LLMS Central - The Robots.txt for AI

openid.net

Last updated: 10/24/2025valid

Independent Directory - Important Information

This llms.txt file was publicly accessible and retrieved from openid.net. LLMS Central does not claim ownership of this content and hosts it for informational purposes only to help AI systems discover and respect website policies.

This listing is not an endorsement by openid.net and they have not sponsored this page. We are an independent directory service with no affiliation to the listed domain.

Copyright & Terms: Users should respect the original terms of service of openid.net. If you believe there is a copyright or terms of service violation, please contact us at support@llmscentral.com for prompt removal. Domain owners can also claim their listing.

Current llms.txt Content

Generated by All in One SEO v4.8.8, this is an llms.txt file, used by LLMs to index the site.

# OpenID Foundation

Helping people assert their identity wherever they choose

## Sitemaps

- [XML Sitemap](https://openid.net/sitemap.xml): Contains all public & indexable URLs for this website.

## Posts

- [Notice of Vote for Proposed Second Implementer’s Draft of Grant Management for OAuth 2.0](https://openid.net/notice-of-vote-for-proposed-second-implementers-draft-of-grant-management-for-oauth-2-0/) - The official voting period will be between Sunday, July 2, 2023 and Sunday, July 9, 2023, once the 45-day review of the specification has been completed. For the convenience of members, voting will actually open on Sunday, June 25, 2023 for members who have completed their reviews by then, with the voting period still ending
- [FAPI WG recommends the Part 1, 2 and JARM drafts for the implementer’s draft – Public review period has started](https://openid.net/fapi-wg-recommends-the-part-1-2-and-jarm-drafts-for-the-implementers-draft-public-review-period-has-started/) - The OpenID OpenID Financial-grade API Working Group recommends approval of the following specification as an OpenID Implementer’s Draft: Financial-grade API — Part 1: Read Only API Security Profile Financial-grade API — Part 2: Read & Write API Security ProfileFinancial-grade API — JWT Secured Authorization Response Mode for OAuth 2.0 (JARM) An Implementer’s Draft is a stable version of a specification
- [Public Review Period for Two Proposed iGov Implementer’s Drafts](https://openid.net/public-review-period-for-two-proposed-igov-implementers-drafts/) - The OpenID iGov Working Group recommends approval of the following specifications as OpenID Implementer’s Drafts:International Government Assurance Profile (iGov) for OAuth 2.0International Government Assurance Profile (iGov) for OpenID Connect 1.0An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This note starts the 45-day public review
- [Standards Adoption and the Adoption of Standards – Financial-grade API (FAPI) 1.0 Final Specifications Published](https://openid.net/standards-adoption-and-the-adoption-of-standards-financial-grade-api-fapi-1-0-final-specifications-published/) - I'm pleased to announce that the OpenID Foundation has published the Financial-grade API (FAPI) Parts 1.0 and 2.0 final specifications. This is a true accomplishment for open banking initiatives worldwide. The Foundation couldn’t have reached this important milestone with the FAPI specification without the leadership of the FAPI Working Group led by Chairman Nat Sakimura, Anoop
- [Picking up Speed on the FAPI Roadmap: From the FAPI RW Implementers Draft 2 to FAPI 1.0 Advanced Final](https://openid.net/picking-up-speed-on-the-fapi-roadmap-from-the-fapi-rw-implementers-draft-2-to-fapi-1-0-advanced-final/) - The FAPI Working Group published a FAPI Frequently Asked Questions (FAQ) as a resource for those new to FAPI and implementing FAPI. This FAQ will evolve over time as the Foundation engages with new members like the Australian Competition & Consumer Commission as well as colleagues in the US, Australia, Brazil and other jurisdictions on
- [Public Review Period for Proposed Authorization API 1.0 Final Specification](https://openid.net/public-review-period-for-proposed-authorization-api-1-final-specification/) - The OpenID AuthZEN Working Group recommends the following OpenID Final Specification:Authorization API 1.0: https://openid.net/specs/authorization-api-1_0-04.htmlA Final Specification provides intellectual property protections to implementers of the specification and is not subject to further revision. This note starts the 60-day public review period for the specification draft in accordance with the OpenID Foundation IPR policies and procedures. Unless issues are
- [OpenID Connect Core 1.0 now published as ITU standard](https://openid.net/openid-connect-core-1-0-now-published-as-itu-standard/) - The ITU has published OpenID Connect Core 1.0 as Recommendation X.1285, enhancing global recognition of the standard used by billions across the world.
- [Second Implementer’s Draft of OpenID Connect Native SSO for Mobile Apps Approved](https://openid.net/second-implementers-draft-openid-connect-native-sso-for-mobile-apps-approved/) - The OpenID Foundation membership has approved the following as an OpenID Implementer’s Draft:OpenID Connect Native SSO for Mobile Apps 1.0: https://openid.net/specs/openid-connect-native-sso-1_0-ID2.html An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This Implementer’s Draft is the product of the OpenID AB/Connect Group.The voting results were:Approve – 57 votesObject
- [Registration Open for OpenID Foundation Hybrid Workshop at Cisco on Mon 20th October 2025](https://openid.net/registration-open-for-openid-foundation-hybrid-workshop-at-cisco-on-mon-20th-october-2025/) - The OpenID Foundation will be holding a hybrid workshop on Mon 20th October 2025, just ahead of the Fall 2025 Internet Identity Workshop (IIW). (A discount code for OIDF members was forwarded via email)This hybrid event will take place both in person at Cisco’s Santana Row offices in San Jose, California, USA and online making
- [OIDF applauds new FIDO and Shared Signals whitepaper](https://openid.net/oidf-applauds-new-fido-and-shared-signals-whitepaper/) - OpenID Foundation and FIDO Alliance partner on enterprise security. Learn how FIDO authentication and Shared Signals Framework work together.
- [OpenID Foundation Applauds Western Balkans Digital ID Plan](https://openid.net/openid-foundation-applauds-western-balkans-digital-id-plan/) - The Western Balkans commits to interoperable digital ID wallets at the 6th Digital Summit, aligning with EU eIDAS 2.0 and OpenID Foundation standards.
- [Public Review Period for Proposed OpenID4VC High Assurance Interoperability Profile (HAIP) 1.0 Final Specification](https://openid.net/public-review-period-for-proposed-openid4vc-high-assurance-interoperability-profile-1-final-specification/) - The OpenID Digital Credentials Protocols (DCP) Working Group recommends the following OpenID Final Specification: OpenID4VC High Assurance Interoperability Profile (HAIP) 1.0: https://openid.net/specs/openid4vc-high-assurance-interoperability-profile-1_0-05.html A Final Specification provides intellectual property protections to implementers of the specification and is not subject to further revision. This note starts the 60-day public review period for the specification draft in accordance with the OpenID Foundation IPR
- [New whitepaper tackles AI agent identity challenges](https://openid.net/new-whitepaper-tackles-ai-agent-identity-challenges/) - OpenID Foundation releases whitepaper on AI agent identity management. Learn why existing frameworks need evolution for autonomous AI deployment.
- [OIDF Announces New Investment to Expand Conformance Services](https://openid.net/oidf-announces-new-investment-to-expand-conformance-services/) - OpenID Foundation launches accredited conformance testing service in Q2 2026 to complement self-certification, supporting 60+ digital identity ecosystems.
- [OIDF Supports National Strategy on Fraud and Scam Prevention](https://openid.net/oidf-supports-national-strategy-on-fraud-and-scam-prevention/) - OpenID Foundation joins 80+ partners in launching the first US National Strategy on Fraud and Scam Prevention, leveraging open standards for digital security.
- [FAPI 2.0 Message Signing Final Specification Approved](https://openid.net/fapi-2-message-signing-final-specification-approved/) - The OpenID Foundation membership has approved the following as an OpenID Final Specification: FAPI 2.0 Message Signing: https://openid.net/specs/fapi-message-signing-2_0-final.html A Final Specification provides intellectual property protections to implementers of the specification and is not subject to further revision. This Final Specification is the product of the OpenID FAPI Working Group. The voting results were:Approve – 87 votesObject -- 0 votesAbstain
- [Whitepaper open for comment: The Unfinished Digital Estate: Culture, Law, and Technology After Death](https://openid.net/open-for-comment-the-unfinished-digital-estate/) - A new OIDF research paper is now open for public comment: "The Unfinished Digital Estate: Culture, Law, and Technology After Death."
- [PRESS RELEASE: OpenID Foundation finalizes global standards for real-time identity security](https://openid.net/press-release-openid-foundation-finalizes-global-standards-for-real-time-identity-security/) - OpenID Foundation approves three security standards enabling real-time threat sharing across systems, making Zero Trust architectures achievable globally.
- [Australian Digital Trust Community Group responds to Productivity Commission's Digital Technology Report](https://openid.net/australian-digital-trust-community-group-responds-to-productivity-commissions-digital-technology-report/) - OpenID Foundation's Australian group responds to Productivity Commission report with recommendations on digital identity, data sharing, and security.
- [Notice of Vote for Proposed Second Implementer’s Draft of OpenID Connect Native SSO for Mobile Apps](https://openid.net/notice-of-vote-to-approve-proposed-second-implementers-draft-of-openid-connect-native-sso-for-mobile-apps/) - The voting period will be between Thursday, October 2, 2025 and Thursday, October 19, 2025, following the 45 day review of the specification.The OpenID Connect Working Group page is https://openid.net/wg/connect/. If you’re not already a member, or if your membership has expired, please consider joining to participate in the approval vote. Information on joining the OpenID Foundation can
- [OIDF supports Japanese regulator on phishing defence](https://openid.net/oidf-supports-japanese-regulator-on-phishing-defence/) - OpenID Foundation's Chairman Nat Sakimura supports Japan's FSA on cybersecurity standards to combat sophisticated phishing attacks on financial firms.
- [OpenID for Verifiable Credential Issuance 1.0 Final Specification Approved](https://openid.net/openid-for-verifiable-credential-issuance-1-final-specification-approved/) - The OpenID Foundation membership has approved the following as an OpenID Final Specification:OpenID for Verifiable Credential Issuance 1.0: https://openid.net/specs/openid-4-verifiable-credential-issuance-1_0-final.html A Final Specification provides intellectual property protections to implementers of the specification and is not subject to further revision. This Final Specification is the product of the OpenID DCP Working Group.The voting results were:Approve – 102 votesObject --
- [How SSF/CAEP and STIX/TAXII Secure Different Fronts](https://openid.net/how-ssf-caep-and-stix-taxii-secure-different-front/) - Learn how SSF/CAEP enables real-time security responses while STIX/TAXII powers threat intelligence. Expert analysis by Okta's Apoorva Deshpande
- [Three Shared Signals Final Specifications Approved](https://openid.net/three-shared-signals-final-specifications-approved/) - The OpenID Foundation membership has approved the following three specifications as an OpenID Final Specifications:OpenID Shared Signals Framework: https://openid.net/specs/openid-sharedsignals-framework-1_0-final.htmlOpenID CAEP: https://openid.net/specs/openid-caep-1_0-final.htmlOpenID RISC: https://openid.net/specs/openid-risc-1_0-final.htmlA Final Specification provides intellectual property protections to implementers of the specification and is not subject to further revision. These three Final Specifications are the product of the OpenID Shared Signals Working Group.The voting
- [Public Review Period for Proposed FAPI 2.0 Message Signing Final Specification](https://openid.net/public-review-period-for-proposed-fapi-2-message-signing-final-specification/) - This blog post was updated on August 27, 2025 to update the final specification voting schedule belowThe OpenID FAPI working group recommends the approval of the following specification as an OpenID Final Specification:FAPI 2.0 Message Signing A Final Specification provides intellectual property protections to implementers of the specification and is not subject to further revision. This note
- [Notice of Vote to Approve Proposed FAPI 2.0 Message Signing Final Specification](https://openid.net/notice-of-vote-to-approve-fapi-2-message-signing-final-specification/) - The two-week voting period will be between Wednesday, September 10, 2025 and Wednesday, September 24, 2025, once the 60 day review of the specification has been completed.The FAPI working group page: https://openid.net/wg/fapi. If you’re not already a member, or if your membership has expired, please consider joining to participate in the approval vote. Information on joining the
- [Notice of Vote to Approve Three Shared Signals Final Specifications](https://openid.net/notice-of-vote-to-approve-three-shared-signals-specifications/) - The two-week voting period will be between Monday, August 15, 2025 and Monday, August 29, 2025, once the 60 day review of the specification has been completed. The OpenID Shared Signals Working Group page is https://openid.net/wg/sharedsignals/. If you’re not already a member, or if your membership has expired, please consider joining to participate in the approval vote. Information
- [OIDF receives security analysis of OpenID for Verifiable Presentations](https://openid.net/oidf-receives-security-analysis-of-openid-for-verifiable-presentations/) - OpenID Foundation announces completion of security analysis of OID4VP and DC API, confirming protocol security with no new vulnerabilities found.
- [Errata Corrections to JWT Secured Authorization Response Mode for OAuth 2.0 (JARM) Approved](https://openid.net/errata-corrections-to-jwt-secured-authorization-response-mode-for-oauth-2-0-jarm-approved/) - Errata to the following specification have been approved by a vote of the OpenID Foundation members:JWT Secured Authorization Response Mode for OAuth 2.0 (JARM) – This specification was created to bring some of the security features defined as part of OpenID Connect to OAuth 2.0An Errata version of a specification incorporates corrections identified after the Final Specification was published.
- [Notice of Vote to Approve OpenID for Verifiable Credential Issuance 1.0 Final Specification](https://openid.net/notice-of-vote-openid-for-verifiable-credential-issuance-1-0-final-specification/) - This is a notice of the upcoming vote to approve OpenID for Verifiable Credential Issuance 1.0 as a Final Specification.
- [Public Review Period for Proposed OpenID for Verifiable Credential Issuance 1.0 Final Specification](https://openid.net/public-review-period-for-proposed-openid-for-verifiable-credential-issuance-1-final-specification/) - The OpenID Digital Credentials Protocols (DCP) Working Group recommends the following OpenID Final Specification:OpenID for Verifiable Credential Issuance 1.0: https://openid.net/specs/openid-4-verifiable-credential-issuance-1_0-16.htmlA Final Specification provides intellectual property protections to implementers of the specification and is not subject to further revision. This note starts the 60-day public review period for the specification draft in accordance with the OpenID Foundation
- [Adoption now and ahead: mDL Day ‘Voices of the Future’ panel](https://openid.net/adoption-now-and-ahead-mdl-day-voices-of-the-future-panel/) - State officials from 6 leading US states discuss mobile driver's license adoption, use cases, and resident satisfaction at the Federal mDL Industry Day.
