Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • NOTE: As of October 26, 2020, quorum is 5 of 8. (Michael, Domenico, Peter, Sal, Thomas, Alec, Eve, Steve)

  • Voting:

    • Alec

    • Steve

    • Sal

  • Non-voting participants:

    • Scott

    • Chris

    • Hanfei

  • Regrets:

Quorum: No


Meeting Minutes

...

Continue discussion ‘UMA by example’ content

audience: NOT technical, business people - what value does uma provide a data custodian, users(?) - what value does uma provide the resource owner

  • problem that UMA addresses, user-mediate fine-grained authorization. person not present during access

  • physical access example(s), car or documents or airbnb(access to a physical space, RS) vs the specific thing (resource)

  • shift to access to digital resources/documents,

    • distributed nature of information: some at home, some with bank (safe deposit box), some with HCP,

    • controlling organization, who enforces access

  • GAP today: broadness of access, synchronous RO-only access, controlled by single org at a time

  • UMA applied to example

physical access vs digital access vs uma against use-case: car, documents, building access

General intro to Authorization: through example, lending

base example, lending car or documents? → broad authZ open garage everything is there. In uma, only the car is there

home example, loaning car in the garage

condo example, valet key

digital example: car manufacturer managed sharing,

uma example: user managed sharing

car, access to the garage, key to the car → broad since can access anything in the garage, key to glovebox. “Allowed to drive between 12-3, not more than 20mi”

condo concierge: RO not present, with someone enforcing my wishes

→ shift to digital

FAPI Part 1 Review and Discussion

...

Part 1: Baseline https://openid.net/specs/openid-financial-api-part-1-1_0.html

5.2.2. Authorization server

15. shall return the list of granted scopes with the issued access token if the request was passed in the front channel and was not integrity protected;

  • which request, token request? scopes in token response? when would there not be 'integrity protected'? there would always be TLS/client authn? is this for public clients?

17. should clearly identify the details of the grant to the user during authorization as in 16.18 of OIDC;

  • for pushed claims, would the Client have this responsibility? or would pushed claims need to be ‘off’ in FAPI

NOTE: The requirement to return the list of granted scopes allows clients to detect when the authorization request was modified to include different scopes. Servers must still return the granted scopes if they are different from those requested.

  • always return scopes or only under conditions of #15?

Could an UMA Auth Server support OIDC and the openid scope? tentative yes

  • there are naming differences eg redirect_uri vs claims_redirect_uri, code vs ticket

Overall, and UMA AS should be able to support FAPI basiline profile (part 1)

Policy Descriptions


AOB

Potential Future Work Items / Meeting Topics

...