd76-074ed6a64ddf",
"iat": 1311280970,
"exp": 1311281970,
"nonce": "n-0S6_WzA2Mj"
}
UserInfo Example: Claims About the End-User
{
"sub": "248289761001",
"name": "Jane Doe",
"given_name": "Jane",
"family_name": "Doe",
"email": "janedoe@example.com",
"email_verified": true,
"picture": "http://example.com/janedoe/me.jpg"
}
Connect Specs Overview
More OpenID Connect Specifications
§ OAuth 2.0 Form Post Response Mode
o Defines how to return OAuth 2.0 Authorization Response parameters
(including OpenID Connect Authentication Response parameters)
using HTML form values that are auto-submitted by the User Agent
using HTTP POST
o A “form post” binding, like SAML and WS-Federation
•  An alternative to fragment encoding
o http://openid.net/specs/oauth-v2-form-post-response-mode-1_0.html
o Completed April 2015
o In production use by Microsoft, Ping Identity, others
OpenID Connect Federation (work in progress)
§ OpenID Connect Federation specification
o http://openid.net/specs/openid-connect-federation-1_0.html
o Created by federation expert Roland Hedberg
§ Enables establishment and maintenance of multi-party
federations using OpenID Connect
§ Defines hierarchical JSON-based metadata structures for
federation participants
§ Being prototyped by European federations, including NORDUnet
Session Management / Logout (work in progress)
§ Three approaches being pursued by the working group:
o Session Management
•  http://openid.net/specs/openid-connect-session-1_0.html
•  Uses HTML5 postMessage to send state changes between OP and RP iframes
o Front-Channel Logout
•  http://openid.net/specs/openid-connect-frontchannel-1_0.html
•  Uses HTTP GET to load image or iframe, triggering logout
•  Similar to options in SAML, WS-Federation
o Back-Channel Logout
•  http://openid.net/specs/openid-connect-backchannel-1_0.html
•  Server-to-communication not using the browser
•  Can be used by native applications, which have no active browser
§ All support multiple logged-in sessions from OP at RP
§ Unfortunately, no one approach best for all use cases
§ All became Implementer’s Drafts in March 2017
Related Work in Other Working Groups
§ International Government Profile (iGov) Working Group
o Developing OpenID Connect profile for government & high-value
commercial applications
§ Enhanced Authentication Profile (EAP) Working Group
o Enables Token Bound ID Tokens
o Enables integration with FIDO and other phishing-resistant
authentication solutions
§ Financial API (FAPI) Working Group
o Defining JSON schemas, security and privacy recommendations, and
protocols to:
•  enable applications to utilize the data stored in the financial account,
•  enable applications to interact with the financial account, and
•  enable users to control the security and privacy settings.
What is OpenID Certification?
§ OpenID Certification enables OpenID Connect implementations
to be certified as meeting the requirements of defined
conformance profiles
§ An OpenID Certification has two components:
o Technical evidence of conformance resulting from testing
o Legal statement of conformance
§ Certified implementations can

use the “OpenID Certified” logo
What value does certification provide?
§ Technical:
o Certification testing gives confidence that things will “just work”
o No custom code required to integrate with implementation
o Better for all parties
o Relying parties explicitly asking identity providers to get certified
§ Business:
o Enhances reputation of organization and implementation
o Shows that organization is taking interop seriously
o Customers may choose certified implementations over others
Current Conformance Profiles
§ Five conformance profiles of OpenID Providers:
o Basic OpenID Provider
o Implicit OpenID Provider
o Hybrid OpenID Provider
o OpenID Provider Publishing Configuration Information
o Dynamic OpenID Provider
§ Five corresponding conformance profiles of OpenID RPs:
o Basic Relying Party
o Implicit Relying Party
o Hybrid Relying Party
o Relying Party Publishing Configuration Information
o Dynamic Relying Party
Who has achieved OP Certification?
•  OpenID Provider certifications at
http://openid.net/certification/
#OPs
•  174 profiles certified for

