-
Notifications
You must be signed in to change notification settings - Fork 32
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Define a CIBA OpenAPI security scheme #157
Comments
This issue has been discussed in the past on #57. It was escalated to the TSC and the TSC made a final decision after a very long discussion in the WG. Which is documented in https://github.com/camaraproject/IdentityAndConsentManagement/blob/main/documentation/CAMARA-API-access-and-user-consent.md#camara-api-specification---authorization-and-authentication-common-guidelines From my point of view, I don't see the point in re-opening this issue after the TSC decision. At least in the short term, until we get some experience from the first estable APIs launched and so on... Then of course, in the mid-term we could iterate if it is needed. |
Could you please help me by providing a quote of what was decided in TSC? |
@AxelNennker Here you have PR #93 (Nov last year) where it was included in the WG documentation the final agreement reached by the TSC and the WG participants on the securitySchemes and security of the CAMARA API specification, and the mandatory template for That PR was reviewed and approved by you. Also in issue #57 (fixed by #93) there are references to TSC meeting notes and agreements. Such as #57 (comment) or #57 (comment)
Eventually it was documentation within the OAS as you can see in #93 (info.description template) pointing to a set of authorization flows defined in CAMARA-API-access-and-user-consent.md camaraproject/Commonalities#53 was closed by #57 |
During ICM's meeting on May 22th I understood that we keep this issue and add the label ICM-Backlog. I did this. |
@jpengar Please detail what was escalated to TSC and which decision was the outcome. I think CIBA is used in some Camara protocols and there should be a way to express that in OpenAPI. Axel ps: Is there a list of those protocols? I would like to discuss with subgroups why they are using with flow. |
During the ICM meeting on 22 May, it was pointed out that this very issue has been discussed for weeks in the past (issue #57), eventually escalated to the TSC, which ultimately made a final decision on the security scheme policies to be followed. And it was properly documented in CAMARA-API-access-and-user-consent.md (PR #93). It was also mentioned that this issue shouldn't be discussed |
This is the opposite of what I understand as not re-opening an issue. I've already given my opinion, which was also discussed in yesterday's meeting, and I have nothing more to say. I will allow other WG participants to express their views as well. And I will forward this directly to the TSC. It is really time consuming to keep bringing up the same issues, especially when it is something that has been discussed over such a long period of time and when there is a TSC resolution. So there is nothing more to say from my side
I've already provided the information in previous comments and pointed you to the issues and PRs where you can find further details.
IMHO, this will create more overhead and noise in API subprojects, considering that they were already aware that a securityScheme guideline exists from ICM and they have to apply it for the next meta-release. There are API subprojects that are already using this guideline, and others are on their way, like Quality on Demand: camaraproject/QualityOnDemand#295 |
Discussions, and even decisions, within the TSC do not preclude proposals for alternative "new" ways of doing things being discussed with a working group. It is for the proponent (in this case, @AxelNennker) to make the case for the advantages of their proposal over the currently agreed scheme, and for the working group as a whole to discuss it within the issue itself or at meetings. For sure, it is harder to justify "breaking" changes, but they are not prohibited. Hopefully the working group can reach a consensus on any given given proposal. But if not, then it can be escalated to the TSC for a decision by anyone who feels their strong arguments are being ignored. So the TSC just provides a mechanism to break such deadlocks if required. The TSC can also intervene if it thinks a working group has overlooked factors that affect other working groups or sub-projects, which is why each working group provides an update at TSC meetings. Meeting agenda items and time management within meetings are for the working group moderator to manage. |
I totally agree. But just one question, if there is a TSC resolution on a particular issue and a particular solution is agreed, how long does that resolution last so that the same issue is not reopened if I do not fully agree with the final TSC resolution? Do we always have to start from scratch? Should at least be considered if the context of the first decision has somehow changed. I'm just giving my point of view and I think that the issue that is being raised here has already been discussed and I don't see any significant change in the context of the first decision to re-open this issue now. And that, of course, is my opinion. Other WG participants can of course express theirs. And if the WG or the TSC decides otherwise, I will accept that. Of course, any decision can be revisited. Iteration is positive so that we can make improvements and changes. But we have to find the right balance in the process. Otherwise, even the release process would be much harder. But in this case I would prefer to escalate it to the TSC, so that they can at least decide whether we should revisit their existing resolution now or not.
I completely agree, but I don't know why you're saying it now in the context of this discussion. |
This is the TSC text:
I do not read that CIBA is forbidden by this TSC agreement. Actually I agree that if personal information is involved and authentication and consumption device are the same then OIDC authorization code flow MUST be used if e.g. GDPR requires consent etc. IF a Camara API offers/demands CIBA then there should be a guideline specifying a CIBA security scheme.
So, I think, client might what to know upfront whether an API call might result in an SMS might be sent. We/Camara do not want API designers to define there own security scheme and if an API wants to express CIBA then that should follow a CIBA guideline we define. I think that OIDC security scheme is the most important for most Camara API and I am happy we have a guideline for API subprojects how to use it. |
ICM please also see camaraproject/PopulationDensityData#24 (comment) |
Problem description
In Camara guidelines on how an API is described in OpenAPI are documented in the Commonalities' API guidelines document.
Currently there is no guideline on how an API can express that it supports or requires CIBA.
Possible evolution
ICM should define a common definition of a CIBA security scheme and propose a guideline for API designers to use that security scheme to Commonalities
Suggestion:
An Camara API using CIBA should use the following security scheme definition.
The
ciba
flow is going to be defined in OpenAPI version 3.2. For now Camara is using the in OpenAPI extension mechanism using thex-
prefix because Camara is using OpenAPI version 3.0.3.Additional context
OpenAPI tools and especially code generators are currently ignoring OpenAPI security.
E.g. if you specify the openIdConfigurationUrl or not, the generated Java client code does not change.
Specifying security in OpenAPI is valuable information for developers though and should be integrated into Camara OpenAPI files.
OpenAPI is viewing OIDC as an evolution of OAuth2 and API designers can only specify the openIdConfigurationUrl to an security object of type
openIdConnect
. As such CIBA is also an evalution of OAuth2 and OpenAPI is going to define the CIBA flow in the security object of typeoauth2
.The text was updated successfully, but these errors were encountered: