OpenID Connect Working Group

Slides:



Advertisements
Similar presentations
Fall VoN 2000 SIP for IP Communications Jonathan Rosenberg Chief Scientist.
Advertisements

OpenID Connect Update May 14, 2013 Dr. Michael B. Jones Identity Standards Architect – Microsoft.
FIspace Security Components FIspace Security Components NetFutures 2015 FIspace project Javier Romero Negrín Javier Hitado Simarro ATOS Serdar Arslan KoçSistem.
WSO2 Identity Server Road Map
By: Ansuya Chauhan.
Mashing Up with User-Centric Identity America Online LLC John Panzer, Praveen Alavilli.
December 19, 2006 Solving Web Single Sign-on with Standards and Open Source Solutions Trey Drake AssetWorld 2007 Albuquerque, New Mexico November 2007.
OpenID Connect Update and Discussion Mountain View Summit – September 12, 2011 Mike Jones – Microsoft John Bradley – Independent Nat Sakimura – Nomura.
OpenID Connect Working Group April 6, 2015 Mike Jones Identity Standards Architect – Microsoft.
IDENTITY MANAGEMENT Hoang Huu Hanh (PhD), OST – Hue University hanh-at-hueuni.edu.vn.
SWITCHaai Team Introduction to Shibboleth.
Identity Management Report By Jean Carreon and Marlon Gonzales.
SAML Right Here, Right Now Hal Lockhart September 25, 2012.
The Internet Identity Layer OpenID Connect Update for HIT Standards Committee’s Privacy and Security Workgroup Wednesday, March 12th from 10:00-2:45 PM.
Openid Connect
IETF #91 OAuth Meeting Derek Atkins Hannes Tschofenig.
Observations from the OAuth Feature Survey Mike Jones March 14, 2013 IETF 86.
Adxstudio Portals Training
Securing Angular Apps Brian Noyes
Secure Mobile Development with NetIQ Access Manager
OpenID Connect Working Group May 10, 2016 Mike Jones Identity Standards Architect – Microsoft.
OpenID Certification June 7, 2016 Michael B. Jones Identity Standards Architect – Microsoft.
OpenID Connect: An Overview Pat Patterson Developer Evangelist Architect
Web Authorization Protocol WG Hannes Tschofenig, Derek Atkins.
11 | Managing User Info Jeremy Foster Michael Palermo
Identity Standards Architect, Microsoft
Application Authentication using Azure AD
Access Policy - Federation March 23, 2016
Dr. Michael B. Jones Identity Standards Architect at Microsoft
Azure Active Directory - Business 2 Consumer
Introduction to Windows Azure AppFabric
Federation made simple
Shibboleth Roadmap
SAML New Features and Standardization Status
Identity Standards Architect – Microsoft
Introduction to OpenID Connect
OAuth Assertion Documents
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
Windows Azure AppFabric
Exam : Implementing Microsoft Azure Infrastructure Solutions
OpenID Connect Working Group
OpenID Enhanced Authentication Profile (EAP) Working Group
OpenID Connect: News, Overview, Certification, and Action Items
Identity Standards Architect – Microsoft
OpenID Enhanced Authentication Profile (EAP) Working Group
OpenID Certification Program Award Presentation for IDnext 2018
Introduction to OpenID Connect
Identity Standards Architect – Microsoft
What Does Logout Mean? Michael B. Jones, Identity Standards Architect, Microsoft Brock Allen, Software Security Consultant, Solliance OAuth Security Workshop,
OpenID Connect Working Group
SharePoint Online Hybrid – Configure Outbound Search
Introduction to OpenID Connect
Mary Montoya, CIO Bogi Malecki, Project Manager
Token-based Authentication
Introduction to OpenID Connect
Microsoft Ignite NZ October 2016 SKYCITY, Auckland.
OpenID Connect Working Group
Identity Standards Architect – Microsoft
OpenID Enhanced Authentication Profile (EAP) Working Group
Introduction to OpenID Connect
OpenID Connect Working Group
OpenID Enhanced Authentication Profile (EAP) Working Group
Identity Standards Architect – Microsoft
Computer Network Information Center, Chinese Academy of Sciences
D Guidance 26-Jun: Would like to see a refresh of this title slide
Introduction to OpenID Connect
Identity Standards Architect – Microsoft
OpenID Connect Working Group
OpenID Enhanced Authentication Profile (EAP) Working Group
Presentation transcript:

OpenID Connect Working Group May 15, 2018 Dr. Michael B. Jones Identity Standards Architect – Microsoft

Working Together OpenID Connect

What is OpenID Connect? Simple identity layer on top of OAuth 2.0 Enables RPs to verify identity of end-user Enables RPs to obtain basic profile info REST/JSON interfaces → low barrier to entry Described at http://openid.net/connect/

