$$π∆{}[]

OpenID

https://openid.net The Internet Identity Layer
Sat, 28 Dec 2019 12:05:11 +0000
en-US

hourly

1

Home

OpenID Connect for Identity Assurance now has a dedicated home
https://openid.net/2019/12/28/openid-connect-for-identity-assurance-now-has-a-dedicated-home/ Sat, 28 Dec 2019 12:05:11 +0000 Torsten Lodderstedt
News
OpenID Connect
Working Group
eKYC
Identity Assurance

OpenID Connect for Identity Assurance now has a dedicated home


The OpenID Foundation has started the new eKYC and Identity Assurance Working Group, which will develop OpenID specifications for providing Relying Parties with identity information, i.e. Verified Claims, along with an explicit attestation of the verification status of those Claims (what, how, when, according to what rules, using what evidence). “eKYC” is an industry acronym […]]]>
<![CDATA[The OpenID Foundation has started the new eKYC and Identity Assurance Working Group, which will develop OpenID specifications for providing Relying Parties with identity information, i.e. Verified Claims, along with an explicit attestation of the verification status of those Claims (what, how, when, according to what rules, using what evidence). “eKYC” is an industry acronym for “electronic Know Your Customer”. The starting point will be the recently approved OpenID Connect for Identity Assurance draft that was developed by the OpenID Connect Working Group.

More information about the working group can be found at https://openid.net/wg/ekyc-ida/. This page includes information on joining the working group and its mailing list. The first official call of the new eKYC and Identity Assurance working group will take place on the 8th of January 2020 at 4pm (CET).

Notice of Vote for Second Implementer’s Draft of OpenID Connect Federation Specification
https://openid.net/2019/12/13/notice-of-vote-for-second-implementers-draft-of-openid-connect-federation-specification/ Sat, 14 Dec 2019 03:42:50 +0000 Mike Jones
News
OpenID Connect
Specs
Working Group
federation
Implementer’s Draft
Public Review
specification
vote

Notice of Vote for Second Implementer’s Draft of OpenID Connect Federation Specification


The official voting period will be between Monday, December 16, 2019 and Tuesday, January 7, 2020, following the 45 day review of the specification. For the convenience of members, voting will actually open on Monday, December 16, 2019 for members who have completed their reviews by then, with the voting period ending on Tuesday, January […]]]>
<![CDATA[The official voting period will be between Monday, December 16, 2019 and Tuesday, January 7, 2020, following the 45 day review of the specification. For the convenience of members, voting will actually open on Monday, December 16, 2019 for members who have completed their reviews by then, with the voting period ending on Tuesday, January 7, 2020, running for extra time because of the holidays.

The OpenID Connect Working Group page is https://openid.net/wg/connect/. If you’re not already a member, or if your membership has expired, please consider joining to participate in the approval vote. Information on joining the OpenID Foundation can be found at https://openid.net/foundation/members/registration.

The vote will be conducted at https://openid.net/foundation/members/polls/196.

– Michael B. Jones, OpenID Foundation Secretary

“Plays Well with Others”, the OpenID Foundation Recognized as a Global Top 10 Influencing Organization in Digital Identity
https://openid.net/2019/12/13/plays-well-with-others-the-openid-foundation-recognized-as-a-global-top-10-influencing-organization-in-digital-identity/ Fri, 13 Dec 2019 15:28:22 +0000 Don Thibeau
Foundation
News
Dakota Gruener
digital identity
Emma Lindley
Financial Data and Technology Association
financial data exchange
GÉANT Association
goode intelligence
GSMA
ID2020
ID4D
liaison agreements
liaisons
open banking implementation entity
pam dingle
top 10 influencing organization
Vyjayanti Desai
women in identity

“Plays Well with Others”, the OpenID Foundation Recognized as a Global Top 10 Influencing Organization in Digital Identity


The OpenID Foundation has been recognized in the recently published The Digital Identity Report – The Global Opportunity for Verified Citizen & Consumer ID, as one of the top 10 global digital identity-influencing organizations that includes the OpenID Foundation. Alan Goode, founder and CEO of Goode Intelligence and author of the report, said “the digital identity […]]]>
<![CDATA[The OpenID Foundation has been recognized in the recently published The Digital Identity Report – The Global Opportunity for Verified Citizen & Consumer ID, as one of the top 10 global digital identity-influencing organizations that includes the OpenID Foundation.