57 implementations by

49 organizations
•  Recent additions:
•  Auth0, CA, Classmethod,
Cloudentity, Connect2id, Curity,
Hanscan, Identity Automation,
KSIGN, Library of Congress, Mvine,
NRI, NTT, OpenAthens, Optimal Idm,
ProSiebenSat.1, Michael Schwartz,
Filip Skokan, WSO2
•  Each entry link to zip file with test
logs and signed legal statement
•  Test results available for public
inspection
Who has achieved RP Certification?
•  Relying Party certifications at
http://openid.net/certification/#RPs
•  44 profiles certified for

18 implementations by

16 organizations
•  Recent additions:
•  Brock Allen, Damien Bowden,

F5 Networks, Janrain, Karlsruher
Institut für Technologie, Tom
Jones, KSIGN, Manfred Steyer,
NRI, ZmartZone IAM
How does OpenID Certification work?
§ Organization decides what profiles it wants to certify to
o For instance, “Basic OP”, “Config OP”, and “Dynamic OP”
§ Runs conformance tests publicly available at
http://op.certification.openid.net/ or
http://rp.certification.openid.net/
§ Once all tests for a profile pass, organization submits
certification request to OpenID Foundation containing:
o Logs from all tests for the profile
o Signed legal declaration that implementation conforms to the profile
§ Organization pays certification fee (for profiles not in pilot
mode)
§ OIDF verifies application is complete and grants certification
§ OIDF lists certification at http://openid.net/certification/ and
registers it in OIXnet at http://oixnet.org/openid-certifications/
What does certification cost?
§ Not a profit center for the OpenID Foundation
o Fees there to help cover costs of operating certification program
§ Member price
o $200 per new deployment
§ Non-member price
o $999 per new deployment
o $499 per new deployment of an already-certified implementation
§ Covers as many profiles as you submit within calendar year
§ New profiles in pilot mode are available to members for free 
§ Costs described at http://openid.net/certification/fees/
What’s next for OpenID Certification?
§ Additional OpenID Connect profiles being developed:
o Form Post Response Mode
o Refresh Token Behaviors
o Session Management, Front-Channel Logout, Back-Channel Logout
o OP-Initiated Login
§ Additional documentation being produced
o By Roland Hedberg and Hans Zandbelt
§ Certification for additional specifications is anticipated:
o E.g., HEART, MODRNA, iGov, EAP, FAPI, etc.
OpenID Certification Call to Action
§ Certify your OpenID Connect implementations
§ Help us test the soon-to-come new profiles
§ Join the OpenID Foundation 
§ Join the OpenID Connect and other working groups
OpenID Connect & Certification Resources
§ OpenID Connect
o http://openid.net/connect/
§ Frequently Asked Questions
o http://openid.net/connect/faq/
§ Working Group Mailing List
o http://lists.openid.net/mailman/listinfo/openid-specs-ab
§ OpenID Certification Program
o http://openid.net/certification/
§ Certified OpenID Connect Implementations Featured for Developers
o http://openid.net/developers/certified/
§ Mike Jones’, Nat Sakimura’s, and John Bradley’s Blogs
o http://self-issued.info/
o http://nat.sakimura.org/
o http://www.thread-safe.com/
Discussion
§ How are you using OpenID specifications?
§ What would you like the OpenID Foundation and its working
groups to know?
Backup Slides
ID Token
§ JWT representing logged-in session
§ Claims:
o iss – Issuer
o sub – Identifier for subject (user)
o aud – Audience for ID Token
o iat – Time token was issued
o exp – Expiration time
o nonce – Mitigates replay attacks
Claims Requests
§ Basic requests made using OAuth scopes:
o openid – Declares request is for OpenID Connect
o profile – Requests default profile info
o email – Requests email address & verification status
o address – Requests postal address
o phone – Requests phone number & verification status
o offline_access – Requests Refresh Token issuance
§ Requests for individual claims can be made using JSON
“claims” request parameter
UserInfo Endpoint: Claims About the End-User
•  sub
•  name
•  given_name
•  family_name
•  middle_name
•  nickname
•  preferred_username
•  profile
•  picture
•  website
•  gender
•  birthdate
•  locale
•  zoneinfo
•  updated_at
•  email
•  email_verified
•  phone_number
•  phone_number_verified
•  address
Example Testing Screen
Log from a Conformance Test
Certification of Conformance
•  Legal statement by certifier
stating:
•  Who is certifying
•  What software
•  When tested
•  Profile tested
•  Commits reputation of
certifying organization to
validity of results