- [Public Review Period for Proposed Second Implementer’s Draft of OpenID Connect Native SSO for Mobile Apps](https://openid.net/public-review-period-for-proposed-second-implementers-draft-of-openid-connect-native-sso-for-mobile-apps/) - Public Review Period for Proposed Second Implementer’s Draft of OpenID Connect Native SSO for Mobile Apps The OpenID Connect Working Group recommends approval of the following specification as an OpenID Implementer’s Draft:OpenID Connect Native SSO for Mobile Apps 1.0This would be the second Implementer’s Draft of this specification.An Implementer’s Draft is a stable version of a specification
- [Public Review Period for Proposed Three Shared Signals Final Specifications](https://openid.net/public-review-period-for-proposed-three-shared-signals-final-specifications/) - The OpenID Shared Signals Working Group recommends approval of the following three specifications as OpenID Final Specifications:OpenID Shared Signals FrameworkOpenID CAEPOpenID RISCA Final Specification provides intellectual property protections to implementers of the specification and is not subject to further revision. This note starts the 60-day public review period for the specification draft in accordance with the OpenID
- [Shared Signals interop event at Authenticate 2025: Call for participation](https://openid.net/shared-signals-interop-event-at-authenticate-2025-call-for-participation/) - OpenID Foundation announces SSF interoperability testing at Authenticate 2025, demonstrating final Shared Signals Framework specs for enhanced security.
- [OpenID Foundation demonstrates real-world interoperability of new Digital Identity Issuance Standards](https://openid.net/oidf-demonstrates-interoperability-of-new-digital-identity-issuance-standards/) - OIDF announces that the OpenID for Verifiable Credential Issuance spec has proven interoperability through the pairwise testing of providers around the world.
- [OIDF launches Ecosystems Support Community Group ](https://openid.net/oidf-launches-ecosystems-support-community-group/) - OpenID Foundation launches Ecosystems Support Community Group to guide ecosystem leaders in implementing open banking, open data & digital identity standards.
- [UN's DPI Day: Elizabeth Garber on standards as safeguards](https://openid.net/uns-dpi-day-elizabeth-garber-on-standards-as-safeguards/) - The OpenID Foundation's Elizabeth Garber explores why open standards are essential safeguards for secure, interoperable Digital Public Infrastructure.
- [Strengthening cloud identity through open standards](https://openid.net/strengthening-cloud-identity-through-open-standards/) - The OIDF responds to CISA's call for public-private collaboration on cloud identity security and the urgent need to address these challenges.
- [Notice of Vote to Approve Proposed Errata Corrections to JWT Secured Authorization Response Mode for OAuth 2.0 (JARM)](https://openid.net/notice-of-vote-proposed-errata-corrections-jwt-secured-authorization-response-mode-oauth2/) - An upcoming vote to approve proposed errata corrections to JWT Secured Authorization Response Mode for OAuth 2.0 (JARM). The voting period is 7/28 to 8/4/2025.
- [OpenID for Verifiable Presentations 1.0 Final Specification Approved](https://openid.net/openid-for-verifiable-presentations-1-0-final-specification-approved/) - The OpenID Foundation membership has approved OpenID for Verifiable Presentations 1.0 as an OpenID Final Specification. ·
- [FAPI 2.0 Security Profile and FAPI 2.0 Message Signing: Final Conformance Tests and Certifications Now Available](https://openid.net/fapi2-0-final-conformance-tests-available/) - OIDF has announced conformance tests and certifications for the FAPI 2.0 Security Profile and FAPI 2.0 Message Signing specs (authorization servers & clients).
- [Balancing sovereignty and interoperability](https://openid.net/balancing-sovereignty-and-interoperability/) - OIDF leads discussion at IGF 2025 on balancing digital identity interoperability with sovereignty for developing countries, with ey insights on inclusion.
- [OpenID Connect Relying Party Metadata Choices 1.0 Implementer's Draft Approved](https://openid.net/openid-connect-relying-party-metadata-choices-implementers-draft-approved/) - The OpenID Foundation membership has approved the following specification as an OpenID Implementer’s Draft:OpenID Connect Relying Party Metadata Choices 1.0: https://openid.net/specs/openid-connect-rp-metadata-choices-1_0-ID1.htmlAn Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This specification is a product of the OpenID AB/Connect Working Group.The voting results were:Approve – 74
- [OpenID Foundation and CSC partner to strengthen ID ecosystem](https://openid.net/openid-foundation-and-csc-partner-to-strengthen-id-ecosystem/) - OpenID Foundation and Cloud Signature Consortium partner to create unified standards for digital identity and cloud-based signatures.
- [OpenID Attachments 1.0 Final Specification Approved](https://openid.net/openid-attachments-1-final-specification-approved/) - The OpenID Foundation membership has approved the following OpenID Final Specification:OpenID Attachments 1.0: https://openid.net/specs/openid-connect-4-ida-attachments-1_0-final.htmlA Final Specification provides intellectual property protections to implementers of the specification and is not subject to further revision. The OpenID Attachments 1.0 Final Specifications is the product of the eKYC & IDA Working Group.The voting results were:Approve – 77 votesObject –3 votesAbstain – 26 votesTotal
- [Let's Discuss Identity Management in AI](https://openid.net/lets-discuss-identity-management-in-ai/) - The OpenID Foundation board recently approved the formation of a Community Group to bring AI and IAM experts together in discussing identity management in AI.
- [Scaling FAPI 2.0 to Transform Healthcare Security in Norway](https://openid.net/scaling-fapi-2-0-to-transform-healthcare-security-in-norway/) - Norway's Health Network becomes first to deploy FAPI 2.0 banking-grade security nationwide via HelseID, setting global healthcare cybersecurity standard.
- [Public Review Period for Proposed OpenID for Verifiable Presentations Final Specification](https://openid.net/public-review-period-for-proposed-openid-verifiable-presentations-final-specification/) - The OpenID DCP working group recommends approval of the following specification as an OpenID Final Specification:OpenID for Verifiable PresentationsA Final Specification provides intellectual property protections to implementers of the specification and is not subject to further revision. This note starts the 60-day public review period for the specification draft in accordance with the OpenID Foundation IPR policies
- [OpenID Foundation Certification Program Recruiting a Java Developer](https://openid.net/certification-program-recruiting-java-developer/) - Published March 8, 2024, revised May 15, 2024.Please note the OpenID Foundation is no longer recruiting a Java developer.The OpenID Foundation is pleased to announce that it is looking to add a Java developer to the successful OpenID certification program team. The OpenID Foundation enables deployments of OpenID specifications to be certified to specific conformance
- [EAP ACR Values Final Specification Approved](https://openid.net/eap-acr-values-final-specification-approved/) - The OpenID Foundation membership has approved the following OpenID Final Specification:OpenID Connect Extended Authentication Profile (EAP) ACR Values 1.0: https://openid.net/specs/openid-connect-eap-acr-values-1_0-final.htmlA Final Specification provides intellectual property protections to implementers of the specification and is not subject to further revision. The EAP ACR 1.0 Final Specification is the product of the EAP Working Group.The voting results were:Approve
- [Building a Digital Commons for Identity - the SIDIHub](https://openid.net/building-a-digital-commons-for-identity-the-sidihub/) - OIDF and SIDI Hub were proud to outline, recently at Identiverse, what has been achieved so far by SIDI to advance safe, interoperable digital identity systems.
- [Notice of Vote for Proposed Implementer’s Draft of OpenID Connect Relying Party Metadata Choices](https://openid.net/notice-of-vote-for-proposed-implementers-draft-openid-connect-rely-party-metadata-choices/) - The official voting period will be between Saturday, June 28, 2025 and Saturday, July 5, 2025, once the 45 day review of the specification has been completed. For the convenience of members who have completed their reviews by then, voting will actually begin on Saturday, June 21, 2025. The OpenID Connect Working Group page is https://openid.net/wg/connect/. If
- [OpenID Foundation takes the stage at Identiverse 2025](https://openid.net/openid-foundation-takes-the-stage-at-identiverse-2025/) - OIDF presented its ‘Take on the Landscape’ at Identiverse on June 2nd 2025, exploring the OIDF's rapidly expanding impact across the identity ecosystem.
- [A new ITU-T standard ushers in a new era for OpenID](https://openid.net/a-new-itu-t-standard-ushers-in-a-new-era-for-openid/) - OpenID Connect Core 1.0 specification has been formally adopted, by incorporation, by the International Telecommunication Union (ITU) as Recommendation X.1285.
- [Notice of Vote for Proposed OpenID for Verifiable Presentations Final Specification](https://openid.net/notice-of-vote-for-proposed-openid-for-verfiable-presentations-final-specification/) - The two-week voting period will be between Tuesday, June 24, 2025 and Tuesday, July 8, 2025 (12:00pm PT), once the 60 day review of the specification has been completed.The OpenID DCP working group page is https://openid.net/wg/digital-credentials-protocols/. If you’re not already an OpenID Foundation member, or if your membership has expired, please consider joining to participate in the
- [Notice of Vote for Proposed Final EAP ACR Values Specification](https://openid.net/notice-of-vote-for-proposed-final-eap-acr-values-specification/) - The official voting period will be between Monday June 9, 2025 and Monday, June 16, 2025 (12:00pm PT), once the 60 day review of the specification has been completed. For the convenience of members who have completed their reviews by then, early voting will begin on Monday, June 2, 2025.The OpenID EAP working group page is https://openid.net/wg/eap/.
- [A Global First: OpenID Foundation Demonstrates Real-World Interoperability of New Digital Identity Standards](https://openid.net/openid-foundation-demonstrates-real-world-interoperabiity-of-new-digital-identity-standards/) - OIDF convened a landmark demonstration of secure, interoperable, and scalable digital identity credential presentation across platforms, devices, and formats.
- [Notice of Vote for Proposed OpenID Attachments 1.0 Final Specification](https://openid.net/notice-of-vote-for-proposed-openid-attachments-1-final-specification/) - The official voting period will be between Monday June 16, 2025 and Monday, June 23, 2025 (12:00pm PT), once the 45 day review of the specification has been completed. For the convenience of members who have completed their reviews by then, early voting will begin on Monday, June 9, 2025. The OpenID eKYC & IDA working
- [Public Review of JWT Secured Authorization Response Mode for OAuth 2.0 (JARM)](https://openid.net/public-review-jwt-secured-authorization-response-mode-oauth-2-0/) - The OpenID FAPI working group recommends the approval of Errata corrections to the following specification:First Errata Set for JWT Secured Authorization Response Mode for OAuth 2.0 (JARM) An Errata version of a specification incorporates corrections identified after the Final Specification was published. This would be the first set of errata corrections for JWT Secured Authorization Response Mode
- [Juggling with fire made easier: Provisioning with SCIM](https://openid.net/juggling-with-fire-made-easier-provisioning-with-scim/) - SCIM Events bring real-time, flexible provisioning to identity management - enhancing privacy, policy decisions, and auditability in event-driven systems.
- [Public Review Period for Proposed Implementer’s Draft of OpenID Connect Relying Party Metadata Choices](https://openid.net/public-review-period-for-proposed-implementers-draft-openid-connect-relying-party-metadata-choices/) - The OpenID Connect Working Group recommends approval of the following specification as an OpenID Implementer’s Draft:OpenID Connect Relying Party Metadata Choices 1.0This would be the first Implementer’s Draft of this specification.An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This note starts the 45-day public review period
- [OpenID Foundation presents at Financial Data Exchange Summit](https://openid.net/openid-foundation-presents-at-financial-data-exchange-summit/) - OIDF shares timely talk at FDX's Spring Global Summit as members weigh RFC approvals, including a proposed 'blue' profile featuring FAPI 2.0.
- [The OpenID Federation Interoperability Event](https://openid.net/the-openid-federation-interoperability-event/) - The OpenID Foundation welcomed 30 international delegates with 14 implementations to a groundbreaking OpenID Federation Interoperability event, hosted at SUNET.
- [Shared Signals Framework: The Blueprint for Modern IAM Part 1 of 4](https://openid.net/shared-signals-framework-the-blueprint-for-modern-iam-part-1-of-4/) - Discover how the Shared Signals Framework enhances IAM with real-time threat sharing, CAEP/RISC events, and scalable security across organizations.
- [How AuthZEN, and Shared Signals & CAEP complement each other](https://openid.net/how-authzen-and-shared-signals-caep-complement-each-other/) - Most cyber attacks leverage identities. AuthZEN, and Shared Signals and CAEP complement each other, making them our best defense against such attacks.
- [OIDF hosts unique global demo of digital ID interoperability](https://openid.net/oidf-hosts-unique-global-demo-of-digital-id-interoperability/) - OpenID Foundation hosts unique global demonstration of digital identity interoperability, representing a crucial milestone.
- [OpenID Foundation Member Announcement – Update to How You Log in at openid.net](https://openid.net/foundation-member-announcement-update-how-you-login-at-openid-net/) - Dear OpenID Foundation Members,The OpenID Foundation (OIDF) is updating the way you log in at openid.net. Logins at https://openid.net/foundation/members currently use a no-longer-supported service called Janrain Engage. OIDF looked at extending the Janrain Engage solution to offer more social login options but was unable to do so as it is no longer supported.After evaluating two alternatives from
- [Join us for a global demo of digital identity in action](https://openid.net/join-us-for-a-global-demo-of-digital-identity-in-action/) - The OpenID Foundation presents a real-world demonstration of cross-platform credential exchange, privacy-first architecture, and enterprise-grade security.
- [Public Review Period for Proposed OpenID Attachments 1.0 Final Specification](https://openid.net/public-review-period-for-proposed-proposed-openid-attachements-1-0-final-specification/) - The OpenID eKYC & IDA working group recommends approval of the following specification as an OpenID Final Specification: OpenID Attachments 1.0 A Final Specification provides intellectual property protections to implementers of the specification and is not subject to further revision. This note starts the 60-day public review period for the specification draft in accordance with the OpenID Foundation IPR
- [OpenID Foundation Members Honoured in Okta’s Identity 25](https://openid.net/openid-foundation-members-honoured-in-oktas-identity-25/) - The OpenID Foundation is delighted that many of its key collaborators, partners and colleagues have been recognized in the Okta Ventures’ Identity 25 honourees.
