... many are single-sentence, so we are looking forward to expanding those
Juan Caballero: We have been leaving comments on some longer use cases ✪
... with clarifying questions
Manu Sporny: Please add more if you have interesting use cases ✪
... any other status updates?
Juan Caballero: One of Mike's use case: he already answered a clarifying question; it might be good to walk through one of his use cases at the end (Trust Agent) ✪
... whether the trust agent is an api detail
Manu Sporny: Any other use cases for the agenda? ✪
Topic: Authorization Part Deux
... if not we will get started with Authorization
Mike Varley: +1 To tackle the Trust Agent use case if there is time and determine if it is in scope. ✪
... to summarize last call: what is in scope / out of scope
... don't put future authZ schemes out of scope (GNAP/ZCAP/etc)
... one suggestion to put such things as GNAP out of scope initially
... one suggestion to focus on OAuth2
... today: see if we can get to a proposal
... is this summary accurate?
Adrian Gropper: OAuth2 is about authorization but not delegation ✪
... how do we determine how delegation is in scope/out of scope
<andreas_freund> @aaron ... there is the assumption of out of band communication to establish a trust relationship between requester and target systems
Manu Sporny: Delegation -- what use case affects the HTTP API? ✪
... one can set up your own server without needing to use any of the stuff described
... to get an oauth client_id and secret, all you need is a webpage
... I do agree about the use of OIDC to force the use of large providers
Ted Thibodeau: The UID link above allows one to set up with sufficient crypto to publish the public portion of your sign-in material ✪
... there is no reason to have to use the big 2 or 3 providers
Adrian Gropper: To Orie's point: the reason for my objection (and the reason to do GNAP in parallel): safety is not the issue. The issue is about privacy ✪
... the barrier to client registration is a barrier to adoption
... when client registration is introduced, you create a system that is unfair to the subjects
<juan_caballero_(dif/spruce)> but what if all the subjects of the VCs in question are inanimate objects and batches of steel or coal?
... the argument is based on privacy not security
<juan_caballero_(dif/spruce)> OAuth is being used to authenticate servers which are passing between them VCs about rocks
Ted Thibodeau: You rejected my argument because of the last sentence. ✪
Adrian Gropper: I provided an example that oauth is successful in B2B b/c of client registration ✪
Ted Thibodeau: Dozens of instances where a verifiable identity does not require a B2B registration ✪
Manu Sporny: Make sure no one gets too passionate and that there are no personal attacks ✪
... would like to collect some data (poll not a decision)
... just a +1/-1 poll
... start with adrian's proposal
... to prioritize working with OAuth2 and GNAP simulaneously
... just getting feedback
... there will be several pos
Manu Sporny: POLL: Prioritize working on OAuth2 and GNAP simultaneously when adding authorization to VC HTTP API endpoints. ✪
<orie> my reason for -1 is that both GNAP is not stable enough to use in production today, and its additional complexity which is orthogonal to our mission
Manu Sporny: POLL: Prioritize working on OAuth2 for authorization to VC HTTP API endpoints as a priority 1 item and enable the use of other authorization mechanisms like GNAP, ZCAPs, etc. as a priority 2 item. ✪
<adrian_gropper> - 1
Orie Steele: -1 To getting tangled in lower priority work ✪
<tallted> wording bites me...
Mike Varley: +1 To OAuth 2.0 client credentials, +0.1 for user authorization ✪
<markus_sabadello> 0
<eric_schuh> 0
<orie> "lower priority" means a license to distract and waste call time, but no commitment/
Juan Caballero: What do the priority numbers mean? ✪
Ted Thibodeau: +1 Presuming *enabling* other authz potential in future is not blocked, is actively worked toward ✪
Juan Caballero: Recalls concerns about how OAuth2 becomes possible but infeasable at scale ✪
<orie> I would be supportive of "not blocking future solutions" and "not spending time on them other than when they are at risk or having the door shut on them".
Manu Sporny: What we are seeing is that there is a preference for OAuth2 ✪
... we are at the top of the hour
<tallted> *nods* yes, Orie
... we will come back to this next week
... adrian can you come up with a proposal that would get consensus?
<orie> I suspect that HTTP headers are not going away anytime soon.
... we can start with one endpoint
... e.g. verify endpoint -- what authZ should it support?
<david_ward> Can the technology used be kicked down the road a bit? Is it actually important at this time until how the end points fit the use cases are worked out?