You’re Probably Already Using OpenID Connect! If you have an Android phone or log in at AOL, Deutsche Telekom, Google, Microsoft, NEC, NTT, Salesforce, Softbank, Symantec, Verizon, or Yahoo! Japan, you’re already using OpenID Connect Many other sites and apps large and small also use OpenID Connect

OpenID Connect Range Spans use cases, scenarios Internet, Enterprise, Mobile, Cloud Spans security & privacy requirements From non-sensitive information to highly secure Spans sophistication of claims usage From basic default claims to specific requested claims to collecting claims from multiple sources Maximizes simplicity of implementations Uses existing IETF specs: OAuth 2.0, JWT, etc. Lets you build only the pieces you need

Numerous Awards OpenID Connect won 2012 European Identity Award for Best Innovation/New Standard http://openid.net/2012/04/18/openid-connect-wins-2012-european-identity-and-cloud-award/ OAuth 2.0 won in 2013 JSON Web Token (JWT) & JOSE won in 2014 OpenID Certification program won 2018 Identity Innovation Award http://openid.net/2018/03/29/openid-certification-program-wins-2018-identity-innovation-award/

Original Overview of Specifications

OAuth 2.0 Form Post Response Mode (additional Final Specification) Defines how to return OAuth 2.0 Authorization Response parameters (including OpenID Connect Authentication Response parameters) using HTML form values auto-submitted by the User Agent using HTTP POST A “form post” binding, like SAML and WS-Federation An alternative to fragment encoding http://openid.net/specs/oauth-v2-form-post-response-mode-1_0.html Completed April 2015 In production use by Microsoft, Ping Identity

OpenID 2.0 to OpenID Connect Migration (additional Final Specification) Defines how to migrate from OpenID 2.0 to OpenID Connect Has OpenID Connect identity provider also return OpenID 2.0 identifier, enabling account migration http://openid.net/specs/openid-connect-migration-1_0.html Completed April 2015 Google shut down OpenID 2.0 support in April 2015 Yahoo, AOL, others also plan to replace OpenID 2.0 with OpenID Connect

Current Work Federation Specification Session Management / Logout Second Errata Set Current Related Work OpenID Connect Certification

Session Management / Logout (work in progress) Three approaches being pursued by the working group: Session Management http://openid.net/specs/openid-connect-session-1_0.html Uses HTML5 postMessage to communicate state change messages between OP and RP iframes Front-Channel Logout http://openid.net/specs/openid-connect-frontchannel-1_0.html Uses HTTP GET to load image or iframe, triggering logout (similar to SAML, WS-Federation) Back-Channel Logout http://openid.net/specs/openid-connect-backchannel-1_0.html Server-to-communication not using the browser Can be used by native applications, which have no active browser Unfortunately, no one approach best for all use cases Can be used separately or in combination Became Implementer’s Drafts in March 2017 Recent decision made that it’s time for them to become Final Specifications

Federation Specification (work in progress) Roland Hedberg created OpenID Connect Federation specification http://openid.net/specs/openid-connect-federation-1_0.html Enables establishment and maintenance of multi-party federations using OpenID Connect Defines hierarchical JSON-based metadata structures for federation participants Prototype implementations being interop tested w/ each other Recent decision to progress it to an Implementer’s Draft

Second Errata Set (work in progress) Errata process corrects typos, etc. discovered Makes no normative changes Edits under way for second errata set See http://openid.net/specs/openid-connect-core-1_0-23.html for current Core errata draft Waiting for OAuth AS metadata spec draft-ietf-oauth-discovery to be final So we can register OpenID Discovery metadata values Now in the hands of the RFC Editor Expect to see request for review of errata changes shortly

Current Related Work International Government Profile (iGov) Working Group Developing OpenID Connect profile for government & high-value commercial applications Enhanced Authentication Profile (EAP) Working Group Enables Token Bound ID Tokens Enables integration with FIDO and other phishing-resistant authentication solutions

OpenID Certification OpenID Certification enables OpenID Connect implementations to be certified as meeting requirements of defined conformance profiles Now OP and RP certification profiles for: Basic OP and Basic RP Implicit OP and Implicit RP Hybrid OP and Hybrid RP OP Publishing and RP Using Configuration Information Dynamic OP and Dynamic RP See http://openid.net/certification/ And accompanying certification presentation!

Open Conversation How are you using OpenID Connect? What would you like the working group to know and do?

OpenID Connect Resources http://openid.net/connect/ Frequently Asked Questions http://openid.net/connect/faq/ Working Group Mailing List http://lists.openid.net/mailman/listinfo/openid-specs-ab OpenID Certification Program http://openid.net/certification/ Certified OpenID Connect Implementations Featured for Developers http://openid.net/developers/certified/ Mike Jones’ Blog http://self-issued.info/ Nat Sakimura’s Blog http://nat.sakimura.org/ John Bradley’s Blog http://www.thread-safe.com/