- [Public Review Period for Proposed Final EAP ACR Values Specification](https://openid.net/public-review-period-for-proposed-final-eap-acr-values-specification/) - The OpenID EAP working group recommends approval of the following specification as an OpenID Final Specification:OpenID Connect Extended Authentication Profile (EAP) ACR Values 1.0A Final Specification provides intellectual property protections to implementers of the specification and is not subject to further revision. This note starts the 60-day public review period for the specification draft in accordance with
- [OIDF & OIDF-J welcome the Japanese Digital Agency, West Japan Railway Company, and the National Institute of Informatics’ Student VC Project](https://openid.net/oidf-oidf-j-welcome-the-japanese-digital-agency-west-japan-railway-company-and-the-national-institute-of-informatics-student-vc-project/) - OIDF & OIDF Japan welcome pilot project which will see universities issue student enrolment certificates as verifiable credentials to students’ digital wallets.
- [AuthZEN & Shared Signals in the Gartner IAM 2025 spotlight](https://openid.net/authzen-shared-signals-in-the-gartner-iam-2025-spotlight/) - An intense and unforgettable two days for the OpenID Foundation at the March 2025 Gartner Identity & Access Management Summit in London.
- [Attend the OIDF Workshop prior to IIW Spring 2025 on 7th April 2025](https://openid.net/attend-the-oidf-workshop-prior-to-iiw-spring-2025-on-7th-april-2025/) - The OpenID Foundation will be holding a hybrid workshop on Monday, 7th April 2025, just ahead of the Spring 2025 Internet Identity Workshop (IIW). This hybrid event will take place both in person at Google’s facility in Sunnyvale, CA, and online making it accessible to participants worldwide. Event Details:📅 Date: Monday, April 7th, 2025🕒 Time: 12:30 -
- [Implementer’s Draft of OpenID4VC High Assurance Interoperability Profile Approved](https://openid.net/implementers-draft-of-openid4vc-haip/) - The OpenID Foundation membership has approved the following OpenID Implementer’s Draft: OpenID for OpenID4VC High Assurance Interoperability Profile: https://openid.net/specs/openid4vc-high-assurance-interoperability-profile-1_0-ID1.htmlAn Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. OpenID for OpenID4VC High Assurance Interoperability Profile Implementer’s Draft is the product of the Digital Credentials Protocols (DCP) Working Group. The
- [Implementer's Guide: FAPI 2.0 Final vs. Implementer's Draft 2.0](https://openid.net/implementers-guide-fapi-2-final-vs-implementers-draft-2/) - This post lays out and explains key editorial changes between FAPI Implementer's Draft 2.0 and the recently approved FAPI 2.0 Final Draft.
- [Standardized, Fine-Grained Authorization Using OAuth 2 Grant Management and Rich Authorization Requests](https://openid.net/standardized-fine-grained-authorization-with-oauth2-grant-management-and-rich-authorization-requests/) - This paper explains the FAPI WG recommendations related to OAuth2 Grant Management and Rich Authorization Requests (RAR) to enable fine-grained authorization.
- [Notice of Vote for Proposed Implementer’s Draft of OpenID4VC High Assurance Interoperability Profile](https://openid.net/notice-of-vote-for-proposed-implementers-draft-oid4vc-haip/) - The official voting period will be between Tuesday, March 25, 2025 and Tuesday, April 1, 2025 (12:00pm PT), once the 45 day review of the specification has been completed. For the convenience of members who have completed their reviews by then, early voting will begin on Tuesday, March 18, 2025. The Digital Credentials Protocols (DCP) working group page
- [Webinar on IPSIE secures more than 300 registrations](https://openid.net/webinar-on-ipsie-secures-more-than-300-registrations/) - Gail Hodges and industry experts discuss what IPSIE is, why a new secure identity standard is needed and the game-changing benefits it will deliver.
- [OpenID Federation Interop Event, April 28-30, 2025](https://openid.net/openid-federation-interop-apr-28-30-2025/) - The OpenID Foundation will be holding an interop testing event Monday-Wednesday, April 28-30, 2025 for OpenID Federation implementations. In-person participation is encouraged, but if it works better for you, you can also participate remotely.The event will be hosted by SUNET at their office in Stockholm, Sweden.Event Details:📅 Date: Monday-Wednesday, April 28-30, 2025🕒 Time: Mid-day Monday to
- [OPIN joins OIDF Board via Peers Consulting + Technology](https://openid.net/opin-joins-oidf-board-via-peers-consulting-technology/) - The OpenID Foundation welcomes Open Insurance Brazil, via their strategic partnership with Peers Consulting + Technology, to the Board as a Sustaining Member.
- [Notice of a Security Vulnerability](https://openid.net/notice-of-a-security-vulnerability/) - During a formal analysis of OpenID Federation, a security vulnerability was discovered and corrective actions have already been taken.
- [OIDF Re-Elected to OpenWallet Foundation’s Board](https://openid.net/oidf-re-elected-to-openwallet-foundations-board/) - The OIDF is delighted to be re-elected to the OpenWallet Foundation’s (OWF) Board of Directors as an Observer to represent the OWF’s associate sponsors.
- [FAPI 2.0 Security Profile and Attacker Model Final Specifications Approved](https://openid.net/fapi-2-security-profile-attacker-model-final-specifications-approved/) - The OpenID Foundation membership has approved the FAPI 2.0 Security Profile and Attacker Model as Final Specifications.
- [Australian Digital Trust Community Group (ADT CG)](https://openid.net/australian-digital-trust-community-group-adt-cg/) - The Australian Digital Trust Community Group has been set up under OIDF as a neutral platform for digital id & trust ecosystems professionals to collaborate.
- [Shared Signal WG returns to Gartner IAM for interoperability](https://openid.net/shared-signal-wg-returns-to-gartner-iam-for-interoperability/) - OIDF returns to the Gartner IAM Summit to host more interoperability sessions, and calls for participants to demonstrate their SSF and CAEP implementations.
- [Second Implementer’s Draft of OpenID for Verifiable Credential Issuance Specification Approved](https://openid.net/second-implementers-draft-openid-for-verifiable-credential-issuance-approved/) - The OpenID Foundation membership has approved the OpenID for Verifiable Credential Issuance specification as a Second Implementer’s Draft
- [Public Review Period for Proposed Implementer’s Draft of OpenID4VC High Assurance Interoperability Profile](https://openid.net/public-review-period-for-proposed-implementers-draft-openid4vc-haip/) - The Digital Credentials Protocols (DCP) WG recommends approval of the OpenID for Verifiable Credential Issuance specification as an Implementer’s Draft.
- [AuthZEN community to host interoperability session at the Gartner IAM Summit](https://openid.net/authzen-at-gartner-iam/) - The OpenID Foundation is excited to share that it will host its first AuthZEN interoperability session at the Gartner IAM Summit in London, March 24-25, 2025.
- [Notice of Vote for Proposed FAPI 2.0 Security Profile and Attacker Model Final Specifications](https://openid.net/notice-of-vote-for-proposed-fapi-2-0-security-profile-and-attacker-model-final-specifications/) - Voting is between Sat, Feb 8, 2025 and Sat, Feb 15, 2025 (12:00pm PT), once the 60 day review of the specifications is complete. Early voting begins Feb 1.
- [Public Review Period for Proposed Final FAPI 2.0 Security Profile and Attacker Model Specifications](https://openid.net/public-review-for-proposed-final-fapi-2-0-specifications/) - The OIDF FAPI Working Group recommends approval of FAPI 2.0 Security Profile and FAPI 2.0 Attacker Model as Final Specifications.
- [Notice of Vote for Proposed Second Implementer’s Draft of OpenID for Verifiable Credential Issuance Specification](https://openid.net/notice-of-vote-for-proposed-second-implementers-draft-openid4vci-specification/) - The official voting period will be between Monday, February 3, 2025 and Monday, February 10, 2025 (12:00pm PT), once the 45 day review of the specification has been completed. For the convenience of members who have completed their reviews by then, voting will actually begin on Monday, January 27, 2025.The Digital Credentials Protocols (DCP) working group page
- [OIDF Feedback on NIST's Attribute Validation Services](https://openid.net/oidf-feedback-on-nists-attribute-validation-services/) - This post summarizes OIDF's feedback on NIST's recent Draft Report on Attribute Validation Services for Identity Management.
- [2025 OpenID Foundation Board of Directors](https://openid.net/2025-openid-board-of-directors/) - 2025 OIDF Board of Directors election results: Atul Tulshibagwale and Mark Verstege elected Corporate Reps. Nat Sakimura & John Bradley elected Community Reps.
- [Strengthening cybersecurity measures – the OpenID Foundation’s recommendations on ENISA’s guidance for the NIS2 Directive](https://openid.net/strengthening-cybersecurity-measures-oidf-recommendations-enisa-nis2/) - The OpenID Foundation welcomes the opportunity to offer feedback on ENISA’s draft technical guidance for the cybersecurity measures of the NIS2 Directive.
- [Third OpenID4VP Implementer’s Draft Approved](https://openid.net/third-openid4vp-implementers-draft-approved/) - The OpenID Foundation membership has approved the following specification as an OpenID Implementer’s Draft: OpenID for Verifiable Presentations: https://openid.net/specs/openid-4-verifiable-presentations-1_0-ID3.htmlAn Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This Implementer’s Draft is a product of the AB/Connect working group. The voting results were:Approve – 91 votesObject - 3 votesAbstain – 19 votesTotal
- [OpenID foundation urges private and public sector organisations to collaborate and drive adoption of privacy-preserving identity solutions](https://openid.net/oidf-urges-public-private-sector-collaboration-mdl/) - Following the success of two recent community hackathons co-hosted with the California DMV, OIDF is inviting others to collaborate to drive mDL adoption.
- [Driving Innovation and Adoption: Reflections on the California mDL Hackathons](https://openid.net/driving-innovation-and-adoption-reflections-california-mdl-hackathons/) - The California DMV and the OpenID Foundation recently hosted two to advance digital identity through California’s mobile Driver’s License (mDL).
- [Digital Identity News Round-Up: 13 Dec 2024](https://openid.net/digital-identity-news-round-up-13-dec-2024/) - The OpenID Foundation's Digital Identity Round-Up presents our scan of the media and news related to Digital Identity, Standards, and Open Banking.
- [Shared Signals Interoperability at Gartner IAM](https://openid.net/shared-signals-interoperability-at-gartner-iam/) - OIDF's Shared Signals WG is showcasing shared signals interoperability at the Gartner Identity and Access Management (IAM) Summit, in Grapevine, Texas.
- [Announcing the 2025 OpenID Foundation Community Representatives Election](https://openid.net/2025-oidf-community-representatives-election/) - The 2024 OIDF election of Community Representatives is opening today. Board Members facilitate progress and guide the strategic direction of the Foundation.
- [OpenID Foundation returns to Gartner IAM Summit to showcase Shared Signals interoperability in action](https://openid.net/oidf-returns-to-gartner-to-showcase-shared-signals-interoperability/) - OIDF is proud to announce its return to the Gartner Identity and Access Management Summit, to be held in Grapevine, Texas, from December 9th to 11th, 2024.
- [Notice of Vote for Proposed Implementer’s Draft of OpenID4VP Specification](https://openid.net/notice-of-vote-for-proposed-implementers-draft-of-openid-for-openid-for-verifiable-presentations/) - The official voting period will be between Tuesday, December 17, 2024 and Tuesday, December 24, 2024 (12:00pm PT), once the 45 day review of the specification has been completed. For the convenience of members who have completed their reviews by then, voting will actually begin on Tuesday, December 10, 2024.The AB Connect work group page is https://openid.net/wg/connect/.
- [Public Review Period for Proposed Implementer’s Draft of OpenID4VP Specification](https://openid.net/public-review-period-for-proposed-third-implementers-draft-of-openid-for-verifiable-presentations-specification-3/) - The OpenID AB/Connect Working Group recommends approval of the following specification as an OpenID Implementer’s Draft:OpenID4VP: https://openid.net/specs/openid-4-verifiable-presentations-1_0-22.htmlThis would be the third Implementer’s Draft of this specification.This version has 3 major changes:Introduces the Digital Credentials Query Language; this is an alternative to Presentation ExchangeIntroduces the transaction data mechanism that enables a binding between the user's identification/authentication and the
- [For the Record: The IPSIE WG and OpenID Foundation Processes](https://openid.net/ipsie-wg-and-oidf-processes/) - This post clarifies our ways of working and affirms that all due processes have been followed in the formation of a new OID Working Group (IPSIE).
- [AuthZEN Authorization API 1.0 Implementer’s Draft Approved](https://openid.net/authzen-authorization-api-1-0-implementers-draft-approved/) - The OpenID Foundation membership has approved the following AuthZEN specifications as an OpenID Implementer’s Draft:Authorization API 1.0 Implementer’s Draft: https://openid.net/specs/authorization-api-1_0-01.htmlAn Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This Implementer’s Draft is a product of the AuthZEN Working Group.The voting results were:Approve – 82 votesObject
- [Notice of Vote for Proposed AuthZEN Authorization API 1.0 Implementer’s Draft](https://openid.net/notice-of-vote-implementers-draft-authzen-authorization-api-1-0/) - The official voting period will be between Thursday, November 7, 2024 and Thursday, November 14, 2024 (12:00pm PT), once the 45 day review of the specification has been completed. For the convenience of members who have completed their reviews by then, voting will actually begin on Thursday, October 31, 2024.The AuthZEN work group page is https://openid.net/wg/authzen/. If you’re not
- [FAPI 2.0 Conformance Tests Now Support DPoP](https://openid.net/fapi-2-0-conformance-tests-support-dpop/) - The OpenID Foundation is pleased to announce the release of DPoP (Demonstration of Proof-of-Possession, RFC 9449) support in FAPI 2.0 Conformance Tests. Implementers can now certify their solutions with DPoP, adding an additional layer of security for client authentication. This update follows the beta phase and addresses the community's feedback on DPoP testing. DPoP tests
- [Registration Open for OpenID Foundation Hybrid Workshop at Microsoft on Monday, October 28, 2024](https://openid.net/registration-oidf-workshop-cisco-october-28-2024/) - Workshop OverviewOpenID Foundation Workshops provide technical insight and influence on current digital identity standards while offering a collaborative platform to openly address current trends and market opportunities. This OpenID Foundation Workshop includes a number of presentations focused on 2024 Foundation key initiatives as well as updates from active work groups.Workshop Details Thank you kindly to
- [Public Review Period for Proposed AuthZEN Authorization API 1.0 Implementer’s Draft](https://openid.net/review-period-proposed-authzen-authorization-api-1-0-implementers-draft/) - The AuthZEN WG recommends approval of the Authorization API 1.0 specification as an Implementer’s Draft. The voting period will run from Nov 2-Nov 9, 2024.
