SlideShare a Scribd company logo
Self-Issued OpenID
Provider
~Chapter 7 of OpenID Connect~
Kristina Yasuda
Identity Standards, Microsoft Corp.
Liaison Officer between OpenID Foundation and Decentralized Identity
Foundation
A session with a lot of open questions
1. What is Self-Issued OpenID Provider (SIOP) ?
2. SIOP Requirements (draft)
3. Initial discussion points deep-dive
1. What is Self-Issued OpenID Provider (SIOP) ?
- Self-Issued OpenID Providers are personal OpenID Providers that issue self-signed ID Tokens,
enabling portability of the identities among providers.
- User holds its own OpenID Provider(OP) <> No Central OP
1. SIOP holds Claims
issued by Claims
Provider
2. SIOP can directly issue
self-signed ID Tokens
upon RP request
End-user
2. SIOP Requirements draft (1/4)
openid/connect/src/master/SIOP/siop-requirements.md
A. SIOP request
B. SIOP response
C. Key recovery and key rotation
D. Trust model between RP and SIOP
E. Issuance of the claims
F. Privacy protection
G. Claims binding
H. Various OpenID providers deployment architectures
I. Use-case specific requirements
2. SIOP Requirements draft (2/4)
A. SIOP request
1. OpenID Provider’s capability to issue self-issued responses is an extension of
the core OpenID Connect protocol => redirect_uri
2. SIOP can be used both for logins and for transmitting identity characteristics.
3. SIOP should support best practices of flow types.
B. SIOP response
4. SIOP should be able to return Verifiable Credentials and Verifiable
Presentations in the response
C. Derivation of Key information (cryptography itself is out of scope)
5. Key information should be derived either by using Decentralized Identifiers
resolved into DID documents, or sub_jwks with URNs (-> deep-dive)
2. SIOP Requirements draft (3/4)
D. Trust model between RP and SIOP (accounting for a special use-case where RP and
SIOP are on the same device?)
6. SIOP must be able to advertise that it is a SIOP-enabled OP => Invocation (->
deep-dive)
7. SIOP must be able to advertise configuration information to the RP => Discovery
8. RP must be able to register with SIOP => Registration parameter
E. Issuance of the claims (SIOP - Claims Provider)
9. SIOP providers can be registered with the Claims provider (Unique to SIOP)
F. Privacy protection
10.RPs should understand the security/privacy posture of SIOP
11.SIOP should support pairwise, omnidirectional, and ephemeral identifiers
12. Attestations made in the past should remain valid
13.RP must be able to receive the claims when the end-user is offline without
colluding with the Claims Provider
2. SIOP Requirements draft (4/4)
G. Claims Binding (relation with Aggregated and Distributed Claims Draft?) (OpenId
Connect Credential Provider draft?)
H. Various OpenID providers deployment architectures (Authentication flows?)
14. Support PWA-based SIOP implementations
15. SIOP should support browser flow path, device flow path and combination of
both
I. Use-case specific requirements
16.SIOP could support rich identity information sharing with RP (optional)
17.SIOP should allow for selective disclosure of claims in claim sets
18.SIOP should allow offline authentication
3. Discussion points deep-dive
1. Finding the SIOP address (Issue #1199) re: NASCAR Problem
If there are several SIOP wallets on my mobile device (or in a web browser), which one
gets invoked when SIOP request is received?
Currently, SIOP wallets would register custom schema openid://. However, there are
certain dependencies on the OS that does not allow to choose among wallets registered
under the same custom schema.
Is there a way to make this work without OS support (ideal), or should the conversation
with OS vendors be initiated (hard)? One idea was to have a “capability broker“ that
registers a list of SIOP wallets and the identifier methods they support (jwk thumb or did
methods)
From a user experience perspective, leaving current openid:// schema mechanism
could work fine – no user confusion over existence of several wallets.
3. Discussion points deep-dive
2. Conduit to Decentralized Identifiers
- “Decentralized Identifiers (DIDs) allow DID controller(end-user) to prove control over
an identifier without requiring permission from any other party”
- Advertising support for DIDs?
- Extension to `subject_types`? New parameter `identifier_type`?
- Where to best represent DIDs – key pair controlled by you?
- Introducing indirection to `sub` claim allowing it to be a URN allowing both jwk
thumbprint and DIDs
- `iss` is self-issued.me and has to be a URL per OpenID Connect Specification
- Updating verification methods when DIDs are included in `sub`?
- Additional cryptography mechanisms required (ES256K/EdDSA)
Collaboration with Decentralized Identity Foundation (DIDAuthn WG)
Discussions during OIDC AB/Connect WG
calls:
- Weekly Pacific time-zone calls and
- Bi-weekly Atlantic time-zone calls
+ Bitbucket issues, drafts 