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

OIDF Workshop at Verizon Media -- 9/30/2019 -- Research & Education Working G...
OIDF Workshop at Verizon Media -- 9/30/2019 -- Research & Education Working G...OIDF Workshop at Verizon Media -- 9/30/2019 -- Research & Education Working G...
OIDF Workshop at Verizon Media -- 9/30/2019 -- Research & Education Working G...
 
MODRNA WG Update - April 2021
MODRNA WG Update - April 2021MODRNA WG Update - April 2021
MODRNA WG Update - April 2021
 
OIDF Workshop 4/29/2019 -- OpenID Research & Education Working Group Update
OIDF Workshop 4/29/2019 -- OpenID Research & Education Working Group UpdateOIDF Workshop 4/29/2019 -- OpenID Research & Education Working Group Update
OIDF Workshop 4/29/2019 -- OpenID Research & Education Working Group Update
 
OIDF Workshop at European Identity Conference 2019 -- 5/14/2019 -- FAPI Certi...
OIDF Workshop at European Identity Conference 2019 -- 5/14/2019 -- FAPI Certi...OIDF Workshop at European Identity Conference 2019 -- 5/14/2019 -- FAPI Certi...
OIDF Workshop at European Identity Conference 2019 -- 5/14/2019 -- FAPI Certi...
 
OIDC4VP for AB/C WG
OIDC4VP for AB/C WGOIDC4VP for AB/C WG
OIDC4VP for AB/C WG
 
OIDF Workshop at Verizon Media -- 9/30/2019 -- Browser Changes Impacting Iden...
OIDF Workshop at Verizon Media -- 9/30/2019 -- Browser Changes Impacting Iden...OIDF Workshop at Verizon Media -- 9/30/2019 -- Browser Changes Impacting Iden...
OIDF Workshop at Verizon Media -- 9/30/2019 -- Browser Changes Impacting Iden...
 
OpenID Foundation RISC WG Update - 2017-10-16
OpenID Foundation RISC WG Update - 2017-10-16OpenID Foundation RISC WG Update - 2017-10-16
OpenID Foundation RISC WG Update - 2017-10-16
 
OIDF Workshop at Verizon Media -- 9/30/2019 -- FastFed Working Group Update
OIDF Workshop at Verizon Media -- 9/30/2019 -- FastFed Working Group UpdateOIDF Workshop at Verizon Media -- 9/30/2019 -- FastFed Working Group Update
OIDF Workshop at Verizon Media -- 9/30/2019 -- FastFed Working Group Update
 
OpenID Connect 4 SSI
OpenID Connect 4 SSIOpenID Connect 4 SSI
OpenID Connect 4 SSI
 
OpenID Connect vs. OpenID 1 & 2
OpenID Connect vs. OpenID 1 & 2OpenID Connect vs. OpenID 1 & 2
OpenID Connect vs. OpenID 1 & 2
 
OIDF Workshop at Verizon Media -- 9/30/2019 -- OpenID Connect for Identity As...
OIDF Workshop at Verizon Media -- 9/30/2019 -- OpenID Connect for Identity As...OIDF Workshop at Verizon Media -- 9/30/2019 -- OpenID Connect for Identity As...
OIDF Workshop at Verizon Media -- 9/30/2019 -- OpenID Connect for Identity As...
 