- [Revisions to OpenID Process Document and IPR Policy Approved](https://openid.net/revisions-to-oidf-process-and-ipr-policy-approved/) - In October 2024, the OpenID Foundation membership voted to approve changes to the OIDF process document and IPR policy, following a Board vote in September.
- [Announcing the IPSIE Working Group](https://openid.net/announcing-ipsie-working-group/) - The OpenID Foundation announces IPSIE, a Working Group aiming to tackle key challenges that underlie identity security in today's enterprise environments.
- [An Outreach Workshop for Open Banking Chile](https://openid.net/outreach-workshop-open-banking-chile/) - The OpenID Foundation (OIDF) and the Comisión para el Mercado Financiero (CMF) in Chile delivered an outreach workshop for the Chilean Open Finance System.
- [OpenID Foundation Updates Bylaws](https://openid.net/oidf-updates-bylaws/) - The OpenID Foundation board of directors unanimously approved updating the Foundation’s Bylaws by a 75% supermajority vote as required by the Bylaws (Section 9.2 Bylaw Amendments) at the November 16, 2023 board meeting. The new Bylaws are effective as of November 16, 2023.From the founding of the OpenID Foundation, the Foundation has intended to maintain
- [10 Years On: OpenID Connect Published as an ISO/IEC Spec](https://openid.net/10-years-on-openidconnect-published-as-iso-spec/) - 10 years after OpenID Connect Final was launched, we are delighted to announce that 9 OIDC specifications are now published as ISO/IEC standards.
- [Three OpenID Connect for Identity Assurance Final Specifications Approved](https://openid.net/final-openid-connect-for-identity-assurance-specifications-approved/) - The OpenID Foundation membership has approved the following three OpenID Connect for Identity Assurance specifications as an OpenID Final Specifications: OpenID Identity Assurance Schema Definition 1.0 - https://openid.net/specs/openid-ida-verified-claims-1_0-final.htmlOpenID Connect for Identity Assurance Claims Registration 1.0 - https://openid.net/specs/openid-connect-4-ida-claims-1_0-final.htmlOpenID Connect for Identity Assurance 1.0 - https://openid.net/specs/openid-connect-4-identity-assurance-1_0-final.html A Final Specification provides intellectual property protections to implementers of the specification and is not subject
- [Announcing the Death and the Digital Estate Community Group](https://openid.net/announcing-death-and-the-digital-estate-cg/) - Announcing the Death and the Digital Estate Community Group, formed to explore how people can manage their digital estate in the event of disablement or death.
- [Accelerating mDL Adoption in the United States](https://openid.net/accelerating-mdl-adoption-united-states/) - OIDF has joined a National Cybersecurity Council CoE Collaborative Research and Development Agreement that will accelerate Digital Identity adoption in the US.
- [Proposed Revisions to OpenID Process Document and IPR Policy](https://openid.net/proposed-revisions-oid-process-doc-and-ipr-policy/) - Dear OpenID Foundation Members,A subgroup of OpenID Foundation board members and key staff have been working to update the “OpenID Process” document based on issues raised by some board members to ensure the document aligns with how the Foundation currently works. This update addresses those original issues and also identified a significant number of mainly
- [Notice of Vote for Proposed Final OpenID Connect for Identity Assurance Specifications](https://openid.net/vote-final-identity-assurance-specifications/) - The official voting period will be between Monday, September 23, 2024 and Monday, September 30, 2024 (12:00pm PT), once the 60 day review of the specification has been completed. For the convenience of members who have completed their reviews by then, voting will actually begin on Monday, September 16, 2024.The eKYC & IDA work group page is https://openid.net/wg/ekyc-ida/. If
- [Public Review Period for Proposed Final OpenID Connect for Identity Assurance Specifications](https://openid.net/public-review-proposed-final-openid-connect-for-identity-assurance/) - The OpenID Foundation’s eKYC & IDA Working Group recommends approval of the following specifications as OpenID Final Specifications.
- [NIST 800-63 Feedback Sessions](https://openid.net/nist-800-63-feedback-sessions/) - The OpenID Foundation will be conducting two feedback sessions for the latest draft of NIST's 800-63-4. Those sessions will be held on September 19th and 20th.
- [OIDF to Co-Host Mobile Drivers License Hackathons](https://openid.net/oidf-cohosts-mdl-hackathons/) - The OpenID Foundation will co-host two Hackathons with the California Department of Motor Vehicles (DMV) in support of their Mobile Drivers License (mDL) pilot.
- [Three Shared Signals Implementer's Drafts Approved](https://openid.net/three-shared-signals-implementers-drafts-approved/) - The OpenID Foundation membership has approved three Shared Signals specifications as OpenID Implementer’s Drafts. Find all three drafts here.
- [GAIN Community Group: An Update](https://openid.net/gain-community-update/) - The GAIN POC Community Group is working to show that disparate digital identity implementations can be integrated. This post shares progress and next steps.
- [Notice of Vote for Proposed Three Shared Signals Implementer’s Drafts](https://openid.net/notice-of-vote-3-shared-signals-implementer-drafts/) - Announcing a voting period from 8/12/24 to 8/19/24 (12:00pm PT), following the 45 day review period. Early voting will actually begin on Monday, August 5, 2024.
- [Calling all Implementers: Shared Signals Interop at Gartner IAM Summit](https://openid.net/calling-all-implementers/) - The OpenID Foundation and the Shared Signals Work Group (SSWG) are returning to Gartner’s IAM Summit (December 9-11, 2024) for a second interop event.
- [Fourth Implementer’s Draft of OpenID Federation Approved](https://openid.net/fourth-implementers-draft-of-openid-federation-approved/) - Voting is now closed on the Fourth Implementer's Draft of OpenID Federation. The OpenID Foundation membership has approved the specification.
- [Guidance to the CFPB regarding US Open Banking](https://openid.net/open-banking-guidance-to-cfpb/) - Following a May 16th open letter, OIDF has been in dialogue with the CFPB about the US Open Banking ecosystem. This post summarizes our guidance.
- [All Aboard the CAEP-Ability Hype Train!](https://openid.net/caep-ability-hype-train/) - The Shared Signals WG Chairs met at Identiverse 2024 to answer questions and invite everyone to jump aboard the CAEP-ability hype train.
- [Notice of Vote for Proposed Fourth Implementer’s Draft of OpenID Federation](https://openid.net/notice-of-vote-for-proposed-fourth-implementers-draft-of-openid-federation/) - The official voting period will be between Wednesday, July 17, 2024 and Wednesday, July 24, 2024 (11:59:59PM PT), once the 45 day review of the specification has been completed. For the convenience of members who have completed their reviews by then, voting will actually begin on Wednesday, July 10, 2024.The OpenID Connect Working Group page
- [New Shared Signals Drafts](https://openid.net/new-shared-signals-drafts/) - The Shared Signals Work Group has released 3 new drafts for Public Review. This post summarizes key changes to be voted on at the end of the 45 day window.
- [OpenID for Verifiable Credentials Wins EIC Award!](https://openid.net/dcp-wins-eic-award/) - The OpenID Foundation and members of the DCP Work Group recently won an EIC innovation award for the OpenID for Verifiable Credentials family of specifications.
- [Public Review Period for Three Shared Signals Drafts](https://openid.net/three-shared-signals-drafts/) - The OpenID Shared Signals Working Group recommends approval of the following three specifications as OpenID Implementer’s Drafts
- [Digital Identity at the G20](https://openid.net/digital-identity-g20/) - Executive Director, Gail Hodges, delivered remarks about standards, interoperability, and Digital Identity at the G20 Digital Government and Inclusion Workshop.
- [AI for Identity Standards](https://openid.net/ai-for-standards/) - A recent OpenID panel explored risks posed by Artificial Intelligence and how the standards community should mitigate, especially in relation to secure code.
- [Public Review Period for Proposed Fourth Implementer’s Draft of OpenID Federation](https://openid.net/public-review-period-for-proposed-fourth-implementers-draft-of-openid-federation/) - The OpenID Connect Working Group recommends approval of the following specification as an OpenID Implementer’s Draft:OpenID Federation 1.0This would be the fourth Implementer’s Draft of this specification.An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This note starts the 45-day public review period for the
- [AuthZEN Work Group Announces Authorization Interop Results](https://openid.net/authorization-interop-results/) - OIDF's AuthZEN Work Group announces that leading authorization vendors conform with its request/response protocol, a major step towards interoperability.
- [OIDF Welcomes Mastercard to the Board](https://openid.net/mastercard-joins-oidf-board/) - The OpenID Foundation is delighted to announce that Mastercard has joined its Board of Directors as a Sustaining Member, following years of industry leadership.
- [Letter to the CFPB on US Open Banking](https://openid.net/letter-cfpb-open-banking/) - The OpenID Foundation recommends that the CFPB mandate a standardized Communications Protocol for US open banking. It highlights key security and market risks.
- [Open Letter from the OpenID Foundation to Apple Regarding Sign In with Apple](https://openid.net/open-letter-from-the-openid-foundation-to-apple-regarding-sign-in-with-apple/) - June 27, 2019Mr. Craig Federighi Apple Senior Vice President of Software Engineering One Apple Park Way Cupertino, CA 95014RE: Open Letter from the OpenID Foundation to Apple Regarding Sign In with AppleDear Mr. Federighi,The OpenID Foundation applauds Apple’s efforts to allow users to login to third-party mobile and Web applications with their Apple ID using
- [Post-Quantum Identity Standards](https://openid.net/post-quantum-identity-standards/) - OIDF held a panel to discuss how organizations and standards bodies should move forward to mitigate the code-breaking potential of post-quantum computing.
- [Shared Signals: Enhanced Security for All](https://openid.net/shared-signals-enhanced-security-for-all/) - At Gartner's IAM Summit, industry leaders showcased interoperable Shared Signals Framework implementations, promising a more secure digital future for all.