More Related Content

PDF
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
PPTX
OpenID for Verifiable Credentials
PDF
OpenID for Verifiable Credentials @ IIW 36
PDF
OpenID for Verifiable Credentials
PDF
OpenID Connect 4 SSI
PPTX
Keycloakのステップアップ認証について
PPTX
KeycloakでFAPIに対応した高セキュリティなAPIを公開する
PPTX
FAPI and beyond - よりよいセキュリティのために
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
OpenID for Verifiable Credentials
OpenID for Verifiable Credentials @ IIW 36
OpenID for Verifiable Credentials
OpenID Connect 4 SSI
Keycloakのステップアップ認証について
KeycloakでFAPIに対応した高セキュリティなAPIを公開する
FAPI and beyond - よりよいセキュリティのために

What's hot (20)

PDF
今なら間に合う分散型IDとEntra Verified ID
PDF
IDA,VC,DID関連仕様 最新情報 - OpenID BizDay #15
PDF
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
PDF
これからのネイティブアプリにおけるOpenID Connectの活用
PDF
ざっくり解説 LINE ログイン
PDF
FIDO2 ~ パスワードのいらない世界へ
PDF
Modern Authentication -- FIDO2 Web Authentication (WebAuthn) を学ぶ --
PDF
Keycloak拡張入門
PPTX
Azure ADアプリケーションを使用した認証のあれやこれ
PDF
OIDC4VP for AB/C WG
PDF
マイクロサービス時代の認証と認可 - AWS Dev Day Tokyo 2018 #AWSDevDay
PDF
OpenID 4 Verifiable Credentials + HAIP (Update)
PDF
OpenID for Verifiable Credentials (IIW 35)
PDF
OpenID Connect 4 SSI (at EIC 2021)
PDF
池澤あやかと学ぼう!: はじめてのOAuthとOpenID Connect - JICS 2014
PDF
Azure ADとIdentity管理
PDF
KeycloakのDevice Flow、CIBAについて
PDF
いまどきの OAuth / OpenID Connect (OIDC) 一挙おさらい (2020 年 2 月) #authlete
PDF
OpenID ConnectとSCIMの標準化動向
PDF
MicrosoftのDID/VC実装概要
今なら間に合う分散型IDとEntra Verified ID
IDA,VC,DID関連仕様 最新情報 - OpenID BizDay #15
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
これからのネイティブアプリにおけるOpenID Connectの活用
ざっくり解説 LINE ログイン
FIDO2 ~ パスワードのいらない世界へ
Modern Authentication -- FIDO2 Web Authentication (WebAuthn) を学ぶ --
Keycloak拡張入門
Azure ADアプリケーションを使用した認証のあれやこれ
OIDC4VP for AB/C WG
マイクロサービス時代の認証と認可 - AWS Dev Day Tokyo 2018 #AWSDevDay
OpenID 4 Verifiable Credentials + HAIP (Update)
OpenID for Verifiable Credentials (IIW 35)
OpenID Connect 4 SSI (at EIC 2021)
池澤あやかと学ぼう!: はじめてのOAuthとOpenID Connect - JICS 2014
Azure ADとIdentity管理
KeycloakのDevice Flow、CIBAについて
いまどきの OAuth / OpenID Connect (OIDC) 一挙おさらい (2020 年 2 月) #authlete
OpenID ConnectとSCIMの標準化動向
MicrosoftのDID/VC実装概要
Ad

Similar to Self-issued OpenID Provider_OpenID Foundation Virtual Workshop (20)