OpenID Connect 4 SSI (at EIC 2021)
OpenID Connect 4 SSI (at EIC 2021)OpenID Connect 4 SSI (at EIC 2021)
OpenID Connect 4 SSI (at EIC 2021)
 
OpenID Foundation's Risk Incident and Sharing Communication (RISC) Work Group...
OpenID Foundation's Risk Incident and Sharing Communication (RISC) Work Group...OpenID Foundation's Risk Incident and Sharing Communication (RISC) Work Group...
OpenID Foundation's Risk Incident and Sharing Communication (RISC) Work Group...
 
OpenID Foundation Workshop at EIC 2018 - MODRNA Working Group Update
OpenID Foundation Workshop at EIC 2018 - MODRNA Working Group UpdateOpenID Foundation Workshop at EIC 2018 - MODRNA Working Group Update
OpenID Foundation Workshop at EIC 2018 - MODRNA Working Group Update
 
Self-issued OpenID Provider_OpenID Foundation Virtual Workshop
Self-issued OpenID Provider_OpenID Foundation Virtual Workshop Self-issued OpenID Provider_OpenID Foundation Virtual Workshop
Self-issued OpenID Provider_OpenID Foundation Virtual Workshop
 
OpenAthens Conference 2018 - Don Thibeau - OpenID Connect
OpenAthens Conference 2018 - Don Thibeau - OpenID ConnectOpenAthens Conference 2018 - Don Thibeau - OpenID Connect
OpenAthens Conference 2018 - Don Thibeau - OpenID Connect
 
OpenAM - An Introduction
OpenAM - An IntroductionOpenAM - An Introduction
OpenAM - An Introduction
 
OpenID Connect 4 SSI (DIFCon F2F)
OpenID Connect 4 SSI (DIFCon F2F)OpenID Connect 4 SSI (DIFCon F2F)
OpenID Connect 4 SSI (DIFCon F2F)
 
Implementing security requirements for banking API system using Open Source ...
 Implementing security requirements for banking API system using Open Source ... Implementing security requirements for banking API system using Open Source ...
Implementing security requirements for banking API system using Open Source ...
 
OpenID Connect: The new standard for connecting to your Customers, Partners, ...
OpenID Connect: The new standard for connecting to your Customers, Partners, ...OpenID Connect: The new standard for connecting to your Customers, Partners, ...
OpenID Connect: The new standard for connecting to your Customers, Partners, ...
 

Ähnlich wie OpenID Foundation/Open Banking Workshop - OpenID Foundation Overview

Ähnlich wie OpenID Foundation/Open Banking Workshop - OpenID Foundation Overview (20)

OpenID Connect "101" Introduction -- October 23, 2018
OpenID Connect "101" Introduction -- October 23, 2018OpenID Connect "101" Introduction -- October 23, 2018
OpenID Connect "101" Introduction -- October 23, 2018
 
OIDF Workshop at European Identity Conference 2019 -- 5/14/2019 -- OpenID Cer...
OIDF Workshop at European Identity Conference 2019 -- 5/14/2019 -- OpenID Cer...OIDF Workshop at European Identity Conference 2019 -- 5/14/2019 -- OpenID Cer...
OIDF Workshop at European Identity Conference 2019 -- 5/14/2019 -- OpenID Cer...
 
OpenID Foundation Workshop at EIC 2018 - OpenID Certification Update
OpenID Foundation Workshop at EIC 2018 - OpenID Certification UpdateOpenID Foundation Workshop at EIC 2018 - OpenID Certification Update
OpenID Foundation Workshop at EIC 2018 - OpenID Certification Update
 
OpenID Foundation Certification Program Update - October 22, 2018
OpenID Foundation Certification Program Update - October 22, 2018OpenID Foundation Certification Program Update - October 22, 2018
OpenID Foundation Certification Program Update - October 22, 2018
 
OpenID Certification Program Update - 2018-04-02
OpenID Certification Program Update - 2018-04-02OpenID Certification Program Update - 2018-04-02
OpenID Certification Program Update - 2018-04-02
 
OpenID Connect Explained
OpenID Connect ExplainedOpenID Connect Explained
OpenID Connect Explained
 