- [Registration Open for OpenID Foundation Hybrid Workshop at Google on Monday, April 15, 2024](https://openid.net/registration-oidf-workshop-monday-april-15-2024/) - Workshop OverviewOpenID Foundation Workshops provide technical insight and influence on current digital identity standards while offering a collaborative platform to openly address current trends and market opportunities. This OpenID Foundation Workshop includes a number of presentations focused on 2024 Foundation strategic initiatives as well as updates on active working groups.Workshop Details Thank you kindly to
- [Implementer’s Draft of OpenID for Verifiable Credential Issuance Approved](https://openid.net/implementers-draft-of-openid-for-verifiable-credential-issuance-approved/) - The OpenID Foundation membership has approved the following specification as an OpenID Implementer’s Draft:OpenID for Verifiable Credential Issuance 1.0This is the first Implementer’s Draft of this specification.An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This specification is a product of the OpenID Connect Working
- [Notice of Vote for Proposed Implementer’s Draft of OpenID for Verifiable Credential Issuance](https://openid.net/notice-of-vote-for-proposed-implementers-draft-of-openid-for-verifiable-credential-issuance/) - The official voting period will be between Monday, March 25, 2024 and Monday, April 1, 2024, once the 45 day review of the specification has been completed. For the convenience of members who have completed their reviews by then, voting will actually begin on Monday, March 18, 2024. The OpenID Connect Working Group page is
- [OpenID Summit Tokyo 2024 and Celebrating 10 Years of OpenID Connect](https://openid.net/openid-summit-tokyo-2024-celebrating-10-years-connect/) - OpenID Foundation Japan (OIDF-J) hosted the OpenID Summit Tokyo 2024 in Shibuya Tokyo on Friday, January 19, 2024 with over 250 in attendance. The OpenID Foundation (OIDF) was thrilled to be a part of the Summit that included contributors from Japan and abroad presenting on current digital identity, security, and digital wallet topics.Gail Hodges, OIDF
- [The Importance of OpenID Foundation Shared Signals Framework](https://openid.net/importance-of-shared-signals-framework/) - Published December, 2023, revised February 14, 2024 to confirm interoperability demonstration at Gartner IAM conference held in London, UK.Blog authored by Apoorva Deshpande, Engineering Leader, Okta.The OpenID Foundation Shared Signals Framework (SSF) is an emerging and promising standard for sharing security signals between trusted parties. It has the potential to play a significant role in
- [Public Review Period for Proposed Implementer’s Draft of OpenID for Verifiable Credential Issuance](https://openid.net/review-of-proposed-implementers-draft-of-openid-for-verifiable-credential-issuance/) - The OpenID Connect Working Group recommends approval of the following specification as an OpenID Implementer’s Draft:OpenID for Verifiable Credential Issuance 1.0This would be the first Implementer’s Draft of this specification.An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This note starts the 45-day public review
- [SIDI Hub Announces Roadmap to Drive Cross-Border Interoperability for Digital Identity](https://openid.net/sidi-hub-announces-roadmap-drive-cross-board-interoperability-digital-identity/) - The OpenID Foundation is proud to be a founding member of the Sustainable and Interoperable Digital Identity (SIDI) Hub.Interoperability is crucial for a fair and inclusive digital society. By coordinating the digital identity activities already underway, and defining a governance structure for digital identity credentials, the SIDI Hub is helping accelerate the path to cross-border
- [Formal Security Analysis of OpenID for Verifiable Credentials](https://openid.net/formal-security-analysis-openid-verifiable-credentials/) - The first in-depth security analysis of OpenID for Verifiable Credentials has been completed, with the goal of increasing confidence in the security of these specifications. The formal security analysis includes the protocols OpenID for Verifiable Credential Issuance (OID4VCI) and OpenID for Verifiable Presentations (OID4VP), both part of the OpenID for Verifiable Credentials family. The formal security
- [2024 OpenID Foundation Board of Directors Election Results](https://openid.net/2024-board-election-results/) - I want to personally thank all OpenID Foundation members who voted in the 2024 elections for representatives to the OpenID Foundation board of directors.Please note that the OpenID Foundation board of directors unanimously approved updated Bylaws at a board meeting on November 16, 2023, with full details, including a summary of updates, found here. Per the
- [Registration Open for OpenID Foundation Hybrid Workshop in Tokyo, Japan on Thursday, January 18, 2024](https://openid.net/registration-oidf-workshop-tokyo-2024/) - Published December 4, 2023, revised January 8, 2024 to include workshop agenda.The OpenID Foundation is pleased to announce a hybrid workshop hosted by KDDI in Tokyo, Japan on Thursday, January 18, 2024. This workshop precedes the 2024 OpenID Foundation – Japan Summit.Please note that registration is required for those participating in-person as well as those
- [Call for Participation: Demonstrate Interoperability of your CAEP Implementations](https://openid.net/call-for-participation-demonstrate-interoperability-of-your-caep-implementations/) - Published December 21, 2023, revised January 6, 2024.Note: The deadline for indicating interest in the CAEP Interoperability Event has been extended from January 6, 2024 to January 12, 2024.The OpenID Foundation, in partnership with Gartner, would like to invite you to participate in an interoperability event where different implementers can demonstrate the compatibility of their
- [OpenID Foundation Comments on CFPB Rule 1033 Regarding Open Banking](https://openid.net/oidf-comments-cfpb-rule-1033-regarding-open-banking/) - Blog authored by Mark Haine.The OpenID Foundation submitted comments to the CFPB on the recent Open Banking rule 1033 on Friday, December 29, 2023. The cover note to the CFPB is provided in full below, and the detailed comments can be viewed here. We are proud to support the CFPB in their due diligence on this
- [OpenID Foundation Provides FAPI and Certification Program Overview for the CAMARA Identity & Consent Work Group](https://openid.net/fapi-and-certification-program-overview-camara-identity-consent-wg/) - As recently announced, the OpenID Foundation has joined the Linux Foundation’s CAMARA project as an Associate Member. CAMARA is an open-source project within Linux Foundation that defines, develops and tests the APIs enabling seamless access to Telco network capabilities.Bjorn Hjelm, OIDF Liaison Officer to CAMARA and OIDF MODRNA WG Co-Chair, led an OIDF meeting with
- [Second Errata Set for OpenID Connect Specifications Approved](https://openid.net/second-errata-set-for-openid-connect-specifications-approved/) - Errata to the following specifications have been approved by a vote of the OpenID Foundation members:OpenID Connect Core 1.0 – Defines the core OpenID Connect functionality: authentication built on top of OAuth 2.0 and the use of Claims to communicate information about the End-UserOpenID Connect Discovery 1.0 – Defines how Relying Parties dynamically discover information
- [Review of Second Proposed Errata Set for OpenID Connect Specifications](https://openid.net/review-second-proposed-errata-openid-connect-specifications/) - The OpenID Connect Working Group recommends the approval of Errata corrections to the following specifications:OpenID Connect Core 1.0 – Defines the core OpenID Connect functionality: authentication built on top of OAuth 2.0 and the use of Claims to communicate information about the End-UserOpenID Connect Discovery 1.0 – Defines how Relying Parties dynamically discover information about OpenID ProvidersOpenID
- [Announcing the 2024 OpenID Foundation Community Representatives Election](https://openid.net/2024-oidf-community-representatives-election/) - This is to announce the 2024 OpenID Foundation Community Representatives election schedule. Those elected will help guide the Foundation’s efforts in facilitating the development and adoption of important open identity standards enabling global interoperability as well as the strategic direction of the Foundation.Please note that the OpenID Foundation board of directors unanimously approved updated Bylaws at
- [Formal Security Analysis of FAPI 2.0 Message Signing, DCR, DCM and FAPI-CIBA Completed](https://openid.net/security-analysis-fapi-2-0-completed/) - Following the publication of the formal security analysis of the FAPI 2.0 Security Profile in December 2022, a second round of analysis has now been completed, extending it to include FAPI 2.0 Message Signing, Dynamic Client Registration (DCR), Dynamic Client Management (DCM), and FAPI-CIBA.The analysis was co-funded by the Australian Government and the OpenID Foundation,
- [Second Implementer’s Draft of Shared Signals Framework Specification Approved](https://openid.net/second-implementers-draft-of-shared-signals-framework-approved/) - The OpenID Foundation membership has approved the following Shared Signals specifications as OpenID Implementer’s Drafts:OpenID Shared Signals Framework SpecificationAn Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This is the second Shared Signals Framework Implementer’s Drafts. The Implementer’s Draft is available at:https://openid.net/specs/openid-sharedsignals-framework-1_0-ID2.html You can learn more
- [OIDF FAPI Outreach Workshops for Open Banking Brazil - Spring 2021](https://openid.net/oidf-fapi-outreach-workshops-for-open-banking-brazil-spring-2021/) - The OpenID Foundation recently hosted a series of Financial-grade API (FAPI) outreach workshops in support of Open Banking Brazil. The Foundation partnered with new member, Mirow & Co., in developing and delivering these workshops to educate the Brazilian market on the FAPI security profile and the value of FAPI conformance and certification. Mirow & Co
- [OpenID Foundation Joins CAMARA](https://openid.net/oidf-joins-camara/) - Published November 21, 2023, revised November 22, 2023 to include Deutsche Telekom quote.The OpenID Foundation is pleased to announce that it has joined the Linux Foundation’s CAMARA project as an Associate Member.CAMARA is an open source project within Linux Foundation that defines, develops and tests the APIs enabling seamless access to Telco network capabilities. Initiated
- [Notice of Vote to Approve Proposed Second Errata Set for OpenID Connect Specifications](https://openid.net/notice-of-vote-approve-second-errata-set-openid-connect-specifications/) - The official voting period will be between Wednesday, December 6, 2023 and Wednesday, December 13, 2023, following the 45 day review of the specifications. For the convenience of members who have completed their reviews by then, voting will actually open a week early on Wednesday, November 29, 2023, with the voting period still ending on Wednesday,
- [Announcing the redesign of openid.net](https://openid.net/announcing-the-redesign-of-openid-net/) - As the US government considers OpenID as a vehicle for citizen engagement, it became time for the OpenID Foundation's website to receive similar consideration. For some time, the site has been neglected and ignored — serving primarily as a resource for developers, with little regard paid to people just learning about digital identity. The new
- [Registration Open for OpenID Foundation Workshop at Verizon Media on Monday, April 29, 2019](https://openid.net/registration-open-for-openid-foundation-workshop-at-verizon-media-on-monday-april-29-2019/) - OpenID Foundation Workshops provide insight and influence on important Internet identity standards. The workshops provide updates on the work happening within OpenID Foundation working groups as well as updates on the OpenID Certification Program. Leading technologists from Verizon Media, Google, Microsoft, Amazon, Yubico, Verizon and others will update key issues and discuss how they help
- [Leveraging OpenID within an IDaaS Model](https://openid.net/leveraging-openid-within-an-idaas-model/) - Good presentation last week at CIS 2012 from Vikas Jain on the scenarios for leveraging OpenID for IDaaS models. There are many emerging applications for using OpenID in this way and Vikas talks about a number of use cases for the Enterprise including: Front-end authN into IDaaS using OpenID SSO to OpenID Protected Apps from
- [Registration is Now Open for the OIDF Workshop on April 6, 2015](https://openid.net/registration-is-now-open-for-the-oidf-workshop-on-april-6-2015/) - Registration is now open for the OpenID Foundation Workshop on April 6 (the Monday before IIW) from 12:00 – 5:00 PM at Aol offices in Palo Alto, CA. This OpenID Foundation Workshop will provide early insight and influence on important new online identity standards like OpenID Connect. We will provide a hands-on tutorial on the
- [Registration Now Open for OIDF Workshop October 26, 2015](https://openid.net/registration-now-open-for-oidf-workshop-october-26-2015/) - Registration http://openid-workshop-oct-2015.eventbrite.com is now open for the OpenID Foundation Workshop being held on October 26, 2015, the Monday before the Fall IIW meeting) at Symantec’s HQ in Mountain View, CA. OpenID Foundation Workshops provide early insight and influence on widely adopted online identity standards like OpenID Connect. The workshop provides updates and hands-on tutorials on
- [OIDF Summit in Tokyo November 10, 2015](https://openid.net/oidf-summit-in-tokyo-november-10-2015/) - The OpenID Summit Tokyo 2015 will be held this November 10 and will feature technical discussions about OpenID Connect as well as governance in Identity Ecosystem and the IoT (Internet of Things). ' Registration is now open and registration details for the event are available here: http://www.eventbrite.com/e/openid-summit-tokyo-2015-tickets-18111127871?aff=es2 The call for presentations is available here: http://j.mp/cfp_oid15.
- [Foundation Activity and Progress Report September 2015](https://openid.net/foundation-activity-and-progress-report-september-2015/) - I spoke last week at the European Identity Management Conference in Amsterdam and this week in Florida at the Global Identity Summit, in both venues the adoption and interest in the evolution of OpenID Connect was clearly evident and important. In a panel I chaired, OpenID Foundation member GSMA referenced the important role OpenID Connect plays in their Mobile Connect deployment.
- [Registration Now Open for OpenID Foundation Workshop on Monday, April 25, 2016](https://openid.net/registration-now-open-for-openid-foundation-workshop-on-monday-april-25-2016/) - OpenID Foundation Workshops provide insight and influence on important internet identity standards. The workshop provides updates on the adoption of OpenID Connect across industry sectors. We'll review progress on OpenID Connect Certification and gather feedback for planned Relying Party certification. Work Group Leaders will overview the MODRNA (Mobile Profile of OpenID Connect) as well as
- [Vulnerability Alert - OpenID 2.0 Implementations Vulnerabilities found in some OPs](https://openid.net/vulnerability-alert-openid-2-0-implementations-vulnerabilities-found-in-some-ops/) - Please be advised a number of OpenID Authentication 2.0 server implementations were found to be vulnerable due to non-compliance to the normative requirements of the OpenID Authentication 2.0 specification. The nature of the vulnerability In section 11.4.2.1 of the OpenID Authentication 2.0, it is stated that “For verifying signatures an OP MUST only use private
- [Public Review Period for Shared Signals Framework Specification](https://openid.net/public-review-period-for-shared-signals-framework-specification/) - The OpenID Shared Signals Working Group recommends approval of the following specification as OpenID Implementer’s Draft:OpenID Shared Signals Framework SpecificationThis would be the second Implementer's Draft of this specification. An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This note starts the 45-day public review
- [What’s New in the Shared Signals Framework?](https://openid.net/whats-new-shared-signals-framework/) - Authors: Atul Tulshibagwale (SGNL), Apoorva Deshpande (Okta), and Shayne Miel (Cisco Duo).A new draft of the Shared Signals Framework has been released for public review. Here’s how it is different from the previous version.The OpenID Shared Signals Working Group (SSWG) has made important changes to the Shared Signals Framework (SSF) from the first implementer’s draft
- [Notice of Vote for Proposed Implementer’s Draft of Shared Signals Framework Specification](https://openid.net/notice-of-vote-for-proposed-implementers-draft-of-shared-signals-framework-specification/) - The voting period will be between Tuesday, November 28, 2023 and Tuesday, December 5, 2023, once the 45-day review of the specifications has been completed. The Shared Signals working group page is https://openid.net/wg/sharedsignals/. If you’re not already a member, or if your membership has expired, please consider joining to participate in the approval vote. Information
- [Guest Blog: SecureAuth’s OpenID Foundation Membership Drives Interoperability and Authentication for Customer Identity Security Across Cloud and Mobile](https://openid.net/guest-blog-secureauths-openid-foundation-membership-drives-interoperability-and-authentication-for-customer-identity-security-across-cloud-and-mobile/) - Today, SecureAuth is an official member of the OpenID Foundation a non-profit international standardization organization committed to enabling, promoting and protecting OpenID technologies. As a distinguished member of the Foundation, SecureAuth also now has a voice in the elections for the governing body. SecureAuth Innovation Labs is dedicated to actively supporting and participating in the
- [Cisco Joins the OpenID Foundation Board, Signaling the Importance of Shared Signals to a Future of Zero Trust](https://openid.net/cisco-joins-the-openid-foundation-board-signaling-the-importance-of-shared-signals-to-a-future-of-zero-trust/) - Cisco has joined the OpenID Foundation as a sustaining member, effective November 2021. As Gail Hodges, the Executive Director of the OpenID Foundation said, “Cisco has played a pivotal role in building networked systems that underpin the internet today. We are honored to have Cisco join the Board at this critical inflection point in identity
- [Announcing the Final Draft “Government-Issued Digital Credentials and the Privacy Landscape”](https://openid.net/announcing-the-final-draft-government-issued-digital-credentials-and-the-privacy-landscape/) - Published May 4, 2023, revised August 25, 2023.Version 1.1 of this paper was published August 25, 2023 to include a narrow set of corrections submitted by the cobranding organizations, and incorporated at the discretion of the editor. Revision history is available upon request.The OpenID Foundation is pleased announce the final publication of the white paper
- [Announcing the 2022 OpenID Foundation Kim Cameron Award](https://openid.net/announcing-the-2022-openid-foundation-kim-cameron-scholarship/) - OverviewThe OpenID Foundation Board has resolve to begin the OpenID Foundation Kim Cameron Award Program in May 2022. Increasing representation from young people’s who’ve demonstrated an interest in subjects consistent with the OpenID Foundation Mission, to lead the global community in creating identity standards that are secure, interoperable, and privacy preserving.The OpenID Foundation Kim Cameron
- [OpenID Foundation Retail Summit](https://openid.net/openid-retail-summit/) - by Brian Kissel In Q1 of 2011 PayPal, the OpenID Foundation and Janrain will be facilitating the OpenID Retail Summit hosted by PayPal in Silicon Valley. We are also in discussions with the National Retail Foundation (NRF) about their possible participation. The meeting date is tentatively being scheduled around the NRF Innovate 2011 Conference in San Francisco March
- [The First OpenID User Experience Summit](https://openid.net/the-first-openid-user-experience-summit/) - Yesterday at Yahoo!'s campus in California, nearly forty people from the OpenID community came together for a day to discuss the usability and user experience of OpenID and OAuth. Presentations were shared by Facebook about their experience developing Connect, MySpace explained how they're combining OpenID and OAuth, Yahoo! around how they're evolving their own OpenID Provider in response to their research, Magnolia shared how they've been using OpenID to help reduce spam, Google with their study on federated login user interfaces, and Plaxo wrapping up the day with how they're looking at OpenID as a piece of a larger "open stack" for the Web.
