We should talk next time we meet at IETF. This is something I've been
working on for a very long time.

Most recently, I've been working on prototyping a similar thing leveraging
an experimental feature in FedCM, called "IDP Registration", enabling an RP
to use an arbitrary IDP rather than one from a fixed list like "Sign in
with Google". FedCM solves the UX problem that has plagued adoption of
"bring your own IDP" efforts like OpenID in the past.

I have a blog post about this with a demo video and details on how to put
together the various OAuth building blocks to make it happen:

https://aaronparecki.com/2024/05/12/3/fedcm-for-indieauth

There's also a handful of people who have spun up IDPs that support this
with their own domain and trying out the FedCM feature, you can see all the
details here: https://github.com/w3c-fedid/idp-registration/issues/2

Aaron


On Tue, Jan 21, 2025 at 10:19 AM Phillip Hallam-Baker <ph...@hallambaker.com>
wrote:

> On Tue, Jan 21, 2025 at 12:30 PM Warren Parad <wpa...@rhosys.ch> wrote:
>
>> If I understand correctly, I don't like this at all. In the OAuth context
>> you can already use (nay, must use) your DNS as the Issuer for these tokens
>> and specify the appropriate user ID in the *sub *claim of the generated
>> identity tokens. Given this is already possible, and realistically up to
>> the AS Issue to determine which values to populate into the *sub. *The
>> fact that the Subject claim should really be opaque to the resultant OAuth
>> compatible application, I'm not really sure what is being requested here.
>>
>> Based on what you are saying, what existing standard needs to be created
>> or changed to support this, because from my perspective, this is already
>> the current state of the world, isn't it?
>>
>
> Standards are what people actually use.
>
> Right now, I cannot go to a Web site and expect them to support use of my
> DNS handle, even though almost all the infrastructure required to support
> it already exists.
>
> IETF has been talking about decentralization, here is a mechanism that can
> achieve it. And its not just the IETF. There are a lot of governments who
> are rather upset at the walled-garden cartels and some have begun the
> process of breaking them up.
>
>
> Standards are not just about agreeing ways to do things, it is the process
> of getting widespread agreement to use the same approach.
>
> As for the need for documentation, I am utterly unable to understand what
> you are saying about checking the sub field and the
> ATprotocol documentation on it is opaque at best. And a really good rule of
> thumb in things security is that where the descriptions are unclear, there
> are at best non-conforming deployments that have security vulnerabilities.
>
> I am highly skeptical of Passkeys because the 'documentation' they have
> provided is mostly marketecture with pointers to documents that spend more
> time defining unhelpful jargon than actually explaining anything.
>
> If this is to become a widely supported approach, we need a profile to
> describe the particular way to go about it. What we have now is a stack of
> specifications that have evolved over a period of 20 years designed to
> support a slightly different objective.
>
>
> _______________________________________________
> OAuth mailing list -- oauth@ietf.org
> To unsubscribe send an email to oauth-le...@ietf.org
>
_______________________________________________
OAuth mailing list -- oauth@ietf.org
To unsubscribe send an email to oauth-le...@ietf.org

Reply via email to