OpenID Certification Program Update - 2017-10-16
OpenID Certification Program Update - 2017-10-16OpenID Certification Program Update - 2017-10-16
OpenID Certification Program Update - 2017-10-16
 
Azure AD B2C An Introduction - DogFoodCon 2018
Azure AD B2C An Introduction - DogFoodCon 2018Azure AD B2C An Introduction - DogFoodCon 2018
Azure AD B2C An Introduction - DogFoodCon 2018
 
OIDF Workshop at Verizon Media -- 9/30/2019 -- OpenID Certification Program U...
OIDF Workshop at Verizon Media -- 9/30/2019 -- OpenID Certification Program U...OIDF Workshop at Verizon Media -- 9/30/2019 -- OpenID Certification Program U...
OIDF Workshop at Verizon Media -- 9/30/2019 -- OpenID Certification Program U...
 
OpenID 4 Verifiable Credentials + HAIP (Update)
OpenID 4 Verifiable Credentials + HAIP (Update)OpenID 4 Verifiable Credentials + HAIP (Update)
OpenID 4 Verifiable Credentials + HAIP (Update)
 
OpenID Progress EEMA Conference
OpenID Progress EEMA ConferenceOpenID Progress EEMA Conference
OpenID Progress EEMA Conference
 
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
 
Red Hat Summit - OpenShift Identity Management and Compliance
Red Hat Summit - OpenShift Identity Management and ComplianceRed Hat Summit - OpenShift Identity Management and Compliance
Red Hat Summit - OpenShift Identity Management and Compliance
 
Holt "Working with Scholarly APIs: A NISO Training Series, Session Two: ORCID"
Holt "Working with Scholarly APIs: A NISO Training Series, Session Two: ORCID"Holt "Working with Scholarly APIs: A NISO Training Series, Session Two: ORCID"
Holt "Working with Scholarly APIs: A NISO Training Series, Session Two: ORCID"
 
GAIN Presentation.pptx
GAIN Presentation.pptxGAIN Presentation.pptx
GAIN Presentation.pptx
 
[WSO2Con EU 2018] Identity APIs is the New Black
[WSO2Con EU 2018] Identity APIs is the New Black[WSO2Con EU 2018] Identity APIs is the New Black
[WSO2Con EU 2018] Identity APIs is the New Black
 
Open Banking beyond PSD2 in the EU
Open Banking beyond PSD2 in the EU Open Banking beyond PSD2 in the EU
Open Banking beyond PSD2 in the EU
 
OpenID for SSI
OpenID for SSIOpenID for SSI
OpenID for SSI
 
OAuth and OpenID Connect for PSD2 and Third-Party Access
OAuth and OpenID Connect for PSD2 and Third-Party AccessOAuth and OpenID Connect for PSD2 and Third-Party Access
OAuth and OpenID Connect for PSD2 and Third-Party Access
 
Authentication options for Open edX: focus on OAuth and OpenID
Authentication options for Open edX: focus on OAuth and OpenIDAuthentication options for Open edX: focus on OAuth and OpenID
Authentication options for Open edX: focus on OAuth and OpenID
 

Mehr von MikeLeszcz

Mehr von MikeLeszcz (8)

OpenID Foundation Workshop at EIC 2018 - Introduction to the FAPI Read & Writ...
OpenID Foundation Workshop at EIC 2018 - Introduction to the FAPI Read & Writ...OpenID Foundation Workshop at EIC 2018 - Introduction to the FAPI Read & Writ...
OpenID Foundation Workshop at EIC 2018 - Introduction to the FAPI Read & Writ...
 