- [Opportunity to Join the OpenID Foundation Certification Team](https://openid.net/opportunity-to-join-the-openid-foundation-certification-team/) - The OpenID Foundation is pleased to announce that it is looking to add a part-time member to the successful OpenID Certification program team. The OpenID Foundation enables deployments of OpenID Connect and the Financial-grade API (FAPI) to be certified to specific conformance profiles to promote interoperability among implementations. Later in 2021, the Foundation will be adding eKYC & IDA
- [Facebook joins OpenID Foundation Board with a commitment to better user experience](https://openid.net/facebook-joins-openid-foundation-board/) - Today we're excited to join Facebook's Mike Schroepfer in announcing that they have joined the OpenID Foundation's board as a sustaining corporate member. Luke Shepard, a key member of Facebook's Platform and Connect teams and a huge internal advocate for OpenID, has been selected as their representative and joins the current board of seven community
- [Introducing Don Thibeau: the OpenID Foundation's new executive director](https://openid.net/introducing-don-thibeau-the-openid-foundations-new-executive-director/) - The OpenID Foundation is happy to introduce Don Thibeau as our new executive director. Don is taking over from Bill Washburn who helped get the Foundation off the ground. Even with the substantial momentum that OpenID has gained already in 2009, Don has his work cut out for him beyond our two main priorities of
- [OpenID Foundation 2012 Community Board Member Election](https://openid.net/openid-foundation-2012-community-board-member-election/) - This is to announce the 2012 election of OpenID Foundation community board members. The Foundation plays an important role in the evolution of Internet identity technologies. Those elected will help determine what role the OIDF should play in helping facilitate faster and broader adoption of open standard identity systems. Last year four community board members
- [OpenID® Trademark and Service Mark License](https://openid.net/openid-trademark-and-service-mark-license/) - The OIDF board recently voted to adopt an OpenID Trademark and Service Mark License policy. The following are some of the guidelines regarding acceptable uses of OIDF trademarks outlined in the license: The owner of OIDF marks must be clearly identified as the "OpenID Foundation". For example, "OpenID® is a trademark (registered in numerous countries)
- [Public Review Period for FAPI Client Initiated Backchannel Authentication (CIBA) Profile Started](https://openid.net/public-review-period-for-fapi-client-initiated-backchannel-authentication-ciba-profile-started/) - The OpenID OpenID FAPI Working Group recommends approval of the following specification as an OpenID Implementer’s Draft: Financial-grade API: Client Initiated Backchannel Authentication Profile An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This note starts the 45-day public review period for the specification draft
- [How do working groups work?](https://openid.net/how-do-working-groups-work/) - As the scope of the OpenID Foundation’s work has expanded and the number of working groups and participants has grown, we periodically get questions about how OpenID Foundation working groups work. I’ve created a new “How do working groups work?” page to provide readily available answers to some of these frequently asked questions. This content
- [Proposed Revisions to OpenID IPR Policy Document](https://openid.net/proposed-revisions-to-openid-ipr-policy-document/) - Dear OpenID Foundation Members,Over the last year, the OpenID Foundation Executive Committee and the Board of Directors undertook a comprehensive update to key OpenID Foundation policy and legal documents to ensure they are current. As part of this update, proposed updates to the IPR Policy were made. The changes were unanimously approved by the board.
- [OpenID Foundation Executive Director Job Description](https://openid.net/openid-foundation-executive-director-job-description/) - The OpenID Foundation is seeking an Executive Director with the experience, skills, strategic vision, and commitment to advancing the Foundation’s open standards initiatives. This is a unique opportunity to lead a well-respected, member-driven, vendor-neutral, international standardization organization. The OpenID Foundation Executive Director (ED) reports directly to the Foundation’s Board of Directors and interacts extensively with
- [Resolution Thanking Don Thibeau for his Service](https://openid.net/resolution-thanking-don-thibeau-for-his-service/) - The OpenID Foundation Board of Directors unanimously approved the following resolution, proposed by Mike Jones and seconded by John Bradley, thanking Don Thibeau for his service:Resolved:The OpenID Foundation board thanks Don Thibeau for his exemplary service to the OpenID Foundation and the worldwide identity community during his decade-long service as Executive Director.The board looks forward
- [Welcoming Gail Hodges as Our New Executive Director](https://openid.net/welcoming-gail-hodges-as-our-new-executive-director/) - The OpenID Foundation is thrilled to welcome Gail Hodges as the new Executive Director of the OpenID Foundation. Those of you who already know Gail know that she’s passionate about enabling digital identity to serve the public good. She has extensive experience both in the digital identity space – for instance, having founded the Future
- [In Praise of Kim Cameron](https://openid.net/in-praise-of-kim-cameron/) - Much is made of attributes like “opinion leader”, “domain expert”, and “mentor”. Kim Cameron was all that and much more. Our colleague Joerg Resch has eloquently memorialized Kim’s many contributions to our industry as “fundamentally influencing the way we think about and deal with privacy and digital identity”. Not only did Kim “inject his 7
- [PayPal joins OpenID Foundation Board as we enter 2009](https://openid.net/paypal-joins-openid-foundation-board-as-we-enter-2009/) - The OpenID Foundation is pleased to announce the addition of PayPal as a sustaining corporate member of the Board. PayPal joins the current board of seven community elected board members and five sustaining corporate members: Google, IBM, Microsoft, VeriSign and Yahoo!.
- [The First OpenIDDevCamp was a Success](https://openid.net/the-first-openiddevcamp-was-a-success/) - Over the past two and a half days, nearly fifty different people came to the first ever OpenIDDevCamp hosted in San Francisco. Nearly twenty people showed up Friday evening to start drawing up the agenda for Saturday from a list of possible projects. Saturday we had our first full day of discussions and hacking around
- [OpenID Summit Tokyo 2020 and Side Events Registrations Are Open](https://openid.net/openid-summit-tokyo-2020-and-side-events-registrations-are-open/) - Every four years, OpenID Foundation Japan has an educational meeting called "OpenID Summit Tokyo". The next one is coming up on January 24, 2020. This year it will be at a brand new venue called Shibuya Stream Hall in Shibuya, Tokyo. The schedule is as follows: OpenID Summit Tokyo 2020 Jan 24, 2020 @ Shibuya
- [mixi Supports OpenID with the Simple Registration Extension](https://openid.net/mixi-supports-openid-with-the-simple-registration-extension/) - Last week mixi, the largest social network in Japan, become an OpenID Provider for all of their fifteen-million plus users; one in five Japanese web users are on mixi. While they are another large OpenID Provider -- which some argue is a bad thing -- they are the first large OpenID Provider to also support
- [OpenID Japan Launches with 32 Member Companies](https://openid.net/openid-japan-launches-with-32-member-companies/) - The OpenID Foundation is pleased to share that OpenID Japan has launched with 32 members including merchants, portals, educational institutions, insurance companies, manufacturing companies, airlines, and banks. This announcement is significant for several reasons: The number and breadth of industries represented by the new members The use of OpenID by member companies for commercial transactions
- [OpenID Certification Expanding to FAPI Specs](https://openid.net/openid-certification-expanding-to-fapi-specs/) - Announcement: The OpenID Foundation announced today it will continue expanding the scope of its award-winning OpenID Certification program, adding new profiles and capabilities. The new Form Post Response Mode profiles were launched this week during the Identiverse conference. The OpenID Foundation is pleased to announce its plans to expand the scope of the certification program
- [The UK Open Banking Implementation Entity Adopts the OpenID Foundation Financial-Grade API (FAPI) Specification & Certification Program](https://openid.net/the-uk-open-banking-implementation-entity-adopts-the-openid-foundation-financial-grade-api-fapi-specification-certification-program/) - The 2018 Identiverse Conference provided a timely catalyst for representatives of the OpenID Foundation and the UK Open Banking Implementation Entity (OBIE) to announce their collaboration on the Financial-grade API (FAPI) specification. The Identiverse stage provided an ideal venue to emphasize the importance of building on the award winning OpenID Certification Program to enable future self-certification of
- [Registration Open for OpenID Foundation Workshop at Oracle on Monday, April 2, 2018](https://openid.net/registration-open-for-openid-foundation-workshop-at-oracle-on-monday-april-2-2018/) - OpenID Foundation Workshops provide insight and influence on important Internet identity standards. The workshops provide updates on the work happening within OpenID Foundation working groups as well as updates on the OpenID Certification Program. Leading technologists from Oracle, Microsoft, Google, Ping Identity, Yubico, Verizon and others will update key issues and discuss how they help meet social,
- [Registration Open for OpenID Foundation Workshop at VMware on Monday, October 22, 2018](https://openid.net/registration-open-for-openid-foundation-workshop-at-vmware-on-monday-october-22-2018/) - OpenID Foundation Workshops provide insight and influence on important Internet identity standards. The workshops provide updates on the work happening within OpenID Foundation working groups as well as updates on the OpenID Certification Program. Leading technologists from VMware, Microsoft, Google, Amazon, Yubico, Verizon and others will update key issues and discuss how they help meet
- [OpenID Connect Logout Certifications Available](https://openid.net/openid-connect-logout-certifications-available/) - I’m pleased to announce that certification for RP logout implementations is now available. Give it a spin at https://openid.net/certification/logout_rp_testing/! This joins that OP logout certification that launched in August 2019, which is described at https://openid.net/certification/logout_op_testing/. Both are in pilot mode, and so certifications are currently available at no cost to OpenID Foundation members.If you’ve implemented
- [A new chapter in the OIDF](https://openid.net/a-new-chapter-in-the-oidf/) - The OpenID Foundation has covered a lot of ground in the last 1.5 years since its inception. We consolidated a number of internet identity efforts, built an organization charged with promoting and protecting the efforts of this fantastic community, developed an Intellectual Property Process that will ensure OpenID stays open, brought a number of the
- [OpenID Foundation Board of Director Election Now Open](https://openid.net/openid-foundation-board-of-director-election-now-open/) - The first OpenID Foundation election of community board members opened on December 10th. All members of the OpenID Foundation are eligible to vote for candidates. If you are not already a member of the OpenID Foundation, you can join as an individual member for $25/year. There are 17 candidates running for a total of seven
- [Flatten the Curve: OpenID Foundation Virtual Workshops to Continue Momentum and Progress](https://openid.net/flatten-the-curve-openid-foundation-virtual-workshops-to-continue-momentum-and-progress/) - In the face of the global health crisis, the OpenID Foundation remains committed to providing its members and the community at large updates on the ongoing work of the Foundation’s Working Groups as well as other current digital identity topics including open banking. We’ve redoubled our engagement with members, liaison partners and colleagues to make
- [Registration Open for OpenID Foundation Virtual Workshop -- Wednesday, October 28, 2020](https://openid.net/openid-foundation-virtual-workshop-wednesday-october-28-2020/) - Workshop Overview OpenID Foundation Workshops provide technical insight and influence on current Internet identity standards. This virtual workshop is a reschedule of the planned face-to-face workshop prior to IIW Fall 2020. This workshop includes a panel discussion on the Foundation's ongoing relationship and efforts with the Financial Data Exchange focused on open banking initiatives. The
- [Financial Data and Technology Association and OpenID Foundation in Global Agreement](https://openid.net/financial-data-and-technology-association-and-openid-foundation-in-global-agreement/) - Not-for-profits to campaign jointly on open finance initiativesThe OpenID Foundation (OIDF), the international standardisation organisation which maintains a standard known as the Financial-grade API (FAPI), and the Financial Data and Technology Association (FDATA Global), the global trade association for companies working to promote ‘open finance’ and best practise financial data sharing, have signed a liaison
- [Announcing the “Human-Centric Digital Identity: for Government Officials” Final Whitepaper](https://openid.net/human-centric-digital-identity-whitepaper/) - Published September 25, 2023, revised October 13, 2023.Version 1.1 of this paper was published October 13, 2023 as we are pleased to confirm MOSIP was added as a co brand partner of the paper. Revision history is available upon request.The OpenID Foundation is pleased to announce that the “Human-Centric Digital Identity: for Government Officials” whitepaper
- [Ministry of Economy, Trade and Industry and OpenID Foundation in Liaison Agreement on eKYC & IDA for Legal Entities](https://openid.net/ministry-of-economy-trade-and-industry-and-openid-foundation-in-liaison-agreement-on-ekyc-ida-for-legal-entities/) - The OpenID Foundation (OIDF), the international standards development organization which maintains the OpenID Connect for Identity Assurance (OIDC4IDA) standard, and the Japanese Government’s Ministry of Economy, Trade and Industry (METI) have signed a liaison agreement to work together. Under the agreement, METI will lead policy efforts to implement identity assurance frameworks for legal entities in
- [OpenID Foundation Announces Increases to Membership Dues in 2021](https://openid.net/openid-foundation-announces-increases-to-membership-dues-in-2021/) - The OpenID Foundation is a non-profit international standardization organization of individuals and companies committed to enabling, promoting, and protecting OpenID technologies. Formed in June 2007, the Foundation serves as a public trust organization representing the open community of developers, vendors, and users. The Foundation assists the community by providing needed infrastructure and help in promoting
- [The OpenID Foundation Welcomes Member’s Comments on Strategic Approach in 2022](https://openid.net/the-openid-foundation-welcomes-members-comments-on-strategic-approach-in-2022/) - Dear Members,The OpenID Foundation warmly welcomes comments from the membership on our strategic approach in 2022.Our standards development work in categories like OpenID Connect is mature while other working groups are just beginning. The adoption of OIDF standards and certification programs are enjoying the global market momentum, and implementations by millions of applications are enabling
- [“Plays Well with Others”, the OpenID Foundation Recognized as a Global Top 10 Influencing Organization in Digital Identity](https://openid.net/plays-well-with-others-the-openid-foundation-recognized-as-a-global-top-10-influencing-organization-in-digital-identity/) - The OpenID Foundation has been recognized in the recently published The Digital Identity Report – The Global Opportunity for Verified Citizen & Consumer ID, as one of the top 10 global digital identity-influencing organizations that includes the OpenID Foundation. Alan Goode, founder and CEO of Goode Intelligence and author of the report, said “the digital identity
- [Financial Data Exchange, OpenID Foundation Take Step Towards Global Standard for Financial Data Sharing](https://openid.net/financial-data-exchange-openid-foundation-take-step-towards-global-standard-for-financial-data-sharing/) - The Financial Data Exchange (FDX) and the OpenID Foundation (OIDF) have announced an agreement to collaborate in order to advance a common technical standard for the secure exchange of consumer financial information. As online banking evolves and fintech apps grow in popularity, consumers increasingly wish to share their personal account, transaction and other financial information
- [Interview with Don Thibeau, OIDF's Executive Director](https://openid.net/interview-with-don-thibeau-oidfs-executive-director/) - This is an interview framed by Chris Messina, an OpenID board member and elected community representative with Don Thibeau, Executive Director of the OpenID Foundation.