Alan Goode, founder and CEO of Goode Intelligence and author of the report, said “the digital identity industry is incredibly vibrant with many influencing organisations shaping how digital identity is designed and deployed. These 10 organisations represent those that we have found to be the most influential throughout our research and we are delighted to announce the names of these highly deserving organisations today.”

The Digital Identity Report examines the market for both government and commercial scheme issued digital identities around the world in three digital identity models: Centralised, Federated and Self-Sovereign. The 230-page report includes a comprehensive review of current global adoption, market analysis including key drivers and barriers for adoption, technology analysis and profiles of companies supplying products and services in this area along with detailed (regional and global) for digital identity (segmented into current important vertical sectors), biometric technology and revenue within the six-year period 2020 to 2025.

Technical standards are only as good as their implementations. The Foundation owes much of its success as a leader in digital identity through a focus on liaison agreements with leading organizations in specific sectors. The work of the Financial Grade API Working Group helps extend a wide variety of implementations of OpenID Connect profiles while also driving some of these liaison relationships. Recent examples of these liaison relationships include our member organizations the GSMA and the UK’s Open Banking Implementation Entity (OBIE) as well as the Financial Data Exchange (FDX), the Financial Data and Technology Association (FDATA) and others.

Liaison agreements are only as good as the concrete value they produce. The OIDF’s Board recently approved substantial investments of human and financial capital in our partnerships in 2020. We’ve donated exhibition space to the Women in Identity at the upcoming Identiverse Conference. We’ve recently approved funding of federation standards development to continue our successful collaboration with Europe’s GÉANT Association. Our close coordination will be demonstrated throughout 2020 in a major conference in Tokyo hosted by the OpenID Foundation Japan, and in the UK in joint workshops with the Open Identity Exchange (OIX),

Collaboration is only as good as the commitment of people. Therefore, on behalf of the OpenID Foundation board of directors, I would like to congratulate our friends and colleagues Vyjayanti Desai of the World Bank’s ID4D, Dakota Gruener at ID2020, Emma Lindley and Pam Dingle, Co-Founders of the Women in Identity for much deserved recognition in the The Digital Identity Report. We look forward to continuing to work with these organizations and others to help enable digital identities globally.

Don Thibeau

OpenID Foundation Executive Director

OpenID Summit Tokyo 2020 and Side Events Registrations Are Open
https://openid.net/2019/12/06/openid-summit-tokyo-2020-and-side-events-registrations-are-open/ Fri, 06 Dec 2019 12:29:14 +0000 Nat Sakimura
Japan
Summit Events
Technology Events
events
OpenID Summit
Tokyo

OpenID Summit Tokyo 2020 and Side Events Registrations Are Open


Every four years, OpenID Foundation Japan has an educational meeting called “OpenID Summit Tokyo”. The next one is coming up on January 24, 2020. This year it will be at a brand new venue called Shibuya Stream Hall in Shibuya, Tokyo. The schedule is as follows: OpenID Summit Tokyo 2020 Jan 24, 2020 @ Shibuya […]]]>
<![CDATA[

Every four years, OpenID Foundation Japan has an educational meeting called “OpenID Summit Tokyo”. The next one is coming up on January 24, 2020. This year it will be at a brand new venue called Shibuya Stream Hall in Shibuya, Tokyo.