OpenID Foundation Workshop at EIC 2018 - Mobile Driver's License Presentantion
OpenID Foundation Workshop at EIC 2018 - Mobile Driver's License PresentantionOpenID Foundation Workshop at EIC 2018 - Mobile Driver's License Presentantion
OpenID Foundation Workshop at EIC 2018 - Mobile Driver's License Presentantion
 
OpenID Foundation Workshop at EIC 2018 - OpenID Connect Working Group Update
OpenID Foundation Workshop at EIC 2018 - OpenID Connect Working Group UpdateOpenID Foundation Workshop at EIC 2018 - OpenID Connect Working Group Update
OpenID Foundation Workshop at EIC 2018 - OpenID Connect Working Group Update
 
OpenID Foundation Workshop at EIC 2018 - HEART Working Group Update
OpenID Foundation Workshop at EIC 2018 - HEART Working Group UpdateOpenID Foundation Workshop at EIC 2018 - HEART Working Group Update
OpenID Foundation Workshop at EIC 2018 - HEART Working Group Update
 
CIBA Profile Overview - OpenID Foundation/Open Banking Workshop - March 21, 2018
CIBA Profile Overview - OpenID Foundation/Open Banking Workshop - March 21, 2018CIBA Profile Overview - OpenID Foundation/Open Banking Workshop - March 21, 2018
CIBA Profile Overview - OpenID Foundation/Open Banking Workshop - March 21, 2018
 
OpenID Foundation/Open Banking Workshop - Open Banking Update
OpenID Foundation/Open Banking Workshop - Open Banking UpdateOpenID Foundation/Open Banking Workshop - Open Banking Update
OpenID Foundation/Open Banking Workshop - Open Banking Update
 
Banking is Now More Open: Open Banking Update
Banking is Now More Open: Open Banking UpdateBanking is Now More Open: Open Banking Update
Banking is Now More Open: Open Banking Update
 
OpenID Foundation FastFed Working Group Update - 2017-10-16
OpenID Foundation FastFed Working Group Update - 2017-10-16OpenID Foundation FastFed Working Group Update - 2017-10-16
OpenID Foundation FastFed Working Group Update - 2017-10-16
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