- [eKYC & Identity Assurance Interop Event Update](https://openid.net/ekyc-identity-assurance-interop-event-update/) - The eKYC and Identity Assurance (eKYC & IDA) working group is developing extensions to OpenID Connect that standardize the communication of assured identity information, i.e., verified claims along with trust framework and assurance level as well as information about how and when the verification was done. The core of that work has become OpenID Connect
- [OpenID Connect Specs Incorporating Developer Feedback](https://openid.net/openid-connect-specs-incorporating-developer-feedback/) - Since we posted in July about the availability of preliminary OpenID Connect specifications, developers have been building implementations and submitting feedback on the specs. The specs have been revised to incorporate their feedback. A new map of the specs is as follows: The biggest difference you’ll notice is that there is now only one spec to implement for “Minimal”
- [Growing list of OpenID Connect libraries available](https://openid.net/growing-list-of-openid-connect-libraries-available/) - The list of publicly available OpenID Connect libraries is growing, with implementations available for numerous development platforms and environments, including Drupal, Java, PHP, Python, and Ruby. See the Libraries page for a list of OpenID Connect libraries, as well as libraries implementing the related JSON Web Token (JWT) and JSON Object Signing and Encryption (JOSE)
- [Second Implementer’s Draft of OpenID Connect Federation Specification Approved](https://openid.net/second-implementers-draft-of-openid-connect-federation-specification-approved-2/) - The OpenID Foundation membership has approved the following specification as an OpenID Implementer’s Draft:OpenID Connect Federation 1.0An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This is the second Implementer’s Draft of this specification. This specification is a product of the OpenID Connect Working group.The
- [2023 OpenID Foundation Kim Cameron Award Recipients Share Their Experiences](https://openid.net/2023-kim-cameron-award-experiences/) - In April 2023, the OpenID Foundation announced the 2023 Kim Cameron Award recipients. Today we're pleased for the award recipients to share their experiences.The goal of the awards is to increase representation from young people’s who’ve demonstrated an interest in subjects consistent with best practices and identity standards that are secure, interoperable, and privacy preserving. Isaac
- [Announcing the Authorization Exchange (AuthZEN) Working Group](https://openid.net/announcing-authzen-working-group/) - A new working group has been accepted by the OpenID Foundation (OIDF) Specs Council that will focus on increasing interoperability of authorization systems. The new working group, called Authorization Exchange (AuthZEN), resulted from a series of conversations at the two most recent Identiverse conferences. After this year’s event, it was recognized that there was considerable
- [OpenID Foundation Workshop at Cisco – Monday, October 9, 2023](https://openid.net/openid-foundation-workshop-at-cisco/) - OpenID Foundation Workshops provide technical insight and influence on current digital identity standards while offering a collaborative platform to openly address current trends and market opportunities. This OpenID Foundation Workshop includes a number of presentations focused on 2023 Foundation key initiatives as well as updates on active working groups.
- [OpenID Foundation Announces New Whitepaper Process](https://openid.net/openid-foundation-announces-new-whitepaper-process/) - The OpenID Foundation is pleased to announce a new Whitepaper Process as approved by the Board of Directors on October 9, 2023. OIDF-led and co-led whitepapers help ecosystem stakeholders understand the wider landscape and the role of OIDF standards within that wider landscape. Such whitepapers make OIDF’s global, technical expertise more accessible to ecosystem stakeholders, technical experts, and laypeople alike. The OIDF
- [Comparison of Available FAPI Profiles and Recommendations for New Markets Looking to Implement FAPI as their Security Profile](https://openid.net/comparison-of-available-fapi-profiles-and-recommendations-for-new-markets-looking-to-implement-fapi-as-their-security-profile/) - Financial-grade API (FAPI) ProfilesComparison of Available FAPI Profiles and Recommendations for New Markets Looking to Implement FAPI as their Security ProfileThis paper provides a comparison of available FAPI profiles and recommendations for new markets looking to implement FAPI as their security profile.
- [OpenID Foundation Publishes Whitepaper on Open Banking](https://openid.net/openid-foundation-publishes-whitepaper-on-open-banking/) - The OpenID Foundation is pleased to share its new whitepaper, “Open Banking, Open Data and Financial-Grade APIs”. The paper documents the international movement towards Open Banking, Open Finance, and secure, consent driven access to all user data. It describes the OpenID Foundation and in particular the Financial-Grade API (FAPI) Working Group’s experience with Open Banking
- [OpenID Foundation Follow-up to ACDS on CDS](https://openid.net/openid-foundation-follow-up-to-acds-on-cds/) - November 18, 2020Mr Andrew StevensChairman, Consumer Data Standards AustraliaMr Paul FranklinExecutive General Manager, Consumer Data Right, Australian Competition and Consumer CommissionMs Kate O’RourkePrincipal Advisor, The Treasury, AustraliaMr Daniel McAuliffeProject Lead, Consumer Data Right, The Treasury, Australia RE: OpenID Foundation Follow-up to ACDS on CDS Dear Mr Stevens, Mr Franklin, Ms O’Rourke, and Mr McAuliffe,This communication follows the
- [FDX’s Financial-Grade API Security Specification v3.4 Supports the FAPI 1.0 Advanced and CIBA Standards](https://openid.net/fdxs-financial-grade-api-security-specification-v3-4-companion-to-fdx-api-v5-supports-the-fapi-1-0-advanced-and-ciba-standards/) - The OpenID Foundation is delighted see the Financial Data Exchange’s recent announcement that FDX’s Financial-Grade API Security Specification v3.4 (companion to FDX API v5) supports the FAPI 1.0 Advanced and CIBA standards:“Alignment with Globally Interoperable Standards – The FDX API Security Specification v3.4 now references, supports and recommends utilization of the OpenID Foundation’s Financial-grade API (FAPI)
- [The OpenID Foundation and Financial Data Exchange Host Workshop Focused on Fintech Standards and Certification](https://openid.net/the-openid-foundation-and-financial-data-exchange-host-workshop-focused-on-fintech-standards-and-certification/) - The OpenID Foundation (OIDF) and Financial Data Exchange hosted a joint workshop on July 21, 2020 to share information on their respective standards and certification programs. OIDF Chairman, Nat Sakimura provided a global view of the state of financial APIs followed by FDX Managing Director, Don Cardinal, who described FDX’s focus as the financial services
- [OpenID Foundation Deepens Partnership with Financial Data Exchange on Adoption of New Security Standards](https://openid.net/openid-foundation-deepens-partnership-with-financial-data-exchange-on-adoption-of-new-security-standards/) - OpenID Foundation Chairman, Nat Sakimura, presented a keynote at the Financial Data Exchange’s (FDX) Global Summit Fall 2020. Nat’s keynote, “Global Adoption of FAPI Among Open Banking Standards... And Beyond”, highlighted the growing adoption momentum of the Foundation’s Financial-grade API (FAPI) security profile and the high quality of self-certified implementations via the Open Certification Program.
- [FAPI Part 1 Implementer’s Draft Approved](https://openid.net/fapi-part-1-implementers-draft-approved/) - The OpenID Foundation membership has approved "Financial API - Part 1: Read Only API Security Profile" as an OpenID Implementer’s Draft. An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. The specification is available at: http://openid.net/specs/openid-financial-api-part-1-ID1.html The voting results were: Approve – 47 votes Object
- [OpenID Foundation FAPI Working Group Meeting and Workshop Co-Hosted With Open Banking in London on Monday, November 6, 2017](https://openid.net/openid-foundation-fapi-working-group-meeting-and-workshop-co-hosted-with-open-banking-in-london-monday-november-6-2017/) - OpenID Foundation Members: Next Monday, November 6, 2017, the OpenID Foundation is hosting a face-to-face Financial API (FAPI) Working Group meeting in London at Level39. If you would like to participate you’ll need to have signed a contribution agreement that specifies the FAPI Working Group. If you have not done so, you can find
- [Announcing OpenID Foundation Sessions at the FIDO Member Plenary on Thursday, October 21, 2021](https://openid.net/announcing-openid-foundation-sessions-at-the-fido-member-plenary-on-thursday-october-21-2021/) - The OpenID Foundation is pleased to be a part of the FIDO Alliance Member Plenary agenda next Thursday, October 21st. The Plenary follows the FIDO Alliance’s Authenticate 2021 Conference that takes place Monday, October 18th through Wednesday, October 20th. Both events are being hosted at the Motif Hotel in Seattle. OpenID Foundation Secretary and Microsoft
- [“Exploring Financial-grade API (FAPI) with Torsten” Podcast is Live](https://openid.net/exploring-financial-grade-api-fapi-with-torsten-podcast-is-live/) - The OpenID Foundation is pleased to sponsor the Identity, Unlocked second season premiere podcast featuring host Vittorio Bertocci and special guest Torsten Lodderstedt, “Exploring Financial-grade API (FAPI) with Torsten”. Torsten is a long time member of and contributor to the OpenID Foundation. Torsten has contributed significantly to the FAPI security profile and is the co-chair
- [OpenID Foundation Announces FAPI-RW App2app Certification Launched](https://openid.net/openid-foundation-announces-fapi-rw-app2app-certification-launched/) - Global interoperability, a common cause among many national and industry groups, seems especially urgent these days, especially in matters of security. Interop requires open standards, a “best idea wins” debate among experts and patience, lots of patience. The Financial-Grade API Working Group has a singular focus on developing its security profile as a complementary component
- [First FAPI 2.0 Certifications Published](https://openid.net/first-fapi-2-0-certifications-published/) - OpenID Foundation is pleased to announce that the first set of FAPI 2.0 self-certifications have been published and can now be viewed on the Certification Listings.We congratulate Authlete, Cloudentity, ConnectID, Ping Identity, and Raidiam for achieving compliance with the current FAPI 2.0 certifications and for being thought leaders on the leading edge of this important
- [OpenID Content Provider Advisory Committee Kickoff Meeting](https://openid.net/openid-content-provider-advisory-committee-kickoff-meeting/) - AARP, AOL, BBC, Google, Hearst Magazines, JanRain, Meredith, MySpace, National 4-H, National Public Radio (NPR), The New York Times, Reed Business Information, Six Apart, Time Inc., Vidoop, and Yahoo meet in NY City for first OpenID Content Provider Advisory Committee meeting hosted by the BBC.