PDF
OpenID for SSI
PDF
OpenID Connect 4 SSI (DIFCon F2F)
PPTX
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
PDF
EUDI wallets with OpenID for verifiable credentials (OID4VCI/OID4VP)
PDF
TrustBearer - CTST 2009 - OpenID & Strong Authentication
PPT
Street conf overview
PDF
OpenID Connect 4 Identity Assurance at IIW #32
PPTX
ICAM (Identity, Credential and Access management)-OpenID 2.0 Profile
PDF
Smart OpenID & Mobile Network Security
KEY
OpenID - An in depth look at what it is, and how you can use it
PDF
Introduction to DID Auth for SSI with Markus Sabadello
PPT
Identity as easy asLMNOP
PPT
Identity as easy as LMNOP
PPTX
Introduction to the FAPI Read & Write OAuth Profile
PPTX
OIDF Workshop at Verizon Media -- 9/30/2019 -- OpenID Connect Working Group U...
PPTX
Access management
PPTX
Configuring Single Sign-On (SSO) via Identity Management | MuleSoft Mysore Me...
PDF
Five Things You Gotta Know About Modern Identity
PDF
Strong Authentication in Web Application #SCS III
PDF
PSCR 2019 - ICAM Standards
OpenID for SSI
OpenID Connect 4 SSI (DIFCon F2F)
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
EUDI wallets with OpenID for verifiable credentials (OID4VCI/OID4VP)
TrustBearer - CTST 2009 - OpenID & Strong Authentication
Street conf overview
OpenID Connect 4 Identity Assurance at IIW #32
ICAM (Identity, Credential and Access management)-OpenID 2.0 Profile
Smart OpenID & Mobile Network Security
OpenID - An in depth look at what it is, and how you can use it
Introduction to DID Auth for SSI with Markus Sabadello
Identity as easy asLMNOP
Identity as easy as LMNOP
Introduction to the FAPI Read & Write OAuth Profile
OIDF Workshop at Verizon Media -- 9/30/2019 -- OpenID Connect Working Group U...
Access management
Configuring Single Sign-On (SSO) via Identity Management | MuleSoft Mysore Me...
Five Things You Gotta Know About Modern Identity
Strong Authentication in Web Application #SCS III
PSCR 2019 - ICAM Standards
Ad

Recently uploaded (20)

PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Machine Learning_overview_presentation.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
cuic standard and advanced reporting.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Cloud computing and distributed systems.
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
Spectral efficient network and resource selection model in 5G networks
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Digital-Transformation-Roadmap-for-Companies.pptx
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
MIND Revenue Release Quarter 2 2025 Press Release
Chapter 3 Spatial Domain Image Processing.pdf
Empathic Computing: Creating Shared Understanding
Advanced methodologies resolving dimensionality complications for autism neur...
gpt5_lecture_notes_comprehensive_20250812015547.pdf
A Presentation on Artificial Intelligence
Review of recent advances in non-invasive hemoglobin estimation
Mobile App Security Testing_ A Comprehensive Guide.pdf
Machine Learning_overview_presentation.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
cuic standard and advanced reporting.pdf
Network Security Unit 5.pdf for BCA BBA.
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Cloud computing and distributed systems.
The AUB Centre for AI in Media Proposal.docx
Building Integrated photovoltaic BIPV_UPV.pdf

