Attendees:
Heather, Johan, Ivan, John P, Scott, Hannah, Giuseppe, Roland
0. Agenda bash
Idpy.org <http://idpy.org/> domain issue - Leif is working on it
Board continues as is, with Roland, Mike, Chris, and Ivan agreeing to serve for a new
two-year term.
Reminder: Hackathon/Workshop on March 23; please register! Ivan will be sending out
information with more guidance on what work will be targeted that day.
https://wiki.refeds.org/pages/viewpage.action?pageId=44959235
<https://wiki.refeds.org/pages/viewpage.action?pageId=44959235>
The idpy BoF was rejected from TNC20. Space too limited.
1. GitHub review
a. OIDC -
https://github.com/IdentityPython <https://github.com/IdentityPython>
(JWTConnect-Python-OidcRP, JWTConnect-Python-CryptoJWT, etc)
Libraries are moved to the IdentityPython repository. Coding activity is in progress.
There are some issues with Satosa in relation to the OIDC endpoint; GRNET is putting
effort into fixing this.
Roland is working on a few things in the libraries: pushed authentication, identity
assurance (see
https://bitbucket.org/openid/ekyc-ida/
<https://bitbucket.org/openid/ekyc-ida/> and
https://bitbucket.org/openid/ekyc-ida/issues/1153/request-syntax-complexity
<https://bitbucket.org/openid/ekyc-ida/issues/1153/request-syntax-complexity>),
mutual TLS
b. Satosa -
https://github.com/IdentityPython/SATOSA
<https://github.com/IdentityPython/SATOSA>
Not a lot of progress since the last call. Have been discussing some of the common
components between this and a new eduTEAMS project. There is a dependency between the
proxy and services that live outside the proxy. Part of the discussion is how to define a
common pattern/API on the info sent out to the services. May be encoding this information
using SCIM (
http://www.simplecloud.info/ <http://www.simplecloud.info/>). This would
allow other services to get info from the proxy as well, since SCIM is a standardized
model. Ivan will have more information on the wiki soon (and will send to the list)
c. pySAML2 -
https://github.com/IdentityPython/pysaml2
<https://github.com/IdentityPython/pysaml2>
Signing encryption/decryption, and the names of identifier attributes: Ivan created a PR
about this (
https://github.com/IdentityPython/pysaml2/pull/662
<https://github.com/IdentityPython/pysaml2/pull/662>). Would like for people to test
that and see if it works for them. It is not following the specs closely, but it shouldn’t
cause problems. Ivan will hold off merging it until there has been more testing.
Will be merging:
https://github.com/IdentityPython/pysaml2/pull/660
<https://github.com/IdentityPython/pysaml2/pull/660>
https://github.com/IdentityPython/pysaml2/pull/645
<https://github.com/IdentityPython/pysaml2/pull/645>
https://github.com/IdentityPython/pysaml2/pull/628
<https://github.com/IdentityPython/pysaml2/pull/628>
https://github.com/IdentityPython/pysaml2/pull/625
<https://github.com/IdentityPython/pysaml2/pull/625>
And then will have a new release.
SameSite cookie handling -
https://github.com/IdentityPython/pysaml2/pull/625
<https://github.com/IdentityPython/pysaml2/pull/625>
See also discussion on Slack (
https://identity-python.slack.com/archives/C4RR58T6C
<https://identity-python.slack.com/archives/C4RR58T6C>)
This will be part of the code; no other changes will be needed by deployers. Target
release before end of February
d. pyFF -
https://github.com/IdentityPython/pyFF
<https://github.com/IdentityPython/pyFF>
No update
2. AOB
Next call scheduled for 18 February 2020