# 2020-07-06 Authentication Panel ## Agenda * [Solid-OIDC Authentication Spec - Draft](https://github.com/solid/authentication-panel/blob/master/oidc-authentication.md) * Reviewing old issues * [Next week agenda](https://hackmd.io/-YbKjAv6R_acrogPU1qREQ) ## Present * Jackson Morgan * elf Pavlik * Dmitri Zagidulin ## Minutes ### [Solid-OIDC Authentication Spec - Draft](https://github.com/solid/authentication-panel/blob/master/oidc-authentication.md) - Jackson: Ephemeral Identity Providers - Dmitri: I think user may refer to self-issued - ...: In self-issued case IdP works as pass through. I don't know what client being IdP may mean. - Pavlik: we have existing issue for self-issued - Jackson: Possibly self-issued is out of scope for this draft. - Jackson: "The client presents its WebID to the IdP and requests an Authorization Code.", why is the client presenting its WebID. - Jackson: Mechanism by which IdP confirms that this WebID is owned by the app. - Jackson: I don't think the Basic Flow is detailed enough to understand the details of what's going on. Here I outline a process in more details: https://github.com/solid/authorization-panel/blob/master/proposals/TrustedAppsReplacement.md#general-networking-flow - Jackson: I it common to delegate term definitions to existing spec, for example RS as defined in OAuth2? - Dmitri: Yes I think it's common. - Jackson: With dynamic registration, we need to consider if client doesn't have to support it or server. It seems that at least on of them needs to support both. - Jackson: Aaron implementation used to require dynamic or static client registration and use of client secret to get refresh tokens. - Jackson: Does client have to request both id and access_token. In authorization request, you want response type ty be code but you also insert other response types as space delimited string. - Jackson: I don't see mention of sub claim in access token section except in example. - Dmitri: Why is the audience claim `solid`. - Pavlik: "Ephemeral clients MUST use DPoP-bound Access Tokens, however, the RS MAY allow registered clients to access resources using a traditional Bearer tokens.". I don't see how RS would tell if client regestered with AS or not. Maybe it tries to address that single-RS use case where RS and AS coupled together? - Jackson: I find it odd to call out *iat* but not *htu* and *htm* (post in issue 49). -