OpenID Foundation/Open Banking Workshop - OpenID Foundation Overview

  • 1. OpenID Status Update
 January 30, 2018, London
 
 Michael B. Jones
 Identity Standards Architect, Microsoft
  • 2. Overview § OpenID Foundation § OpenID Connect Standard and Working Group § Related OpenID Standards Efforts § OpenID Certification § Discussion
  • 3. OpenID Foundation •  Authors of OAuth, JWT, JWS, OpenID Connect, trust frameworks, and certification methods and marks. Expertise •  Intellectual Property Rights regime ensures royalty free, mutual non-assertion covenant of use by everyone. Open •  Industry sustaining sponsorship by Google, KDDI, Microsoft, NRI, Oracle, PayPal, PingIdentity, Symantec, Verizon and more… Ecosystem The OpenID Foundation is a non-profit international standard organization of individuals and companies committed to enabling, promoting, and protecting OpenID technologies. Since 2007, the foundation has served as a public trust in representing the open community of developers, vendors, and users.
  • 7. What is OpenID Connect? § Simple identity layer on top of OAuth 2.0 § Enables relying parties to verify identity of end-user § Enables relying parties to obtain basic profile info § REST/JSON interfaces → low barrier to entry § See http://openid.net/connect/
  • 8. You’re Probably Already Using OpenID Connect! § If you log in at AOL, Deutsche Telekom, France Connect, Google, Microsoft, mixi, NEC, NTT, Salesforce, Softbank, Symantec, Verizon, or Yahoo! Japan or have an Android phone, you’re already using OpenID Connect o Many other sites and apps large and small also use it
  • 9. OpenID Connect Range § Spans use cases, scenarios o Internet, Enterprise, Mobile, Cloud § Spans security & privacy requirements o From non-sensitive information to highly secure § Spans sophistication of claims usage o From basic default claims to specific requested claims to collecting claims from multiple sources § Maximizes simplicity of implementations o Uses existing IETF specs: OAuth 2.0, JWT, etc. o Lets you build only the pieces you need
  • 11. ID Token Example: Claims About the Authentication { "iss": "https://server.example.com", "sub": "248289761001", "aud": "0acf77d4-b486-4c99-bd76-074ed6a64ddf", "iat": 1311280970, "exp": 1311281970, "nonce": "n-0S6_WzA2Mj" }
  • 12. UserInfo Example: Claims About the End-User { "sub": "248289761001", "name": "Jane Doe", "given_name": "Jane", "family_name": "Doe", "email": "janedoe@example.com", "email_verified": true, "picture": "http://example.com/janedoe/me.jpg" }
  • 14. More OpenID Connect Specifications § OAuth 2.0 Form Post Response Mode o Defines how to return OAuth 2.0 Authorization Response parameters (including OpenID Connect Authentication Response parameters) using HTML form values that are auto-submitted by the User Agent using HTTP POST o A “form post” binding, like SAML and WS-Federation •  An alternative to fragment encoding o http://openid.net/specs/oauth-v2-form-post-response-mode-1_0.html o Completed April 2015 o In production use by Microsoft, Ping Identity, others
  • 15. OpenID Connect Federation (work in progress) § OpenID Connect Federation specification o http://openid.net/specs/openid-connect-federation-1_0.html o Created by federation expert Roland Hedberg § Enables establishment and maintenance of multi-party federations using OpenID Connect § Defines hierarchical JSON-based metadata structures for federation participants § Being prototyped by European federations, including NORDUnet
  • 16. Session Management / Logout (work in progress) § Three approaches being pursued by the working group: o Session Management •  http://openid.net/specs/openid-connect-session-1_0.html •  Uses HTML5 postMessage to send state changes between OP and RP iframes o Front-Channel Logout •  http://openid.net/specs/openid-connect-frontchannel-1_0.html •  Uses HTTP GET to load image or iframe, triggering logout •  Similar to options in SAML, WS-Federation o Back-Channel Logout •  http://openid.net/specs/openid-connect-backchannel-1_0.html •  Server-to-communication not using the browser •  Can be used by native applications, which have no active browser § All support multiple logged-in sessions from OP at RP § Unfortunately, no one approach best for all use cases § All became Implementer’s Drafts in March 2017
  • 17. Related Work in Other Working Groups § International Government Profile (iGov) Working Group o Developing OpenID Connect profile for government & high-value commercial applications § Enhanced Authentication Profile (EAP) Working Group o Enables Token Bound ID Tokens o Enables integration with FIDO and other phishing-resistant authentication solutions § Financial API (FAPI) Working Group o Defining JSON schemas, security and privacy recommendations, and protocols to: •  enable applications to utilize the data stored in the financial account, •  enable applications to interact with the financial account, and •  enable users to control the security and privacy settings.
  • 18. What is OpenID Certification? § OpenID Certification enables OpenID Connect implementations to be certified as meeting the requirements of defined conformance profiles § An OpenID Certification has two components: o Technical evidence of conformance resulting from testing o Legal statement of conformance § Certified implementations can
 use the “OpenID Certified” logo
