# SIG Breakout Session: 2025-10-15 - Date: 15 October 2025 - Time: 11:00 - 12:00 UTC in 1 hour 07:00 - 08:00 EDT (UTC-4) 12:00 - 13:00 BST (UTC+1) 13:00 - 14:00 CEST (UTC+2) 14:00 - 15:00 EEST (UTC+3) 16:30 - 17:30 IST (UTC+5:30) 20:00 - 21:00 JST (UTC+9) 21:00 - 22:00 AEST (UTC+10) ## Agenda Agenda Items to discuss ## Attendees - Bertrand Ogen ## Notes 15 October 2025: - Takashi: I proposed maintainers for running OIDF conformance tests before releasing every minor and major version release. I will disscuss it with them. ## New Support ### 1. Workload/Agentic Identity Specification: - [Transaction Tokens](https://datatracker.ietf.org/doc/draft-ietf-oauth-transaction-tokens/) - [OAuth Identity and Authorization Chaining Across Domains](https://datatracker.ietf.org/doc/draft-ietf-oauth-identity-chaining/) - [OAuth 2.0 Dynamic Client Registration with Trusted Issuer Credentials](https://datatracker.ietf.org/doc/draft-kasselman-oauth-dcr-trusted-issuer-token/) - [OAuth Client Registration on First Use with SPIFFE](https://datatracker.ietf.org/doc/draft-kasselman-oauth-spiffe/) - [OAuth SPIFFE Client Authentication](https://datatracker.ietf.org/doc/draft-schwenkschuster-oauth-spiffe-client-auth/) - [Identity Assertion Authorization Grant](https://datatracker.ietf.org/doc/draft-ietf-oauth-identity-assertion-authz-grant/) Issue: - [Support authenticating clients with SPIFFE/SPIRE](https://github.com/keycloak/keycloak/issues/41907) PoC: - [Keycloak and SPIRE for Agent Identity](https://github.com/christian-posta/keycloak-agent-identity) - [keycloak-spiffe](https://github.com/CarrettiPro/keycloak-spiffe) Epic Issue: - [Preview federated client authentication](https://github.com/keycloak/keycloak/issues/42230) Oct 15 2025 - New Proposal: https://datatracker.ietf.org/doc/draft-schwenkschuster-oauth-spiffe-client-auth/ - Main difference is the SPIFFE Key Distribution. - e.g Networking based trust. - For JWT: Does not necessary carry an issuer claim - For X509: special processing rules. (not implemented in keycloak as of now) - There a couple of null pointer exceptions in the code, being fixed by Stian. Use 26.4.1... Oct 29th 2025 ### 2. Shared Signals Framework (SSF) Specification: - [OpenID Shared Signals Framework Specification 1.0 Final](https://openid.net/specs/openid-sharedsignals-framework-1_0-final.html) - [OpenID Continuous Access Evaluation Profile 1.0 Final](https://openid.net/specs/openid-caep-1_0-final.html) - [OpenID RISC Profile Specification 1.0](https://openid.net/specs/openid-risc-1_0-final.html) PoC: [Shared Signals Framework for Keycloak](https://github.com/identitytailor/keycloak-ssf-support) ### 3. OpenID Federation 1.0 (OIDFED) Specification: - [OpenID Federation 1.0 - draft 43](https://openid.net/specs/openid-federation-1_0.html) Epic Issue: [#40509](https://github.com/keycloak/keycloak/issues/40509) Slack: https://cloud-native.slack.com/archives/C096PUDTC3U https://github.com/keycloak/keycloak/issues/42634 https://github.com/keycloak/keycloak/issues/42635 Oct 15th 2025 - Costas: no update. - Keycloak shall support both SPIFFE and OpenID Federation. Even though similar, is not the same. OIDF need trust anchor in order to work. - Consolidation of the whole trust work in the keycloak echosystem is going on. Oct 29th 2025 ### 4. Attestation-Based Client Auth Specification: - [OAuth 2.0 Attestation-Based Client Authentication](https://datatracker.ietf.org/doc/draft-ietf-oauth-attestation-based-client-auth/) Ticket: [#39287](https://github.com/keycloak/keycloak/issues/39287) Discussion: [#40413](https://github.com/keycloak/keycloak/discussions/40413) PoC : https://github.com/thomasdarimont/keycloak/tree/poc/client-attestation Slack: Discussion on OAuth Attestation-based client authentication https://cloud-native.slack.com/archives/C05KR0TL4P8/p1758286805101949 Oct 15 2025 Interresting Discussion: https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/issues/152 - Nature of the Client: Public or Confidential Oct 29th 2025 ### 5. Model Context Protocol (MCP) Specification: - [Base Protocol - Authorization](https://modelcontextprotocol.io/specification/draft/basic/authorization) Pull request active: [#35711](https://github.com/keycloak/keycloak/pull/35711) 15 October 2025: - Takashi: 1 of 2 issues were resolved. (no progress, 50%) - There is an issue using keycloak with MCP Inspector. As MCP Inspector tries to register itself with KC using a cross origine JS code. But not supported by keycloak. KC does not support CORS. MCP Spec does not mandate support of CORS either. - MCP Dev Summit London: Oct 2.: - Nov 25 Major version of MCP spec will be released. - Especting major changes. - Will require gap analysis with KC implementeion. - DCR version will be released 2 weeks before. Takashi will do a gap analysis after this release. Oct 29th 2025 - Takashi: I am now reviewing the following PR. Add CORS support to OIDC dynamic client registration endpoints https://github.com/keycloak/keycloak/pull/43625 The PR will resolve the issue that prevent MCP Inspector, MCP project’s official tool for debugging MCP Client/Servers, from working with Keycloak. Support dynamic client registration for MCP Inspector https://github.com/keycloak/keycloak/issues/43514 I confirmed that the MCP Inspector works well with this Keycloak. ### 5a. OAuth2 Resource Indicators - Review of PR started: https://github.com/keycloak/keycloak/pull/35711#issuecomment-3380054867 - MCP Client must support RFC8707 - Might be adavisable to keycloak to be compliant to RFC 8707. Oct 29th 2025 ## Refinement ### 6. OpenID Verifiable Credentials Issuance (OpenID4VCI) Specification: - [OpenID for Verifiable Credential Issuance 1.0 (FINAL)](https://openid.net/specs/openid-4-verifiable-credential-issuance-1_0-final.html) Epic Issues: - [Promote OID4VCI from experimental to preview](https://github.com/keycloak/keycloak/issues/42889) - [[OID4VCI] Implementing support for OID4VCI Final Version](https://github.com/keycloak/keycloak/issues/43396) Open PRs: - [[OID4VCI] Relax CORS policy on credential offer endpoint](https://github.com/keycloak/keycloak/pull/43182) - [[OID4VCI] Ensure authorization_details from PAR requests are properly returned in token responses](https://github.com/keycloak/keycloak/pull/43215) 15 October 2025: - Takashi: I will review them, but would appreciate it if other member also could review them. - Status - Done with draft 15 & 16 and done with the conformance tests - promotion epic: https://github.com/keycloak/keycloak/issues/42889 - Repo to have epic tickets tracked by the KC team: https://github.com/keycloak/keycloak-web - Gap Analysis to Final Spec: https://github.com/keycloak/keycloak/issues/43396 - Support of ISO mdoc in the planning by adorsys team. - Takashi: Webauthn4j libs already support CBOR. So Takashi expect CBOR to be in there. https://github.com/webauthn4j/webauthn4j. Keycloak uses webauthn4j library... - Todo: check to see what lib webauthn4j uses for cbor. - WebAuthn4J uses CBOR to parse and process the binary-encoded attestation objects, authenticator data, and cryptographic keys that are fundamental to WebAuthn authentication operations, see(https://webauthn4j.github.io/webauthn4j/en/#custom-converter-implementation). Oct 29th 2025 - Takashi: I am now reviewing the following PR. It takes some time to complete the review. [OID4VCI] Ensure authorization_details from PAR requests are properly returned in token responses https://github.com/keycloak/keycloak/pull/43215 ### 7. Token Exchange Epic Issue: [External to internal token exchange](https://github.com/keycloak/keycloak/issues/38335) Epic Issue: [Internal to external token exchange](https://github.com/keycloak/keycloak/issues/40704) 15 October 2025: - Takashi: It seems that there is no progress. Oct 29th 2025 ### Others ## Recordings