# SIG Breakout Session: 2025-10-29
- Date: 29 October 2025
- Time:
11:00 - 12:00 UTC in 1 hour
07:00 - 08:00 EDT (UTC-4)
12:00 - 13:00 BST (UTC+1)
13:00 - 14:00 CEST (UTC+2)
14:00 - 15:00 EEST (UTC+3)
16:30 - 17:30 IST (UTC+5:30)
20:00 - 21:00 JST (UTC+9)
21:00 - 22:00 AEST (UTC+10)
## Agenda
Agenda Items to discuss
## Attendees
- Bertrand Ogen
- Vinod Anandan
- Pascal Knüppel
- Hugo Hakim Damer
- Rodrick Awambeng
- Ingrid Kamga
- Assah Bismark
## Notes
Notes by Topic
## New Support
### 1. Workload/Agentic Identity
Specification:
- [Transaction Tokens](https://datatracker.ietf.org/doc/draft-ietf-oauth-transaction-tokens/)
- [OAuth Identity and Authorization Chaining Across Domains](https://datatracker.ietf.org/doc/draft-ietf-oauth-identity-chaining/)
- [OAuth 2.0 Dynamic Client Registration with Trusted Issuer Credentials](https://datatracker.ietf.org/doc/draft-kasselman-oauth-dcr-trusted-issuer-token/)
- [OAuth Client Registration on First Use with SPIFFE](https://datatracker.ietf.org/doc/draft-kasselman-oauth-spiffe/)
- [OAuth SPIFFE Client Authentication](https://datatracker.ietf.org/doc/draft-schwenkschuster-oauth-spiffe-client-auth/)
- [Identity Assertion Authorization Grant](https://datatracker.ietf.org/doc/draft-ietf-oauth-identity-assertion-authz-grant/)
Oct 29th 2025
### 2. Shared Signals Framework (SSF)
Specification:
- [OpenID Shared Signals Framework Specification 1.0 Final](https://openid.net/specs/openid-sharedsignals-framework-1_0-final.html)
- [OpenID Continuous Access Evaluation Profile 1.0 Final](https://openid.net/specs/openid-caep-1_0-final.html)
- [OpenID RISC Profile Specification 1.0](https://openid.net/specs/openid-risc-1_0-final.html)
PoC: [Shared Signals Framework for Keycloak](https://github.com/identitytailor/keycloak-ssf-support)
Oct 29th 2025:
### 3. OpenID Federation 1.0 (OIDFED)
Specification:
- [OpenID Federation 1.0 - draft 43](https://openid.net/specs/openid-federation-1_0.html)
Discussion: https://github.com/keycloak/keycloak/discussions/31027#discussioncomment-14727205
Epic Issue: [#40509](https://github.com/keycloak/keycloak/issues/40509)
Slack: https://cloud-native.slack.com/archives/C096PUDTC3U
https://github.com/keycloak/keycloak/issues/42634
https://github.com/keycloak/keycloak/issues/42635
Oct 29th 2025:
### 4. Attestation-Based Client Auth
Specification:
- [OAuth 2.0 Attestation-Based Client Authentication](https://datatracker.ietf.org/doc/draft-ietf-oauth-attestation-based-client-auth/)
Ticket: [#39287](https://github.com/keycloak/keycloak/issues/39287)
Discussion: [#40413](https://github.com/keycloak/keycloak/discussions/40413)
PoC : https://github.com/thomasdarimont/keycloak/tree/poc/client-attestation
Slack: Discussion on OAuth Attestation-based client authentication https://cloud-native.slack.com/archives/C05KR0TL4P8/p1758286805101949
10.29.2025
- Clarity on : https://github.com/oauth-wg/draft-ietf-oauth-attestation-based-client-auth/issues/152
- Pascal shared his comments on testing wallets: https://github.com/keycloak/keycloak/issues/42505
- For the funke event adorsys used the LISSI Wallet. We tested many wallets and the LISSI wallet was the closest.
- Stefan could have this wallet working: https://github.com/eu-digital-identity-wallet/eudi-app-android-wallet-ui
- Please let us all gather the comments in the ticket: https://github.com/keycloak/keycloak/issues/42505
- Pascal suggests to add a proof parameter to make it backward compatible. Changed allready made by Ingrid and adorsys team. Adorsys team will submit a pull request.
Oct 29th 2025
### 5. Model Context Protocol (MCP)
Specification:
- [Base Protocol - Authorization](https://modelcontextprotocol.io/specification/draft/basic/authorization)
Pull request active: [#35711](https://github.com/keycloak/keycloak/pull/35711)
29 October 2025:
Takashi: I am now reviewing the following PR.
Add CORS support to OIDC dynamic client registration endpoints
https://github.com/keycloak/keycloak/pull/43625
The PR will resolve the issue that prevent MCP Inspector, MCP project’s official tool for debugging MCP Client/Servers, from working with Keycloak.
Support dynamic client registration for MCP Inspector
https://github.com/keycloak/keycloak/issues/43514
I confirmed that the MCP Inspector works well with this Keycloak.
### 5a. OAuth2 Resource Indicators
- Oct 29th 2025
https://github.com/keycloak/keycloak/pull/35711#issuecomment-3380054867
## Refinement
### 6. OpenID Verifiable Credentials Issuance (OpenID4VCI)
Specification:
- [OpenID for Verifiable Credential Issuance 1.0 (FINAL)](https://openid.net/specs/openid-4-verifiable-credential-issuance-1_0-final.html)
- Gap Analysis to Final Spec: https://github.com/keycloak/keycloak/issues/43396
Oct 29th 2025:
- Takashi sent an email, will be reviewing the PR: https://github.com/keycloak/keycloak/pull/43215
- pascal is requesting to review/approve the same PR.
- This PR is also reviewed by takashi: https://github.com/keycloak/keycloak/pull/43182. All comment were reviewed.
- Help requested from SIG Members: https://github.com/keycloak/keycloak/pull/43506
- Marek review waiting for Ingrid address: https://github.com/keycloak/keycloak/pull/43599#discussion_r2450929366
- Pascal has created a ticket to control the parameter KeyAttestationRequired: https://github.com/keycloak/keycloak/issues/43801
### 6.a Token Status List
- Adorsys implement's draft 12 in concordance with the draft 16 of OID4VCI. Adorsys is planing to send a pull request to push the code to main stream!
### 7. Token Exchange
Epic Issue: [External to internal token exchange](https://github.com/keycloak/keycloak/issues/38335)
Epic Issue: [Internal to external token exchange](https://github.com/keycloak/keycloak/issues/40704)
29th Oct 2025:
### Others
## Recordings