https://kantarainitiative.org/confluence/display/uma/UMA+telecon+2021-02-25

Minutes

Roll call

Quorum was NOT reached.

Approve minutes

Deferred


Pensions Dashboard, any updates

UMA/Email proof-of-concept

https://github.com/uma-email/poc

How does this compare with existing 'secure messaging' products? This is made to ride onto of the existing SMTP/IMAP protocols. There is a POC/demo available here: https://www.federizer.org/ 

Is there a path to having this attachment protocol as an extension to the existing SMTP protocol? Would have to work through IETF.

Do the two mail services both have to support the extension? likely yes, maybe need a discovery mechanism. If the recipient doesn't support could fallback from claims pushing to interactive claims gathering. However, this pushes the RqP authentication question as the senders AS would need to allow federation to the RqP email domain. This could use the 'Trusted Claims" profile, however there is no standard way that a mail server must authenticate the user? ie not all are OIDC providers. This would need further exploration.

Profiles Discussion, relationship manager

Three "real" use cases to design around

  1. A resource server that holds Alice's data, however does not have an end-user authentication mechanism. 
  2. A resource server that can authenticate Alice (somehow), and wants to offer resource managed integrated in other client applications

FPX profile:

PDP profile:


Can to two interactions use the same APIs mechanisms?

GET /resources → returns available resources for Alice
\{

as defined by UMA Fedz with the addition of an optional "authorization_server" attribute, which points to the specific AS this resource is currently registered with
}

POST /resource/_id/ \{ at_as: url_to_my_AS }  

GET /authorization_servers → return list of supported authorization servers, either for Alice or in general

This is where the intersection between UMA (API based resource) and w3c VC issuance starts to work. GET /resources == GET /credential offers, POST /resource_to_as = issue me this credential. This also comes around to wallet = personally controlled UMA AS. 


How can we design to support many Authorization Servers (ie a wide-ecosystem!)?

The PFS was built to not exclude many AS's. A AS's would be hosted out of the gate, however the expectation is towards the more "open-finance" model where many Financial Institutions would host an AS for their customers/users. The 'governance registry' (as specified in the report) and federated identity service becomes the common trust sources for the ecosystem. How woudl pension rsources previously registered at one AS, be moved to a second one? What if the AS is the 'gateway' to the service where Alice wants to make her pension available


Attendees

As of October 26, 2020, quorum is 5 of 9. (Michael, Karim, Domenico, Peter, Sal, Thomas, Andi, Alec, Eve)

Voting:

  1. Micheal
  2. Alec

Non-voting participants:

  1. Scott
  2. Ken
  3. Ian
  4. Anik
  5. Nancy
  6. Colin

Regrets: