-
Notifications
You must be signed in to change notification settings - Fork 13
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Proposal: change webid claim to solid #26
Comments
What do you think to use IRI of the spec as scope, as in https://solid.github.io/authentication-panel/solid-oidc/#discovery This way the spec would specify conformance criteria #20 for each role in the ecosystem. With this approach we could extend / amend it in the future by publishing updated spec with new IRI. |
Using IRI for claim also seems to be in line with JWT spec RFC 7519 - JSON Web Token (JWT)
|
Just to follow-up with the discussion I kind of like the idea of keeping consistency by moving from I have no strong opinion about the possible length of the associated IRI and the possible overhead of the request size but the scenario deserves some attention I think. |
I like the idea of having a future-proof claim in Solid OIDC Access & ID Tokens. Alternatively to changing the I am a bit unclear on whether we should generalise the I would be very much in favor of requiring a solid scope for OIDC client registration as per https://github.com/solid/authentication-panel/issues/86. On the IRI vs IANA registered claim name, I would lean towards IANA registration. The overhead of IRI size is one concern, consistency with other claim names is another as well as the fact that leaking RDF/linked data style identifiers into JSON will probably just cause confusion rather than positively spike curiosity. |
Maybe we could define the claim as:
|
Picking up this thread with regards to the linked issues. Would there be advantages to having only a single claim that has to incorporate all possible ways of identifying in the Solid ecosystem? I.m.o. a single scope (e.g. |
This is a proposal to change the
webid
claim tosolid
in access tokens and ID tokens.The background for this is severalfold:
webid
claim is very WebID specific, and WebIDs are (according to the draft WebID specification) limited to HTTPS URLs. If other types of identifiers are to be supported (e.g. DIDs, VCs), placing those in thewebid
claim is questionable. Asolid
claim would therefore be more flexible and, arguably, forward looking.Solid-OIDC
(it was formerlyWebID-OIDC
). The audience claim for access tokens uses a value ofsolid
to indicate that the token should be used with the Solid ecosystem.solid
claim and will likely continue to be the main identifier format for agents in the near termsolid
. If the name of that scope is, in fact,solid
, then using asolid
claim in the resulting tokens would make for a simple, consistent naming structure.If the name of this claim is changed to
solid
, we should constrain the value(s) to be IRIs.This change would place no new requirements on Solid components to support DIDs, but it does make support of DIDs more possible for the future.
This change would require adjustments on client apps (RP), Pod servers (RS) and identity providers (OP).
The text was updated successfully, but these errors were encountered: