# SIG Breakout Session: 2025-11-26 - Date: 26 November 2025 - Time: 12:00 - 13:00 UTC in 1 hour 08:00 - 9:00 EDT (UTC-4) 12:00 - 13:00 GMT (UTC+0) 13:00 - 14:00 CET (UTC+1) 13:00 - 14:00 WAT (UTC+1) 14:00 - 15:00 EET (UTC+2) 17:30 - 18:30 IST (UTC+5:30) 21:00 - 22:00 JST (UTC+9) 22:00 - 23:00 AEST (UTC+10) Zoom Link: https://us06web.zoom.us/j/81611246656 ## Agenda Agenda Items to discuss ## Attendees - Takashi Norimatsu - Vinod Anandan - Ingrid Kamga - Rodrick Awambeng - Bertrand Ogen ## Notes Notes by Topic ## New Support ### 1. Workload/Agentic Identity Specifications: - [Transaction Tokens](https://datatracker.ietf.org/doc/draft-ietf-oauth-transaction-tokens/) - [OAuth Identity and Authorization Chaining Across Domains](https://datatracker.ietf.org/doc/draft-ietf-oauth-identity-chaining/) - [OAuth 2.0 Dynamic Client Registration with Trusted Issuer Credentials](https://datatracker.ietf.org/doc/draft-kasselman-oauth-dcr-trusted-issuer-token/) - [OAuth Client Registration on First Use with SPIFFE](https://datatracker.ietf.org/doc/draft-kasselman-oauth-spiffe/) - [OAuth SPIFFE Client Authentication](https://datatracker.ietf.org/doc/draft-schwenkschuster-oauth-spiffe-client-auth/) - [Identity Assertion Authorization Grant](https://datatracker.ietf.org/doc/draft-ietf-oauth-identity-assertion-authz-grant/) - [OAuth Client ID Metadata Document](https://datatracker.ietf.org/doc/draft-ietf-oauth-client-id-metadata-document/) 20251126 - No update ### 2. Shared Signals Framework (SSF) Specifications: - [OpenID Shared Signals Framework Specification 1.0 Final](https://openid.net/specs/openid-sharedsignals-framework-1_0-final.html) - [OpenID Continuous Access Evaluation Profile 1.0 Final](https://openid.net/specs/openid-caep-1_0-final.html) - [OpenID RISC Profile Specification 1.0](https://openid.net/specs/openid-risc-1_0-final.html) PoCs: - [Shared Signals Framework for Keycloak](https://github.com/identitytailor/keycloak-ssf-support) Issues: - [#43616 Add initial support for OpenID Shared Signals Framework](https://github.com/keycloak/keycloak/issues/43614) Active Draft PRs: [#43950 Initial support for Shared Signals Framework with Push Delivery](https://github.com/keycloak/keycloak/pull/43950) 20251126 - No update ### 3. OpenID Federation 1.0 (OIDFED) Specifications: - [OpenID Federation 1.0 - draft 44](https://openid.net/specs/openid-federation-1_0.html) Discussions: - [#31027Support for OpenID Federation 1.0](https://github.com/keycloak/keycloak/discussions/31027#discussioncomment-14727205) Epic Issues: - [#40509 OpenID Federation implementation](https://github.com/keycloak/keycloak/issues/40509) Slacks: - https://cloud-native.slack.com/archives/C096PUDTC3U - https://github.com/keycloak/keycloak/issues/42634 - https://github.com/keycloak/keycloak/issues/42635 20251126 - Today the OpenID Connect Working Group started a two-week Working Group Last Call (WGLC) for the OpenID Federation 1.0 specification. - PR will be updated ### 4. Attestation-Based Client Auth Specification: - [OAuth 2.0 Attestation-Based Client Authentication (ver 07)](https://datatracker.ietf.org/doc/draft-ietf-oauth-attestation-based-client-auth/) Discussion: [#40413 Support for OAuth 2.0 Attestation-Based Client Authentication](https://github.com/keycloak/keycloak/discussions/40413) PoCs : - https://github.com/thomasdarimont/keycloak/tree/poc/client-attestation Slacks: - [Discussion on OAuth Attestation-based client authentication](https://cloud-native.slack.com/archives/C05KR0TL4P8/p1758286805101949) 20251126 - See bellow (OID4VCI) ### 5. Model Context Protocol (MCP) Specifications: - [Version 2025-03-26: Authorization](https://modelcontextprotocol.io/specification/2025-03-26/basic/authorization) - Takashi: according my investigation, Keycloak supported this version. - [Version 2025-06-18: Authorization](https://modelcontextprotocol.io/specification/2025-06-18/basic/authorization) - Takashi: according my investigation, Keycloak supported this version partially. - [Version 2025-11-25: Authorization](https://modelcontextprotocol.io/specification/2025-11-25/basic/authorization) - Takashi: under investigation. I have found that Keycloak does not support [OAuth Client ID Metadata Document](https://www.ietf.org/archive/id/draft-ietf-oauth-client-id-metadata-document-00.html) that the version of MCP requires an authorization server to support as "SHOULD" feature. Active PRs: - [#35711 Add support for RFC 8707 OAuth2 Resource Indicators](https://github.com/keycloak/keycloak/pull/35711) - Takashi: the PR is needed to make keycloak fully complies with MCP version 2025-06-18 and the future versions. 