[OAUTH-WG] IETF118 - OAuth WG Final Agenda

Rifaat Shekh-Yusef <rifaat.s.ietf@gmail.com> Mon, 30 October 2023 20:45 UTC

Return-Path: <rifaat.s.ietf@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4E4FAC151078 for <oauth@ietfa.amsl.com>; Mon, 30 Oct 2023 13:45:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.103
X-Spam-Level:
X-Spam-Status: No, score=-2.103 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_FONT_FACE_BAD=0.001, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wqvYUhXPJxXd for <oauth@ietfa.amsl.com>; Mon, 30 Oct 2023 13:45:01 -0700 (PDT)
Received: from mail-wr1-x430.google.com (mail-wr1-x430.google.com [IPv6:2a00:1450:4864:20::430]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5C1FCC151073 for <oauth@ietf.org>; Mon, 30 Oct 2023 13:45:01 -0700 (PDT)
Received: by mail-wr1-x430.google.com with SMTP id ffacd0b85a97d-32d9effe314so3365211f8f.3 for <oauth@ietf.org>; Mon, 30 Oct 2023 13:45:01 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1698698695; x=1699303495; darn=ietf.org; h=to:subject:message-id:date:from:mime-version:from:to:cc:subject :date:message-id:reply-to; bh=1nNcwydeqkjCq8iRciQ7j19b4Ac12VDc9Aq1qkpSV5A=; b=eSgvZT5XKqD8yZMeqyl4kUYoW88Y/HUIN25IvjGVT0gsLU2B3J3NfR5LYiRvaOJ8SI HZZ1VyRM8zntA8sy8OiUQwIhcUrwXu0qCyB0ib901uSMBsVYYiLW0Mm0R6HShtTUJrb8 xT6/7YRgI7MZWuKKRLB3nEzYviKDJgFaGFEeX9xy0uJmiVHRxS4sOnZedduL2NIHzOpI u8RNCjgP1nb+g0fCwqEOFXxNBOOmwSIoino0g2NIRvqKM2jBe0Ftah5/xeR1361mI3rZ J/am800f8M6TsTs727UT1cilW5zHwrDKyU1A0QFLfePvTZgGoyqSMi3dmqFNaK2D2EgI bllg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1698698695; x=1699303495; h=to:subject:message-id:date:from:mime-version:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=1nNcwydeqkjCq8iRciQ7j19b4Ac12VDc9Aq1qkpSV5A=; b=vF7oWQ2mNGSR40GtQDmICgK2QgdpqYvwuK9QmdRK7icCa93895NkpGR3wN+OhsgqPN XtxsFRxLK3SwrH0Is2Zmb7lAYz/SU1dYgGFrUR3T3mSi6c2fsNaGC7M7tfsvqaR5O/kw mRGhphaeiKozYKB/gjHMwWZfEPrebZzl9BrV+uslVyOI9op1H7rzy3kwO3dIiXZDEfJb ByKGLzV4q0a2HbooleWtExFlpHc1EFmw2CNhVPdU+/7afXJI/vA3NGpjWZySTtlyVT6W fYv7cxpYvYmHUKNYda1wxTH3MZcamB0fp943W4W9NaAjkc6P3RLV/8ny12T0AdTxvzQb WyvA==
X-Gm-Message-State: AOJu0Yw1IJ3i6PIRVm4f35I8xCfZSUgQJLA02o2NwgVV3TMPJS1nAAGj qXxlKwv+oEoVmf9hxrl9fhh1HYUibTPulnIkSGw8eOTjs1Y=
X-Google-Smtp-Source: AGHT+IG83xgweSwJOnQ0cYPmBvPim+y5jg/FErdl+qqrvTPS5j6CWqXOujHUKEhbHJR4vHQqhO0xt9FABcs64KmpdSI=
X-Received: by 2002:adf:e681:0:b0:32f:8024:64e3 with SMTP id r1-20020adfe681000000b0032f802464e3mr3866725wrm.22.1698698694509; Mon, 30 Oct 2023 13:44:54 -0700 (PDT)
MIME-Version: 1.0
From: Rifaat Shekh-Yusef <rifaat.s.ietf@gmail.com>
Date: Mon, 30 Oct 2023 16:44:38 -0400
Message-ID: <CADNypP87BHSKYN+Uz5dkR80wSSN68L-e6uc1TdLEHA=x23rMWg@mail.gmail.com>
To: oauth <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000004449690608f51c80"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/mc49G7ZpiDLLs0EvDxsxazzLuDI>
Subject: [OAUTH-WG] IETF118 - OAuth WG Final Agenda
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 30 Oct 2023 20:45:05 -0000

All,

Here is our final agenda for Prague:
https://datatracker.ietf.org/doc/agenda-118-oauth/

Regards,
 Rifaat & Hannes


Tuesday (60 min)

   -

   Chairs update – Rifaat Shekh-Yusef/Hannes Tschofenig (15 min)
   -

   Charter discussion (30 min)
   -

   SD-JWT – Kristina Yasuda/Daniel Fett – (15 min)


   https://datatracker.ietf.org/doc/draft-ietf-oauth-selective-disclosure-jwt/


Wednesday (120 min)

   -

   Protected Resource Metadata – Mike Jones, Aaron Parecki (20 min)

   https://datatracker.ietf.org/doc/draft-ietf-oauth-resource-metadata/
   -

   SD-JWT-based Verifiable Credentials (SD-JWT VC) – Oliver Terbu, Daniel
   Fett (20 min)

   https://datatracker.ietf.org/doc/draft-ietf-oauth-sd-jwt-vc/
   -

   Attestation-Based Client Authentication – Paul Bastian (20 min)


   https://datatracker.ietf.org/doc/draft-ietf-oauth-attestation-based-client-auth/
   -

   Browser-Based Apps - Aaron Parecki (20 min)

   https://datatracker.ietf.org/doc/draft-ietf-oauth-browser-based-apps/
   -

   Cross-Device Flows – Pieter Kasselman (15 min)

   https://datatracker.ietf.org/doc/draft-ietf-oauth-cross-device-security/
   -

   OAuth Status List - Paul Bastian (20 min)

   https://datatracker.ietf.org/doc/draft-ietf-oauth-status-list/


Friday (120 min)

   -

   Transaction Tokens – George Fletcher (20 min)


   https://datatracker.ietf.org/doc/draft-tulshibagwale-oauth-transaction-tokens/
   -

   Identity Chaining – Pieter Kasselman (20 min)


   https://datatracker.ietf.org/doc/draft-schwenkschuster-oauth-identity-chaining/
   -

   The Use of Attestation in DCR – Ned Smith (20 min)


   https://datatracker.ietf.org/doc/draft-tschofenig-oauth-attested-dclient-reg/
   -

   First-Party Native Applications - Aaron Parecki (20 min)

   https://datatracker.ietf.org/doc/draft-parecki-oauth-first-party-apps/
   -

   OAuth Client and Device Metadata for Nested Flows - Aaron Parecki (20
   min)


   https://datatracker.ietf.org/doc/draft-parecki-oauth-metadata-for-nested-flows/
   -

   Any other business (20 min)