# SIG Breakout Session: 2025-11-19 - Date: 19 November 2025 - Time: 12:00 - 13:00 UTC in 1 hour 08:00 - 9:00 EDT (UTC-4) 12:00 - 13:00 GMT (UTC+0) 13:00 - 14:00 CET (UTC+1) 13:00 - 14:00 WAT (UTC+1) 14:00 - 15:00 EET (UTC+2) 17:30 - 18:30 IST (UTC+5:30) 21:00 - 22:00 JST (UTC+9) 22:00 - 23:00 AEST (UTC+10) Zoom Link: https://us06web.zoom.us/j/81611246656 ## Agenda Agenda Items to discuss ## Attendees - Takashi Norimatsu - Ingrid Kamga - Francis Pouatcha - Dmitry Telegin - Thomas Darimont - Forkim Akwichek - Georgilakis Konstantinos - Thomas Diesler - Bertrand Ogen - Awambeng Rodrick ## Notes Notes by Topic ## New Support ### 1. Workload/Agentic Identity Specifications: - [Transaction Tokens](https://datatracker.ietf.org/doc/draft-ietf-oauth-transaction-tokens/) - [OAuth Identity and Authorization Chaining Across Domains](https://datatracker.ietf.org/doc/draft-ietf-oauth-identity-chaining/) - [OAuth 2.0 Dynamic Client Registration with Trusted Issuer Credentials](https://datatracker.ietf.org/doc/draft-kasselman-oauth-dcr-trusted-issuer-token/) - [OAuth Client Registration on First Use with SPIFFE](https://datatracker.ietf.org/doc/draft-kasselman-oauth-spiffe/) - [OAuth SPIFFE Client Authentication](https://datatracker.ietf.org/doc/draft-schwenkschuster-oauth-spiffe-client-auth/) - [Identity Assertion Authorization Grant](https://datatracker.ietf.org/doc/draft-ietf-oauth-identity-assertion-authz-grant/) - [OAuth Client ID Metadata Document](https://datatracker.ietf.org/doc/draft-ietf-oauth-client-id-metadata-document/) 20251119 - IETF - Last Week: Update will happen in 2 Weeks time, as part of general SIG meeting (Dmitry & Arndt) - In matter of Transaction Token, the idea is to have mapper for Token Exchange. (Dmitry) - Spec does not focus on token content mapping. So it need to be configurable. - TokenExchangeMapper details for next session. ### 2. Shared Signals Framework (SSF) Specifications: - [OpenID Shared Signals Framework Specification 1.0 Final](https://openid.net/specs/openid-sharedsignals-framework-1_0-final.html) - [OpenID Continuous Access Evaluation Profile 1.0 Final](https://openid.net/specs/openid-caep-1_0-final.html) - [OpenID RISC Profile Specification 1.0](https://openid.net/specs/openid-risc-1_0-final.html) PoCs: - [Shared Signals Framework for Keycloak](https://github.com/identitytailor/keycloak-ssf-support) Issues: - [#43616 Add initial support for OpenID Shared Signals Framework](https://github.com/keycloak/keycloak/issues/43614) Active Draft PRs: [#43950 Initial support for Shared Signals Framework with Push Delivery](https://github.com/keycloak/keycloak/pull/43950) - Example provided - Impl Notes: Minimal - It is an SPI - Receiver will be connected with the new workflow support, so events can trigger workflows. 20251119 - No update - This friday: Thomas appointent with Apple. Goal get enough information to have Keycloak support apple school and business manager. - Still waiting for feedback on the pull request [#43950 Initial support for Shared Signals Framework with Push Delivery](https://github.com/keycloak/keycloak/pull/43950) - Dmitry would like to use the **generalized IDP** in the future, to be used for Transaction Tokensa and Identity Chaining. Because of UI-Extension limitations, this is to be done as entire part of Keycloak and not as a Keycloak extension. ### 3. OpenID Federation 1.0 (OIDFED) Specifications: - [OpenID Federation 1.0 - draft 44](https://openid.net/specs/openid-federation-1_0.html) - version up from draft 43 to 44 Discussions: - [#31027Support for OpenID Federation 1.0](https://github.com/keycloak/keycloak/discussions/31027#discussioncomment-14727205) Epic Issues: - [#40509 OpenID Federation implementation](https://github.com/keycloak/keycloak/issues/40509) Slacks: - https://cloud-native.slack.com/archives/C096PUDTC3U - https://github.com/keycloak/keycloak/issues/42634 - https://github.com/keycloak/keycloak/issues/42635 20251119 - Vinod: Costas still waiting for a feedback from Stian ### 4. Attestation-Based Client Auth Specification: - [OAuth 2.0 Attestation-Based Client Authentication (ver 07)](https://datatracker.ietf.org/doc/draft-ietf-oauth-attestation-based-client-auth/) Discussion: [#40413 Support for OAuth 2.0 Attestation-Based Client Authentication](https://github.com/keycloak/keycloak/discussions/40413) Issues: - [#39287 [OID4VCI] Understand key attestations as additional information to jwt proofs or as per new attestation proof type (for Key binding)](https://github.com/keycloak/keycloak/issues/39287) - Its PR merged and the issue was resolved. PoCs : - https://github.com/thomasdarimont/keycloak/tree/poc/client-attestation Slacks: - [Discussion on OAuth Attestation-based client authentication](https://cloud-native.slack.com/archives/C05KR0TL4P8/p1758286805101949) 20251119 - Bertrand: I review the work in the context of adorsys work. Still working on that. - Vinod: Any update for the standard? Is HAIP going to use the standard? - Thomas: HAIP is still being finalized. - Guessing finalization of HAIP arround Q1 ### 5. Model Context Protocol (MCP) Specifications: - [Version 2025-03-26: Authorization](https://modelcontextprotocol.io/specification/2025-03-26/basic/authorization) - Takashi: according my investigation, Keycloak supported this version. - [Version 2025-06-18: Authorization](https://modelcontextprotocol.io/specification/2025-06-18/basic/authorization) - Takashi: according my investigation, Keycloak supported this version partially. - [Draft: Authorization](https://modelcontextprotocol.io/specification/draft/basic/authorization) - Takashi: the next version will be released on 25 Nov. - Takashi: [SEPs to Implement - MCP Spec 25-11-2025](https://docs.google.com/document/d/1xY9yTSw4WqPjLJ6hT29kyogREP8J99L-dh7rqKpHUFU/edit?tab=t.0#heading=h.8zp1b7wxpe0k) Active PRs: - [#35711 Add support for RFC 8707 OAuth2 Resource Indicators](https://github.com/keycloak/keycloak/pull/35711) - Takashi: the PR is needed to make keycloak fully complies with MCP version 2025-06-18 and the future versions. 20251119 - No update this week. ## Refinement ### 6. OpenID Verifiable Credentials Issuance (OpenID4VCI) Specifications: - [OpenID for Verifiable Credential Issuance 1.0 (FINAL)](https://openid.net/specs/openid-4-verifiable-credential-issuance-1_0-final.html) Active PRs: - [#43834 [OID4VCI]: Realm-Configurable Time-Claim Normalization (Randomize/Round) to Mitigate Correlation](https://github.com/keycloak/keycloak/pull/43834) - [#44227 [OID4VCI] Redesign SDJwt API and handle keybinding JWT](https://github.com/keycloak/keycloak/pull/44227) - [#44037 [OID4VCI] Fix deprecated realm-scoped well-known endpoint access](https://github.com/keycloak/keycloak/pull/44037) - [#44029 [OID4VCI] VC of type oid4vc_natural_person has invalid id value](https://github.com/keycloak/keycloak/pull/44029) Merged PRs in this week: - [#44153 Use the unified constants class for sd-jwt/oid4vc standard data and claims](https://github.com/keycloak/keycloak/pull/44153) - [#44106 Sd-Jwt unit tests in the crypto/fips1402 module #44106](https://github.com/keycloak/keycloak/pull/44106) - [#43182 [OID4VCI] Relax CORS policy on credential offer endpoint](https://github.com/keycloak/keycloak/pull/43182) - [#43951 [OID4VCI]: Add backward compatibility for Draft 15 wallets (single proof support)](https://github.com/keycloak/keycloak/pull/43951) - [#44128 [OID4VCI]: Fix: Allow assignment of OID4VCI client scopes to clients in admin UI](https://github.com/keycloak/keycloak/pull/44128) Epic Issues: - [#43396 [OID4VCI] Implementing support for OID4VCI Final Version](https://github.com/keycloak/keycloak/issues/43396) Blog Posts: - https://github.com/ADORSYS-GIS/keycloak-web/pull/1 20251119 - UI-Ticket shall be submitted for review by thursday. - UI Ticket are not big. - Client Based Attestation Support being actively worked on. - PR sent by Thomas Diesler being reviewd by adorsys. - Marek: - Working on the JWT-SD: will wait for work of Pascal to be merged - Blog Post Draft: - Repo mentioned in the blog post not yet in SIG repo - Making post easierto consume - Ingrid: PR is merged so Vinod can clone. - Adorsys team could not get it to work with the multipass wallet. Trying other wallets. ### 6.a Token Status List Specifications: - [Token Status List](https://github.com/oauth-wg/draft-ietf-oauth-status-list?tab=readme-ov-file#implementations-open-source) 20251119 - No update this week. ### 7. Token Exchange Epic Issues: - https://github.com/keycloak/keycloak/issues/43151 : this is like an epic Ticket. - [#38335 External to internal token exchange](https://github.com/keycloak/keycloak/issues/38335) - [#40704 Internal to external token exchange](https://github.com/keycloak/keycloak/issues/40704) 20251119 - No update this week. - Still WiP on the Authorization Grant. - https://github.com/keycloak/keycloak/issues/43151 : this is like an epic Ticket. ### 8. Opentd4VCI Wallet Testing Issues: - [Test-setup for OpenID Foundation Conformance tests for OpenID4VCI Support #42505](https://github.com/keycloak/keycloak/issues/42505) ### Others - Dmitry is working on a concept on how to use third party extentions to extend the KC UI instead of forking everything. Looking for contributions. Ingrid is interested. - Thomas : update on conformance test automation. - Takashi and I held a small workshop last week to improve the test automation of the OpenID conformance tests. - Link on how to run: https://github.com/keycloak/keycloak-oauth-sig/tree/main/conformance-tests-env` ## Recordings https://us06web.zoom.us/rec/share/KDvqvjZAB8_jYchTRcmzmRmiqkKUFaTZTwW5SAAy2rqxzuq4wysMHH-FqP0NP-ai.HjIx-GGi43qcXTs8