The schedule is as follows:

OpenID Summit Tokyo 2020

Jan 24, 2020 @ Shibuya Stream Hall

Time Grand Hall Breakout Room
10:00-10:10 Opening Remark Masanori Kusunoki, Chair, OpenID Foundation Japan
10:10-10:40 Keynote 1 Identity 2020, 2025, and 2030 Ian Glazer, Director, Salesforce
10:40-11:10 Keynote 2 True Human Identity in the Digital Realm Kim Cameron Talk to Evangelists
11:10-11:40 Keynote 3 Enabling large-scale multi-party federations with OpenID Connect Mike Jones Talk to Evangelists
11:40-12:30 Break
12:30-13:00 Open Banking beyond PSD2 in the EU Torsten Lodderstedt Yes Device Identity as Yet Untold – Enterprise Security and Device Identity (Kengo Suzuki)
13:00-13:30 Financial API Updates WebAuthn using Cloud-assisted BLE (caBLE) (Yoshihiko Nagoya, Lepidum)
13:30-14:00 Updates on OIDF-J KYC WG Naohiro Fujie, Member of the board, OpenID Foundation Japan Digital-Keep platform that enables secure rights transactions through the establishment of Digital Identity and eKYC/OIDC (Hiroshi Yamamoto, BitKey)
14:00-14:30 Updates on the FIDO/eKYC/DID in Korea and the prospects on the future (Bradly Kim, R&D Center/CTO, RaonSecure Co., Ltd.) Updates on the specs surrounding Native Apps and OpenID Connect (Kazuki Tsuzuki, Yahoo Japan)
14:30-14:50 Break
14:50-15:20 Sponsor Session (1): Identity proofing as the key to the second generation IDaaS – NIST, Supply Chain Security and Orphan ID – (Jun’ichi Egawa, CEO, Exgen Network Inc.) Authentication Design Patterns using FIDO (WebAuthN) (Toshiki Matsui, KDDI)
15:20-15:50 Sponsor Session (2): A deployment case on the unified secure identity management with FIDO and Social Network Identities – Introduction to a cloud identity platform “SELMID” (Kyoka Hanai, Western Japan Business Development Team, CTC Solutions) Introduction to OpenID Connect Client Initiated Backchannel Authentication Flow (CIBA)– New User Experience and implementation examples (Takehisa Shibata, Takumi Akaboshi, NRI Secure Technologies)
15:50-16:20 Updates on the gBizID that utilizes OpenID Connect (Hisafumi Mitsushio, Ministry of Economy, Advisor to CIO, Trade and Industry, Japan)OpenID Connect Our Identity Experience (Andrew Hindle, Board Member, IDPro; Content Chair, Identiverse)
16:20-16:50 Research data management space that NII promotes (Kaz Yamaji, Professor, National Insititute of Informatics)
16:50-17:10 Break
17:10-17:40 Closing Keynote: No ID, No DX Nat Sakimura, Chairman, OpenID Foundation
17:40-17:50 Closing remarks: Masanori Kusunoki, Chairman, OpenID Foundation Japan

To register, go to: https://openid.connpass.com/event/157830/

There are a few side events planned as well.


AB/Connect WG F2F / Workshop

Jan 23 (Thursday) 3:00 – 18:00 @ NRI Otemachi office (just beside the Palace) on the Connect Strategy/Next Steps.

Agenda:

  1. Strategy session on how to propagate Connect to the enterprise world.
  2. Plan out OpenID Connect 1.1 that leverages OAuth JAR
  3. Plan out the OpenID Connect Self-Issued spec. (and DID thing perhaps.)
  4. Strategy to propagate Connect to R&E


Self-Sovereign Identity Day

Jan 27 (Monday) 10:00 – 17:00 @ Sheraton Grande Ocean Resort (Miyazaki)


eKYC Workshop led by Torsten Lodderstedt and Naohiro Fujie with eKYC Discussion Group in OIDF-J
.

Jan 28 (Tuesday) 15:00 – 18:00 @ NRI Otemachi Office

How to Request Seats for Side Events

The capacity of the side events are extremely limited, especially for the WG meeting and eKYC Workshop. There is no guarantee for reserving a seat; in fact, it could be rather difficult. However, if you are interested to join, please make a request to OpenID Foundation Chairman Nat Sakimura through the following Google Form: https://forms.gle/2utHiJW9SuS8iAHD8

No guests that are not pre-registered and is assigned a seat will be admitted to the venue.

OpenID Foundation Launches New Microsite Focused on Open Banking and Fintech Developers
https://openid.net/2019/12/04/openid-foundation-launches-new-microsite-focused-on-open-banking-and-fintech-developers/ Wed, 04 Dec 2019 12:34:43 +0000 Mike Leszcz
FAPI
Foundation
News
developers resources
Don Thibeau
Financial-grade API
open banking
openid
OpenID Connect

OpenID Foundation Launches New Microsite Focused on Open Banking and Fintech Developers


The OpenID Foundation has launched a new microsite focused on global open banking initiatives and providing resources for fintech developers implementing the Foundation’s Financial-grade API (FAPI). In 2017, the OpenID Foundation’s Financial-grade API (FAPI) Working Group published specifications enabling high-security API access, suitable for accessing financial data and facilitating financial transactions. In 2018, the UK […]]]>
<![CDATA[The OpenID Foundation has launched a new microsite focused on global open banking initiatives and providing resources for fintech developers implementing the Foundation’s Financial-grade API (FAPI).

In 2017, the OpenID Foundation’s Financial-grade API (FAPI) Working Group published specifications enabling high-security API access, suitable for accessing financial data and facilitating financial transactions. In 2018, the UK Open Banking Implementation Entity (OBIE) adopted the FAPI specifications and the Foundation’s self-certification test suite as part of their Open Banking platform. FAPI-based Open Banking APIs are in now in production use in the US, Europe and elsewhere. In April 2019, the OpenID Foundation extended its Certification Program to provide self-certification for FAPI implementations.

FAPI work is seen by many as key to enabling incumbent and start-up financial services players build products, platforms and services consistent with the Payment Services Directive Two (PSD2). Most importantly, it gives end-users more control and security in financial interactions, while also assuring their privacy in conformance to GDPR.

“As a new wave of developers from the fintech community engage with OpenID Connect and FAPI, the Foundation has invested in new resources to help guide developers leading global open banking initiatives”, said Don Thibeau, OpenID Foundation Executive Director. “Many from the fintech community are getting up to speed with both OpenID Connect and FAPI. The new microsite provides an educational resource free of charge to anyone at any time for how OAuth, OpenID and FAPI specifications work together. It’s an evolving resources aimed to highlight global open banking initiatives by inviting content from members and contributors to benefit the community as a whole.”

The launch of this new OpenID Foundation microsite coincides with the Financial Data and Technology Association (FDATA) Open Finance Summit & Awards 2019. OIDF Chairman Nat Sakimura is among those recognized for an “Open Banking Hero Award”.

“Nat’s leadership in the development of the Financial-grade API (FAPI) and promotion of global open banking standards is recognized by this award nomination”, said Don Thibeau. “The Foundation is honored to have Nat nominated and recognized for his ongoing international leadership.”

Please visit the open banking and Financial-grade API (FAPI) microsite at: https://www.openid.net/fapi. If you have relevant content that would benefit the fintech community and would like to submit for publishing consideration, please email me at director@openid.org

Don Thibeau

OpenID Foundation Executive Director

Aligning the Governance Rules and Technology Tools of Digital Identity: Solving Today’s Burning Business Problems
https://openid.net/2019/11/14/aligning-the-governance-rules-and-technology-tools-of-digital-identity-solving-todays-burning-business-problems/ Thu, 14 Nov 2019 17:10:27 +0000 Don Thibeau
Case Studies
digital identity
digital transactions
Don Thibeau
oix
OIX white paper
sibos

Aligning the Governance Rules and Technology Tools of Digital Identity: Solving Today’s Burning Business Problems


In an era governed by digital transactions and data, our methods for managing digital identities, security, and privacy are proving inadequate. At the same time, consumers are looking to do business with companies that have minimal friction as part of their overall service experience, and which provide assurance that consumer’s identities and transactions are reliable […]]]>
<![CDATA[In an era governed by digital transactions and data, our methods for managing digital identities, security, and privacy are proving inadequate. At the same time, consumers are looking to do business with companies that have minimal friction as part of their overall service experience, and which provide assurance that consumer’s identities and transactions are reliable and safe. Digital identity has matured from a first-in, first-out type of workflow to a multiple-input, multiple-output object-oriented entity, making it more difficult than ever for businesses to abide by the conventional wisdom of “If you can’t protect it, don’t collect it.”