Self-issued OpenID Provider_OpenID Foundation Virtual Workshop

  • 1. Self-Issued OpenID Provider ~Chapter 7 of OpenID Connect~ Kristina Yasuda Identity Standards, Microsoft Corp. Liaison Officer between OpenID Foundation and Decentralized Identity Foundation
  • 2. A session with a lot of open questions 1. What is Self-Issued OpenID Provider (SIOP) ? 2. SIOP Requirements (draft) 3. Initial discussion points deep-dive
  • 3. 1. What is Self-Issued OpenID Provider (SIOP) ? - Self-Issued OpenID Providers are personal OpenID Providers that issue self-signed ID Tokens, enabling portability of the identities among providers. - User holds its own OpenID Provider(OP) <> No Central OP 1. SIOP holds Claims issued by Claims Provider 2. SIOP can directly issue self-signed ID Tokens upon RP request End-user
  • 4. 2. SIOP Requirements draft (1/4) openid/connect/src/master/SIOP/siop-requirements.md A. SIOP request B. SIOP response C. Key recovery and key rotation D. Trust model between RP and SIOP E. Issuance of the claims F. Privacy protection G. Claims binding H. Various OpenID providers deployment architectures I. Use-case specific requirements
  • 5. 2. SIOP Requirements draft (2/4) A. SIOP request 1. OpenID Provider’s capability to issue self-issued responses is an extension of the core OpenID Connect protocol => redirect_uri 2. SIOP can be used both for logins and for transmitting identity characteristics. 3. SIOP should support best practices of flow types. B. SIOP response 4. SIOP should be able to return Verifiable Credentials and Verifiable Presentations in the response C. Derivation of Key information (cryptography itself is out of scope) 5. Key information should be derived either by using Decentralized Identifiers resolved into DID documents, or sub_jwks with URNs (-> deep-dive)
  • 6. 2. SIOP Requirements draft (3/4) D. Trust model between RP and SIOP (accounting for a special use-case where RP and SIOP are on the same device?) 6. SIOP must be able to advertise that it is a SIOP-enabled OP => Invocation (-> deep-dive) 7. SIOP must be able to advertise configuration information to the RP => Discovery 8. RP must be able to register with SIOP => Registration parameter E. Issuance of the claims (SIOP - Claims Provider) 9. SIOP providers can be registered with the Claims provider (Unique to SIOP) F. Privacy protection 10.RPs should understand the security/privacy posture of SIOP 11.SIOP should support pairwise, omnidirectional, and ephemeral identifiers 12. Attestations made in the past should remain valid 13.RP must be able to receive the claims when the end-user is offline without colluding with the Claims Provider
  • 7. 2. SIOP Requirements draft (4/4) G. Claims Binding (relation with Aggregated and Distributed Claims Draft?) (OpenId Connect Credential Provider draft?) H. Various OpenID providers deployment architectures (Authentication flows?) 14. Support PWA-based SIOP implementations 15. SIOP should support browser flow path, device flow path and combination of both I. Use-case specific requirements 16.SIOP could support rich identity information sharing with RP (optional) 17.SIOP should allow for selective disclosure of claims in claim sets 18.SIOP should allow offline authentication
  • 8. 3. Discussion points deep-dive 1. Finding the SIOP address (Issue #1199) re: NASCAR Problem If there are several SIOP wallets on my mobile device (or in a web browser), which one gets invoked when SIOP request is received? Currently, SIOP wallets would register custom schema openid://. However, there are certain dependencies on the OS that does not allow to choose among wallets registered under the same custom schema. Is there a way to make this work without OS support (ideal), or should the conversation with OS vendors be initiated (hard)? One idea was to have a “capability broker“ that registers a list of SIOP wallets and the identifier methods they support (jwk thumb or did methods) From a user experience perspective, leaving current openid:// schema mechanism could work fine – no user confusion over existence of several wallets.
  • 9. 3. Discussion points deep-dive 2. Conduit to Decentralized Identifiers - “Decentralized Identifiers (DIDs) allow DID controller(end-user) to prove control over an identifier without requiring permission from any other party” - Advertising support for DIDs? - Extension to `subject_types`? New parameter `identifier_type`? - Where to best represent DIDs – key pair controlled by you? - Introducing indirection to `sub` claim allowing it to be a URN allowing both jwk thumbprint and DIDs - `iss` is self-issued.me and has to be a URL per OpenID Connect Specification - Updating verification methods when DIDs are included in `sub`? - Additional cryptography mechanisms required (ES256K/EdDSA) Collaboration with Decentralized Identity Foundation (DIDAuthn WG)
  • 10. Discussions during OIDC AB/Connect WG calls: - Weekly Pacific time-zone calls and - Bi-weekly Atlantic time-zone calls + Bitbucket issues, drafts 

Editor's Notes

  • #2: From the beginning of this year, OpenID Connect Working Group has decided to revise Chapter 7 of OpenID Connect specification; Protocol as a conduit between OIDC and decentralized identity Can be used when that the Identity (set of data related to the entity) needs to be provable as attested at the time of attestation and cannot be taken away; to identify himself that he is the PII principal that the identity relates to; Also sometimes called SSI
  • #3: This document enumerates requirements for SIOP to help define the scope of a new version of SIOP specification - what will and will not be included. Combins todo lists/laundry lists, and various work
  • #4: 4 players: Data Subject: that is “me”;  Claims Providers (CPs) that provides attested claims;  Relying Parties (RPs) that consumes the attested claims in order to provide services to the data subject;  Self-issued OPs (SIOPs) that provide the authenticated identity to the  the Data subject can ask the CP to provide the attested and includes it in the ID Token that he provides through the SIOP to the RP  SIOP operates on behalf of a human or non-human subject to share information contained in a SIOP store by including it in an ID Token signed using an identifier and keys controlled by the subject.
  • #5: Self-Issued identifier draft
  • #6: A. SIOP an extension of the core OpenID Connect Protocol rather than an alternative flow 5. adding layer of indirection, with ‘sub’ value being URN -> 2 types DIDs a resolvable identifier to a set of statements about the did subject including a set of cryptographic material (e.g public keys).  Using this cryptographic material, a decentralized identifier can be used as an authenticatable identifier in a credential.
  • #7: D6: SIOP and OP since the key retrieval and security checks work differently  OP: iss value -> openid-configuration -> jwks_uri -> signing key for id token SIOP: just the key as represented in the Id token or DID based resolution, etc. E. how SIOP verified credential issuers deliver credentials to wallets controlled by credential holders.
  • #8: a credential is defined as an assertion about the End-User which is bound to the Client in an authenticatable manner based on public/private key cryptography. This feature then enables the Client to onward present the credential to other relying parties whilst authenticating the established binding to the assertion. To make a user assertion to be suitable as a credential, feature some form of binding to the Client that requested it
  • #10: the subject identifier for the end-user a “cryptographically verifiable” identifier