20251126 - Takashi: MCP ver 2025-11-25 was released. I have investigating its contents. - Client-ID-Metadata not yet supported by Keycloak. - Takashi to perform gap analysis and provide result by next week. ## Refinement ### 6. OpenID Verifiable Credentials Issuance (OpenID4VCI) Specifications: - [OpenID for Verifiable Credential Issuance 1.0 (FINAL)](https://openid.net/specs/openid-4-verifiable-credential-issuance-1_0-final.html) Active PRs: - [#44029 [OID4VCI] VC of type oid4vc_natural_person has invalid id value](https://github.com/keycloak/keycloak/pull/44029) - [#44370 Make sd-jwt key binding verification work with EdDSA keys](https://github.com/keycloak/keycloak/pull/44370) Merged PRs in this week: - [#43834 [OID4VCI]: Realm-Configurable Time-Claim Normalization (Randomize/Round) to Mitigate Correlation](https://github.com/keycloak/keycloak/pull/43834) - [#44227 [OID4VCI] Redesign SDJwt API and handle keybinding JWT](https://github.com/keycloak/keycloak/pull/44227) - [#44037 [OID4VCI] Fix deprecated realm-scoped well-known endpoint access](https://github.com/keycloak/keycloak/pull/44037) Epic Issues: - [#43396 [OID4VCI] Implementing support for OID4VCI Final Version](https://github.com/keycloak/keycloak/issues/43396) Blog Posts: - https://github.com/ADORSYS-GIS/keycloak-web/pull/1 2025-11-26 - PR https://github.com/keycloak/keycloak/pulls?q=is%3Apr+is%3Aopen+label%3Aarea%2Foid4vc+ - Stefan will review: https://github.com/keycloak/keycloak/pull/44389 - adorsys Team will review: https://github.com/keycloak/keycloak/pull/44471 - Client Attestation: Gap between spec and work done by Thomas, issue to be created by adorsys team and work schedule to start in January. - Blog Post: - Rodrick: removing technical details - Ingrid: CURL steps to be replaced with screen shots - Wallet: - Forkim: most of them is working on draft 15 - Labelling of PR: please notify Marek after creating a ticket so it can be labelled. - Preview - Paritiy between API configuration and UI - Documentation - Blog Post. - Feature shall be production ready. - Internal presentation by Marek to keycloak team in December with the feature OID4VCI - Conformance test: - Keycloak is compliant in every possible way, - Even with recent changes made by Thomas. - No much updates expected. ### 6.a Token Status List Specifications: - [Token Status List](https://github.com/oauth-wg/draft-ietf-oauth-status-list?tab=readme-ov-file#implementations-open-source) 20251116 - No update. ### 7. Token Exchange Epic Issues: - https://github.com/keycloak/keycloak/issues/43151 : this is like an epic Ticket. - [#38335 External to internal token exchange](https://github.com/keycloak/keycloak/issues/38335) - [#40704 Internal to external token exchange](https://github.com/keycloak/keycloak/issues/40704) 20251126 - No update from last week. - KC team is working on RFC7523 (JWT Grant) as a mean to support authorization chaining accross domains. - Other use cases of Token Exchange V1 to be pursued next year. ### 8. Opentd4VCI Wallet Testing Issues: - [Test-setup for OpenID Foundation Conformance tests for OpenID4VCI Support #42505](https://github.com/keycloak/keycloak/issues/42505) 20251126 - Forkim: most of them is working on draft 15 - Wallets tested: - Niscy (https://github.com/niscy-eudiw/eudi-app-android-wallet-ui) - Niscy wallet [KO] - Only works with a preconfigured list of issuers so can't test with Keycloak, nor can we confirm if it is running on OID4VCI Final. - Valera (https://github.com/a-sit-plus/valera) - Valera [OK] - Works but with Patch code. Probably still running on Draft 15 like the Lissi wallet. - Ubique (https://alpaka.ubique.ch/shared/app/build/xT7xWvQmTe) - Issuance Flow on keycloak works perfectly. - Might be on a later draft - Ubique [KO] - Can't accept credential issued by Keycloak. Quite certainly running on Draft 13. - Heidi (another wallet by Ubique) [OK] - Works but with Patch code. Probably still running on Draft 15 like the Lissi wallet. ### Others ## Recordings https://us06web.zoom.us/rec/share/6sFDxupPDNuy0t21r5ld3unPuMExcmF2QEgYEi_XnO4HUUMf5p_RTVaiN4LNAQ3K.G4DD9QpK6TY83W8z