Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Ocober 24th \uD83D\uDDD3 Date

\uD83D\uDC65 Participants

\uD83E\uDD45 Goals

  • Overview

    Edit

    In the Technical Discussion and Planning Meeting held on October 24, 2024, participants transitioned the session to Zoom and discussed plans to make the meeting public for Linux Foundation members. Toby led a focus on Identity 2.0 projects, including Decentralized Identifiers (DIDs) and Verifiable Credentials, highlighting interoperability challenges. Claude addressed the complexities of authentication in desktop applications, emphasizing trust boundaries with identity managers. The discussion then shifted to zero trust models, device authentication nuances, and the efficacy of sandboxed environments. Participants examined OAuth workflows and cross-application token sharing issues, noting the difficulties of maintaining plugin authentication. The meeting concluded with planning next steps, including a presentation to separate authorization from authentication, with Chris tasked to prepare a demo and gather insights from security experts at Autodesk. Action items were assigned to facilitate these initiatives for future discussions.

    Notes

    Meeting Transition and Setup (02:16 - 09:42)

    • Meeting moved from one platform to Zoom

    • Discussion about making the meeting public for Linux Foundation members

    • Chris to make the meeting public after this session

    Identity and Authentication Discussion (09:42 - 20:34)

    • Toby presented on Identity 2.0 projects and standards

    • Discussed Decentralized Identifiers (DIDs) and their challenges

    • Explored Verifiable Credentials and their interoperability with DIDs

    • Examined the concept of Verified Presentations and their similarity to OAUTH flows

    ️ Desktop Authentication Challenges (20:34 - 28:48)

    • Claude discussed challenges of authentication in desktop products

    • Explored the complexities of storing sensitive information like refresh tokens

    • Discussed the need for establishing trust boundaries between desktop products and identity managers

    Zero Trust and Device Authentication (28:49 - 39:29)

    • Discussed the importance of device authentication in zero trust models

    • Explored differences between mobile and desktop environments in terms of security

    • Considered the potential of sandboxed environments within desktop contexts

    OAuth Workflows and Cross-Application Token Sharing (39:29 - 52:22)

    • Examined OAuth workflows and their documentation

    • Discussed cross-application token sharing and its challenges across vendors

    • Explored the complexities of managing plugin authentication within desktop products

    Next Steps and Future Discussions (52:22 - 01:00:10)

    • Planned presentation on separating authorization from authentication

    • Chris to prepare a demo on different authorization experiences

    • Discussed need for input from security experts at companies like Autodesk

    Action items

    Chris

    • Make the meeting public for Linux Foundation members after this session (02:57)

    • Prepare a demo on different authorization experiences for the next meeting (55:52)

    Chris, Darrell, and Spencer

    • Prepare slides on Zero Trust and methods to solve related problems (56:45)

    unassigned

    • Find security experts from companies like Autodesk to provide input on proposed solutions (57:24)

\uD83D\uDDE3 Discussion topics

Time

Item

Presenter

Notes





✅ Action items

  •  Action items

Edit

Chris

Make the meeting public for Linux Foundation members after this session (02:57)

Prepare a demo on different authorization experiences for the next meeting (55:52)

Chris, Darrell, and Spencer

Prepare slides on Zero Trust and methods to solve related problems (56:45)

unassigned

Find security experts from companies like Autodesk to provide input on proposed solutions (57:24)

⤴ Decisions