Overall trust in digital ecosystems is diminishing, which overlaps with growing digital identity concerns, all relating in some way to the unauthorized release or use of personally identifying information, often on a mass scale. Compliance to regulations such as the California Consumer Privacy Act (CCPA) are coming to the entire United States, so the timing is upon us to rethink how we approach digital identity. One vision is that of a “competent authority” supporting private and public sector businesses and interested parties in building digital identity services, fit for their purposes and in their own environments that are secure, reliable, and easy to use.

I recently published my notes from this years Innotribe@Sibos 2019 where I led a discussion to review past experience as we develop and implement community-driven, open standards for digital identity and global open banking initiatives.

There was consensus that existing identity standards need to be utilized to ensure the identity portable and accessible across many trust frameworks. But we still have to work out how we share data among all the actors including relying parties and intermediaries. And we have to ask how we accept data shared with us? What does trust mean for others? How do we interpret their trust scores or trustmarks? How does self-certification help drive trust?

In parallel to preparing for presentations at Sibos, I was working on a white paper, Aligning the Rules and Tools of Digital Identity: Solving Today’s Burning Business Problems”, that advances the conversation in the current digital identity landscape. This paper essentially went “live” on a stage at Innotribe@Sibos when Eric Sachs and I revisited ten years of identity “battles”. These are a set of burning business problems facing the internet identity world that no one organization can solve alone. This paper further marks the beginning of a new approach to solving these problems with open banking initiatives in 2020 while referencing prior OIX work and white papers.

It is my hope this white paper provides a perspective of digital identity solution challenges and opportunities in 2020 and beyond. Feel free to download the “Aligning the Rules and Tools of Digital Identity: Solving Today’s Burning Business Problems” white paper at the OIX website.

Don Thibeau

OpenID Foundation Executive Director

OpenID Connect for Identity Assurance
https://openid.net/2019/11/14/openid-connect-for-identity-assurance/ Thu, 14 Nov 2019 12:58:35 +0000 Mike Leszcz
Foundation
Implementer’s Draft
OpenID Connect
Specs
Working Group
eKYC
Identity Assurance
Torsten Lodderstedt

OpenID Connect for Identity Assurance


This week the OpenID Foundation announced the approval of the Implementer’s Draft of the OpenID Connect for Identity Assurance specification. This new specification is a product of the OpenID Connect Working group. An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. The global adoption of OpenID […]]]>
<![CDATA[This week the OpenID Foundation announced the approval of the Implementer’s Draft of the OpenID Connect for Identity Assurance specification. This new specification is a product of the OpenID Connect Working group. An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification.

The global adoption of OpenID Connect is demonstrated in the many profiles it has generated. OpenID Connect’s value is seen the range of use cases it serves and its impact on the privacy, security, and ease of use it delivers to end users. As its global adoption grows, OpenID Connect is increasingly being used in scenarios requiring higher identity assurance levels. Some examples include:

  • Anti-Money Laundering
  • Telecommunications
  • eGovernment
  • Access to Health Data
  • Risk mitigation
  • Fraud prevention

One can observe that current implementations often rely on implicit attestation of the verification status of the data provided based on the context the relying party (RP) and the trust framework the IDP has joined. Implicit attestation may cause ambiguity. For example, what claims in result set are verified and which are not? As a further challenge, the RP lacks metadata and evidence needed for mapping between regulatory/legal contexts, dispute resolution, and auditing.

The new OpenID Connect for Identity Assurance specification defines a representation for verified claims and associated metadata and evidence while enabling legal compliance for the aforementioned use cases. This specification provides important support for explicit attestation in a trust framework wherein the identity provider can supply:

  • Time of verification
  • Verifier: what party verified the user’s identity
  • Evidence: which evidence where used
  • Verification Method: how were the evidence verified

The specification advances solutions for privacy wherein the RP asks for individual claims and verification data elements. This makes clear that the purpose of inquiry can be conveyed per transaction or individual claim.

This effort is intentionally and importantly internationally driven and benefits from contributions from the UK, US, CA, DE, and JP. The specification includes (growing number) of pre-defined identifiers for:

  • Trust frameworks, e.g., eIDAS, NIST 800-63A, Japanese and German AML
  • Identity documents, e.g., ID Card, Passport, Driving Permit
  • Verification Methods, e.g., „“Physical In-Person Proofing” and “Supervised remote In-Person Proofing”

The Foundation plans to start a new working group dedicated to eKYC and Identity Assurance. The working group’s charter has roots in contributions from the UK, US, CA, DE, and JP. We would benefit from an even broader group of participants to build on the initial contributions drawing from Torsten Lodderstedt’s domain expertise and experience at yes.com.

Finally thanks to Torsten, on behalf of the Foundation and community, for advancing this important specification. Bravo Torsten!

Don Thibeau

OpenID Foundation Executive Director

Implementer’s Draft of OpenID Connect for Identity Assurance Specification Approved
https://openid.net/2019/11/11/implementers-draft-of-openid-connect-for-identity-assurance-specification-approved/ Mon, 11 Nov 2019 20:02:10 +0000 Mike Jones
Implementer’s Draft
News
OpenID Connect
Specs
Working Group
Identity Assurance
specification
vote

Implementer’s Draft of OpenID Connect for Identity Assurance Specification Approved


The OpenID Foundation membership has approved the following specification as an OpenID Implementer’s Draft: OpenID Connect for Identity Assurance 1.0 An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This is the first Implementer’s Draft of this specification. This specification is a product of the […]]]>
<![CDATA[The OpenID Foundation membership has approved the following specification as an OpenID Implementer’s Draft:

An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This is the first Implementer’s Draft of this specification. This specification is a product of the OpenID Connect Working group.

The Implementer’s Draft is available at:

The voting results were:

  • Approve – 47 votes
  • Object – 1 votes
  • Abstain – 0 votes

Total votes: 48 (out of 231 members = 21% > 20% quorum requirement)

— Michael B. Jones – OpenID Foundation Board Secretary

Dispatch from Innotribe@Sibos 2019
https://openid.net/2019/11/11/dispatch-from-innotribesibos-2019/ Mon, 11 Nov 2019 15:01:35 +0000 Don Thibeau
News
2019
Don Thibeau
fintech
identity custodian
identity standards
innotribe
open banking
sibos

Dispatch from Innotribe@Sibos 2019


Innotribe is always a dynamic and thought-provoking opportunity for voices from outside the finance industry to collaborate at Sibos. At this years Sibos-2019-London, I led a panel discussion of fintech and identity experts to exchange experiences and discuss opportunities as we develop and implement community-driven, open standards for digital identity and global open banking initiatives. […]]]>
<![CDATA[Innotribe is always a dynamic and thought-provoking opportunity for voices from outside the finance industry to collaborate at Sibos. At this years Sibos-2019-London, I led a panel discussion of fintech and identity experts to exchange experiences and discuss opportunities as we develop and implement community-driven, open standards for digital identity and global open banking initiatives.

There was consensus that existing identity standards need to be utilized to ensure the identity portable and accessible across many trust frameworks. But we still have to work out how we share data among all the actors including relying parties and intermediaries. And we have to ask how we accept data shared with us? What does trust mean for others? How do we interpret their trust score? How can self-certification help drive trust?

In addition to the fintech solutions and open standards discussions, there is a natural extension of that conversation addressing the consumer and the consumer experience. I also co-presented with Eric Sachs from the Microsoft Identity Team providing a retrospective of the consumer payments space and the consumer login space evolution for managing digital identity.

As social login evolves to support higher-assurance interactions, there is much to learn from the fintech experience. For example, fintech solutions are designed and implemented to deliver high-assurance financial services while social login through social media relies on low-assurance mechanisms. That being said, the identity community has used mobile devices and solution to improve both the usability and security of consumer login.

In the current environment, we find the fintech space has had success with ongoing innovation to offer more choices to users for how to pay for things while improving security and usability and leveraging global standards. Unfortunately the same cannot be said of the current consumer login landscape. There are few choices with most solutions still relying on mostly passwords and fewer examples of those improving security and usability.

The FIDO key standard continues to be at the forefront of discussions around consumer solutions as FIDO (Fast ID Online) is used with portable security keys. While FIDO keys actually end up raising the security bar so high that it is not clear how to help consumers recover their account if they lose the keys. There is still a lot of work to be done with respect to keys and consumer solutions.

An innovation and topic that was highlighted at Sibos is the idea of creating identity custodians. An identity custodian could potentially be a positive force for both identity providers and consumers alike. One of the visions is that browsers and operating systems will allow consumers to install these identity custodians just as they install password managers. This would provide the consumer more control of their digital identity and associated attributes. It would allow solution providers to then develop solutions focused on the consumer while leveraging robust, standard based identity solutions already implemented by identity providers.

Important takeaways from our presentation are that “consumer choice” continues to drive digital identity innovation and an opportunity for increasing collaboration between financial services and mobile network operators providing identity services.

Progress is being made, but it is slow. There is positive light in the crossroads of enhanced consumer solutions and identity solutions that are on the horizon underpinned by established, standards-based identity services. And there is a sense of encouragement in the community about the potential convergence of innovative fintech solutions and MNO-based identity services that will continue to drive an increasing mobile world. Interesting times ahead.

Don Thibeau

OpenID Foundation Executive Director

Second Public Review Period for OpenID Connect Federation Specification Started
https://openid.net/2019/11/07/second-public-review-period-for-openid-connect-federation-specification-started/ Thu, 07 Nov 2019 18:00:51 +0000 Mike Jones
News
OpenID Connect
Specs
Working Group
federation
Implementer’s Draft
Public Review
specification
vote

Second Public Review Period for OpenID Connect Federation Specification Started


The OpenID OpenID Connect Working Group recommends approval of the following specification as an OpenID Implementer’s Draft: OpenID Connect Federation 1.0 This would be the second Implementer’s Draft of this specification. An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This note starts the 45-day […]]]>
<![CDATA[The OpenID OpenID Connect Working Group recommends approval of the following specification as an OpenID Implementer’s Draft:

This would be the second Implementer’s Draft of this specification.

An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This note starts the 45-day public review period for the specification draft in accordance with the OpenID Foundation IPR policies and procedures. Unless issues are identified during the review that the working group believes must be addressed by revising the draft, this review period will be followed by a seven-day voting period during which OpenID Foundation members will vote on whether to approve this draft as an OpenID Implementer’s Draft. For the convenience of members, voting will actually begin a week before the start of the official voting period and run for an extra week because of the holidays.

The relevant dates are:

  • Implementer’s Draft public review period: Thursday, November 7, 2019 to Sunday, December 22, 2019 (45 days)
  • Implementer’s Draft vote announcement: Monday, December 9, 2019
  • Implementer’s Draft voting period: Monday, December 16, 2019 to Tuesday, January 7, 2020 *

* Note: Early voting before the start of the formal voting period will be allowed.

The OpenID Connect working group page is https://openid.net/wg/connect/. Information on joining the OpenID Foundation can be found at https://openid.net/foundation/members/registration. If you’re not a current OpenID Foundation member, please consider joining to participate in the approval vote.

You can send feedback on the specification in a way that enables the working group to act upon it by (1) signing the contribution agreement at https://openid.net/intellectual-property/ to join the working group (please specify that you are joining the “AB/Connect” working group on your contribution agreement), (2) joining the working group mailing list at https://lists.openid.net/mailman/listinfo/openid-specs-ab, and (3) sending your feedback to the list.

— Michael B. Jones – OpenID Foundation Board Secretary

]]>

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.