  • 19. What value does certification provide? § Technical: o Certification testing gives confidence that things will “just work” o No custom code required to integrate with implementation o Better for all parties o Relying parties explicitly asking identity providers to get certified § Business: o Enhances reputation of organization and implementation o Shows that organization is taking interop seriously o Customers may choose certified implementations over others
  • 20. Current Conformance Profiles § Five conformance profiles of OpenID Providers: o Basic OpenID Provider o Implicit OpenID Provider o Hybrid OpenID Provider o OpenID Provider Publishing Configuration Information o Dynamic OpenID Provider § Five corresponding conformance profiles of OpenID RPs: o Basic Relying Party o Implicit Relying Party o Hybrid Relying Party o Relying Party Publishing Configuration Information o Dynamic Relying Party
  • 21. Who has achieved OP Certification? •  OpenID Provider certifications at http://openid.net/certification/ #OPs •  174 profiles certified for
 57 implementations by
 49 organizations •  Recent additions: •  Auth0, CA, Classmethod, Cloudentity, Connect2id, Curity, Hanscan, Identity Automation, KSIGN, Library of Congress, Mvine, NRI, NTT, OpenAthens, Optimal Idm, ProSiebenSat.1, Michael Schwartz, Filip Skokan, WSO2 •  Each entry link to zip file with test logs and signed legal statement •  Test results available for public inspection
  • 22. Who has achieved RP Certification? •  Relying Party certifications at http://openid.net/certification/#RPs •  44 profiles certified for
 18 implementations by
 16 organizations •  Recent additions: •  Brock Allen, Damien Bowden,
 F5 Networks, Janrain, Karlsruher Institut für Technologie, Tom Jones, KSIGN, Manfred Steyer, NRI, ZmartZone IAM
  • 23. How does OpenID Certification work? § Organization decides what profiles it wants to certify to o For instance, “Basic OP”, “Config OP”, and “Dynamic OP” § Runs conformance tests publicly available at http://op.certification.openid.net/ or http://rp.certification.openid.net/ § Once all tests for a profile pass, organization submits certification request to OpenID Foundation containing: o Logs from all tests for the profile o Signed legal declaration that implementation conforms to the profile § Organization pays certification fee (for profiles not in pilot mode) § OIDF verifies application is complete and grants certification § OIDF lists certification at http://openid.net/certification/ and registers it in OIXnet at http://oixnet.org/openid-certifications/
  • 24. What does certification cost? § Not a profit center for the OpenID Foundation o Fees there to help cover costs of operating certification program § Member price o $200 per new deployment § Non-member price o $999 per new deployment o $499 per new deployment of an already-certified implementation § Covers as many profiles as you submit within calendar year § New profiles in pilot mode are available to members for free § Costs described at http://openid.net/certification/fees/
  • 25. What’s next for OpenID Certification? § Additional OpenID Connect profiles being developed: o Form Post Response Mode o Refresh Token Behaviors o Session Management, Front-Channel Logout, Back-Channel Logout o OP-Initiated Login § Additional documentation being produced o By Roland Hedberg and Hans Zandbelt § Certification for additional specifications is anticipated: o E.g., HEART, MODRNA, iGov, EAP, FAPI, etc.
  • 26. OpenID Certification Call to Action § Certify your OpenID Connect implementations § Help us test the soon-to-come new profiles § Join the OpenID Foundation § Join the OpenID Connect and other working groups
  • 27. OpenID Connect & Certification Resources § OpenID Connect o http://openid.net/connect/ § Frequently Asked Questions o http://openid.net/connect/faq/ § Working Group Mailing List o http://lists.openid.net/mailman/listinfo/openid-specs-ab § OpenID Certification Program o http://openid.net/certification/ § Certified OpenID Connect Implementations Featured for Developers o http://openid.net/developers/certified/ § Mike Jones’, Nat Sakimura’s, and John Bradley’s Blogs o http://self-issued.info/ o http://nat.sakimura.org/ o http://www.thread-safe.com/
  • 28. Discussion § How are you using OpenID specifications? § What would you like the OpenID Foundation and its working groups to know?
  • 30. ID Token § JWT representing logged-in session § Claims: o iss – Issuer o sub – Identifier for subject (user) o aud – Audience for ID Token o iat – Time token was issued o exp – Expiration time o nonce – Mitigates replay attacks
  • 31. Claims Requests § Basic requests made using OAuth scopes: o openid – Declares request is for OpenID Connect o profile – Requests default profile info o email – Requests email address & verification status o address – Requests postal address o phone – Requests phone number & verification status o offline_access – Requests Refresh Token issuance § Requests for individual claims can be made using JSON “claims” request parameter
  • 32. UserInfo Endpoint: Claims About the End-User •  sub •  name •  given_name •  family_name •  middle_name •  nickname •  preferred_username •  profile •  picture •  website •  gender •  birthdate •  locale •  zoneinfo •  updated_at •  email •  email_verified •  phone_number •  phone_number_verified •  address
  • 34. Log from a Conformance Test
  • 35. Certification of Conformance •  Legal statement by certifier stating: •  Who is certifying •  What software •  When tested •  Profile tested •  Commits reputation of certifying organization to validity of results