- [OpenID Foundation Hosting Workshop at EIC 2021](https://openid.net/openid-foundation-hosting-workshop-at-eic-2021/) - The OpenID Foundation is pleased to announce it is hosting a workshop at EIC 2021 in Munich. The Foundation's workshop is part of the pre-conference workshops at EIC on Monday, September 13, 2021 from 9am-1pm CEST. As EIC hybrid event, the workshop is available to those participating virtually as well. This workshop will include a
- [OpenID Connect for Identity Assurance now has a dedicated home](https://openid.net/openid-connect-for-identity-assurance-now-has-a-dedicated-home/) - The OpenID Foundation has started the new eKYC and Identity Assurance Working Group, which will develop OpenID specifications for providing Relying Parties with identity information, i.e. Verified Claims, along with an explicit attestation of the verification status of those Claims (what, how, when, according to what rules, using what evidence). “eKYC” is an industry acronym
- [A Major Step Towards Interoperable Identity Assurance](https://openid.net/interoperable-identity-assurance/) - By Mark Haine & Drummond ReedA persistent goal of digital identity technology is to enable relying parties to reach the level of identity assurance they need to proceed with any specific interaction. Although there are many descriptions of “identity assurance levels”, such as the three levels defined in the NIST SP 800-63 series, the goal itself is
- [Registration Open for OpenID Foundation Hybrid Workshop at Cisco on Monday, October 9, 2023](https://openid.net/registration-workshop-october-9-2023/) - Workshop OverviewOpenID Foundation Workshops provide technical insight and influence on current digital identity standards while offering a collaborative platform to openly address current trends and market opportunities. This OpenID Foundation Workshop includes a number of presentations focused on 2023 Foundation key initiatives as well as updates on active working groups.Workshop Details Thank you kindly to
- [An Update on the Collaboration of Technology Tools and Legal Rules](https://openid.net/an-update-on-the-collaboration-of-technology-tools-and-legal-rules/) - The US Federal Reserve is participating in a Committee on Payments and Market Infrastructures (CPMI) Cross-border Payments Task Force to identify ways to promote cross-border payments that are faster, less expensive and more transparent and inclusive.With the CPMI's initiative to improve cross-border payments (and their upcoming conference https://lnkd.in/dBmT9q6), the Institute of International Finance (IIF) and the
- [OpenID Connect for Identity Assurance (eKYC & IDA) Enables More than 30 Million Bank Customers to Identify Themselves with Third Parties](https://openid.net/openid-connect-for-identity-assurance-ekyc-ida-enables-more-than-30m-bank-customers-to-identify-themselves-with-3rd-parties/) - More than 1,000 banks in the yes® scheme enable online banking customers to prove their identity to 3rd parties with existing bank-managed KYC data. This data can also be used to seamlessly create qualified electronic signatures conforming to the EU's eIDAS directive.The banks recently finished the migration of all Identity Providers (IdPs) in the yes®
- [Open Digital Trust Initiative: A Proposal for Financial Institutions to Use an Open Standards Protocol to Verify Identity, Protect Privacy and Build Trust](https://openid.net/open-digital-trust-initiative-a-proposal-for-financial-institutions-to-use-an-open-standards-protocol-to-verify-identity-protect-privacy-and-build-trust/) - In the digital space, people need new solutions to know the identity of who they are dealing with and whether or not they can trust them. A number of initiatives are working on the future of digital identity. Some of them are government-led while others are linked to specific private institutions or proprietary technologies.Banks and
- [Aligning the Governance Rules and Technology Tools of Digital Identity: Solving Today’s Burning Business Problems](https://openid.net/aligning-the-governance-rules-and-technology-tools-of-digital-identity-solving-todays-burning-business-problems/) - The OpenID Foundation has launched a new microsite focused on global open banking initiatives and providing resources for fintech developers implementing the Foundation’s Financial-grade API (FAPI). In 2017, the OpenID Foundation’s Financial-grade API (FAPI) Working Group published specifications enabling high-security API access, suitable for accessing financial data and facilitating financial transactions. In 2018, the UK
- [Open for Comment “Human-Centric Identity: a primer for government officials”](https://openid.net/open-for-comment-human-centric-identity-a-primer-for-government-officials/) - Government officials, policymakers, technologists, legal scholars, and human rights advocates are invited to offer feedback on a new white paper “Human-Centric Identity: a primer for government officials”. This follows the publication of “Government-issued Digital Credentials and the Privacy Landscape” (Flanagan, 2023), which delved into challenges of creating a globally viable privacy-preserving Digital Identity landscape. This
- [OpenID Foundation Chairman Nat Sakimura Speaks on OECD “Recommendations on the Governance of Digital Identity” Panel](https://openid.net/oecd-recommendations-on-the-governance-of-digital-identity/) - This blog was updated on September 28, 2023 to include an updated link that includes the session recordings.OECD hosted a launch event on September 26, 2023 on the Recommendation on the Governance of Digital Identity, (note the session recordings at the bottom of the page) as adopted by the OECD Council in June 2023. The
- [Registration Open for OpenID Foundation Virtual Workshop — April 29, 2021](https://openid.net/registration-open-for-openid-foundation-virtual-workshop-april-29-2021/) - Workshop Overview OpenID Foundation Workshops provide technical insight and influence on current Internet identity standards. This workshop will provide updates on all active OpenID Foundation Working Groups as well the OpenID Certification Program. The workshop also highlights the Foundation's partnership with the CARIN Alliance that is focused on enabling a digital identity ecosystem for US
- [OpenID Foundation Launches New Microsite Focused on Open Banking and Fintech Developers](https://openid.net/openid-foundation-launches-new-microsite-focused-on-open-banking-and-fintech-developers/) - The OpenID Foundation has launched a new microsite focused on global open banking initiatives and providing resources for fintech developers implementing the Foundation’s Financial-grade API (FAPI). In 2017, the OpenID Foundation’s Financial-grade API (FAPI) Working Group published specifications enabling high-security API access, suitable for accessing financial data and facilitating financial transactions. In 2018, the UK
- [More Momentum: OpenID Connect Adoption](https://openid.net/more-momentum-openid-connect-adoption/) - In my last blog, I noted, “it’s time to build out the final elements of OpenID Connect and move to mobile.” We'll soon announce the official working group with the GSMA focused on a OpenID Connect mobile profile. Foundation members, partners and independent developers continue to integrate OpenID Connect in robust and interoperable identity services
- [Introducing RISC: Working together to protect users](https://openid.net/introducing-risc-working-together-to-protect-users/) - According to a recent Gallup poll, more people are worried about their online accounts being hacked than having their home broken into.With more and more of our digital lives accessible online, attackers are redoubling efforts to steal our personal information, and increasingly exploiting the interconnectedness of web services and apps to “leapfrog” from one account
- [REMINDER - OpenID “Connect Tech” Summit - September 12-13, 2011](https://openid.net/openid-connect-tech-summit-september-12-13-2011/) - The OpenID Foundation is launching its third OpenID Summits for 2011. This event is co-sponsored by Microsoft and will be held at the Microsoft Research Campus in Mountain View. The OpenID Foundation's 2011 series of OpenID Summits focuses on use cases and topics of interest to key developers, executives and analysts in the online identity
- [Announcing the OpenID Backplane Protocol Work Group](https://openid.net/announcing-the-openid-backplane-protocol-work-group/) - For website owners, enabling web applications to talk to one another within the same web page can be frustrating and can take countless hours of development. How should apps communicate with each other in a meaningful way? The OpenID Foundation’s new Backplane Protocol Work Group is focused on this exact problem -- helping website owners,
- [The OpenID Foundation Welcomes Visa to the Board of Directors](https://openid.net/the-openid-foundation-welcomes-visa-to-the-board-of-directors/) - The OpenID Foundation is pleased to welcome David Henstock, Head of Identity Products at Visa to the board of directors as a sustaining member. Visa joins an accomplished group of identity thought leaders including, Cisco, Google, KDDI, Microsoft, NRI Secure, Okta, Ping Identity, Verizon and Yahoo Ad Tech. The Board is deeply committed to ensuring
- [Result of First Election for Corporate Member Board Seat](https://openid.net/result-of-first-election-for-corporate-member-board-seat/) - Beginning in 2014 and each year thereafter, Corporate Members of the OpenID Foundation will elect a member to represent them on the OIDF board. All corporate members were eligible to nominate themselves, second the nominations of others who self-nominate, and vote for candidates. It is rare that the OpenID Foundation suffers from an embarrassment of
- [Current Map for OpenID Connect](https://openid.net/current-map-for-openid-connect/) - There is now a set of functionally complete specifications for OpenID Connect. The diagram below shows the relationships between the current specs and contains links to each of them. These specifications are ready for early developer feedback and prototype implementation work. Please send feedback on them to the OpenID Artifact Binding Working Group Mailing List.
- [OpenIDDevCamp at CommunityOne 5/5/2008](https://openid.net/openiddevcamp-at-communityone-552008/) - What better way to spend Cinco de Mayo then with a bunch of your favorite OpenID community members learning more about OpenID? :-) Sun has offered to host an OpenIDDevCamp at their annual day-long CommunityOne developer conference the day before the start of JavaOne. Not only will you get a chance to talk with OpenID
- [2022 OpenID Foundation Board Election Results](https://openid.net/2022-openid-foundation-board-election-results/) - Thank you to all members who voted in the 2022 elections for representatives to the OpenID Foundation Board of Directors.As per the Foundation’s bylaws, three individual board members represent the membership and the community at large. Nat Sakimura and John Bradley both have one year remaining on their two-year terms and I welcome their continued
- [Announcing the 2019 OpenID Foundation Individual Community Board Members Election](https://openid.net/announcing-the-2019-openid-foundation-individual-community-board-members-election/) - The OpenID Foundation plays an important role in the interoperability of Internet identity. This is to announce the OpenID Foundation individual community board members 2019 election schedule. Those elected will help determine the role the Foundation plays in facilitating the creation and adoption of open identity standards.Per our bylaws, three individual community board members are elected.
- [Announcing the 2018 OpenID Foundation Individual Community Board Member Election](https://openid.net/announcing-the-2018-openid-foundation-individual-community-board-member-election/) - The OpenID Foundation plays an important role in the interoperability of Internet identity. This is to announce the OpenID Foundation individual community board member 2018 election schedule. Those elected will help determine the role the Foundation plays in facilitating the creation and adoption of open identity standards.Per our bylaws, three individual community board members are
- [2017 OpenID Foundation Board of Directors Election Results](https://openid.net/2017-openid-foundation-board-of-directors-election-results/) - The OpenID Foundation is pleased to welcome Ashish Jain of VMware as the new board representative for the corporate class of members, Ashish has been elected to a one-year term. Thanks to Dale Olds, also of VMware, for his service in the past year in this role. Dale was most helpful in VMware's hosting of
- [Announcing the 2017 OpenID Foundation Individual Community Board Member Election](https://openid.net/announcing-the-2017-openid-foundation-individual-community-board-member-election/) - The OpenID Foundation plays an important role in the interoperability of Internet identity. This is to announce the OpenID Foundation individual community board member 2017 election schedule. Those elected will help determine the role the Foundation plays in facilitating the creation and adoption of open identity standards. Per our bylaws, three individual community board members
- [OpenID Foundation Board Leadership in 2019](https://openid.net/openid-foundation-board-leadership-in-2019/) - Thank you to all who voted in the 2019 election for representatives to the OpenID Foundation Board of Directors. Per our bylaws, three individual community board members are elected. The term of George Fletcher has an additional year remaining on his 2-year term. I want to thank George for his continued service.Mike Jones’ and John Bradley’s terms
- [Announcing The OpenID Foundation Individual Community Board Member 2016 Election](https://openid.net/announcing-the-openid-foundation-individual-community-board-member-2016-election-schedule/) - The OpenID Foundation plays an important role in the interoperability of Internet identity. This is to announce the OpenID Foundation Individual community board member 2016 election schedule. Those elected will help determine the role the Foundation plays in facilitating the adoption of open identity standards. Per our bylaws, Individual community Members elect three (3) board
- [Announcing the 2020 OpenID Foundation Individual Community Board Member Election](https://openid.net/announcing-the-2020-openid-foundation-individual-community-board-member-election/) - The OpenID Foundation plays an important role in the interoperability of Internet identity. This is to announce the OpenID Foundation individual community board member 2020 election schedule. Those elected will help determine the role the Foundation plays in facilitating the creation and adoption of open identity standards.Per our bylaws, three individual community board members are
- [OpenID Foundation 2013 Community Board Member Election Results](https://openid.net/openid-foundation-2013-community-board-member-election-results/) - Thanks to all who voted for the board members who will represent the community at large on the OpenID Foundation Board of Directors. Nat Sakimura, John Bradley, Mike Jones and George Fletcher have been elected to two year terms. All are returning community board members, ensuring continuity and deep technical expertise to the Foundation. Henrik
- [OpenID Foundation 2012 Community Board Member Election Results](https://openid.net/openid-foundation-2012-community-board-member-election-results/) - Thanks to all who voted for the board members who will represent the OpenID community at large for the next two years. Having received the two highest number of votes cast, Greg Keegstra and Axel Nennker have been elected to two years terms. Greg is new to the board and brings a fresh eye to
- [Announcing New OpenID Foundation Board Leadership in 2020](https://openid.net/announcing-new-openid-foundation-board-leadership-in-2020/) - Thank you to all members who voted in the 2020 elections for representatives to the OpenID Foundation Board of Directors.Per Foundation bylaws, three individual community board members are elected to the Board of Directors. Nat Sakimura and John Bradley have an additional year remaining on their 2-year terms. I want to thank Nat and John for
- [Announcing the 2021 OpenID Foundation Individual Community Board Members Election](https://openid.net/announcing-the-2021-openid-foundation-individual-community-board-members-election/) - The OpenID Foundation plays an important role in the interoperability of Internet identity. This is to announce the OpenID Foundation individual community board members 2021 election schedule. Those elected will help determine the role the Foundation plays in facilitating the creation and adoption of open identity standards.Per the Foundation’s bylaws, three individual community board members
- [OpenID Foundation Certification Program Update, Program Expansion and Fees Increases](https://openid.net/openid-foundation-certification-program-update-program-expansion-and-fees-increases/) - The increasing importance of certification to global adoption is being shown by the participation of government and regulator representatives in OpenID Foundation working groups and in our membership. It is also quantified in the uptick in certification services. The OpenID Certification Program continues its success in 2021 with over 500 certifications of almost 200 implementations
- [OpenID Certification Program – Last Call for Testing OpenID Connect Implementations on Python Platform](https://openid.net/openid-certification-program-last-call-for-testing-openid-connect-implementations-on-python-platform/) - The OpenID Foundation has made a considerable investment in 2020 in transitioning the certification program’s conformance test suite to a single, Java-based system. The Financial-grade API (FAPI) tests have been Java-based since early 2019 and now we are preparing to finish transitioning the OpenID Connect tests to the Java-based conformance test suite on Monday, August
- [OpenID Connect Federation draft 04](https://openid.net/openid-connect-federation-draft-04/) - The OpenID Connect Federation specification has been updated to incorporate the following changes:Changed client metadata names scopes to rp_scopes and claims to rp_claims.Added Open Issues appendix.Added additional references.Editorial improvements.Added standard Notices section, which is present in all OpenID specifications.The specification is available at http://openid.net/specs/openid-connect-federation-1_0-04.html. The current version is also always available at http://openid.net/specs/openid-connect-federation-1_0.html.
- [Registration Open for OpenID Foundation Workshop at Verizon Media on Monday, September 30, 2019](https://openid.net/registration-open-for-openid-foundation-workshop-at-verizon-media-on-monday-september-30-2019/) - OpenID Foundation Workshops provide technical insight and influence on current Internet identity standards. The workshops provide updates on all OpenID Foundation working groups as well the OpenID Certification Program. Please note we've added a technology leaders discussion on key digital identity topics to the agenda. The goal is to encourage open discussion to help inform one
- [Guest Blog: Implementing App-to-App Authorisation in OAuth2/OpenID Connect](https://openid.net/guest-blog-implementing-app-to-app-authorisation-in-oauth2-openid-connect/) - What is app2app?App2app is a mechanism that allows mobile apps performing OAuth2 or OpenID Connect based authentication to offer a much simpler faster flow if the user already has an app provided by the authorization server owner installed on their mobile device. Here’s how it actually looks when I grant the moneyhub app on my
- [Thank You Too Apple](https://openid.net/thank-you-too-apple/) - As the technical lead of the OpenID Foundation Certification Team, I'd like to add a few comments to the open letter that OpenID Foundation Chairman, Nat Sakimura wrote to Apple (https://openid.net/2019/09/30/apple-successfully-implements-openid-connect-with-sign-in-with-apple/). Nat thanks Apple for their recent efforts to make "Sign In with Apple" compliant with the OpenID Connect standard. The OpenID Foundation has always
- [OpenID Connect for Identity Assurance](https://openid.net/openid-connect-for-identity-assurance/) - This week the OpenID Foundation announced the approval of the Implementer’s Draft of the OpenID Connect for Identity Assurance specification. This new specification is a product of the OpenID Connect Working group. An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification.The global adoption of OpenID Connect
- [The eKYC & IDA Working Group Welcomes the Proposal of the European Commission to Extend the Scope of eIDAS Trust Services](https://openid.net/the-ekyc-ida-working-group-welcomes-the-proposal-of-the-european-commission-to-extend-the-scope-of-eidas-trust-services/) - The eKYC and Identity Assurance Working Group (eKYC & IDA WG) of the OpenID Foundation welcomes the proposal of the Commission to extend the scope of eIDAS trust services by introducing a new trust service for identification, authentication and for the provision of attributes, credentials and attestations and allowing the provision of identification for devices
- [OpenID Foundation Continues to Evolve in 2021](https://openid.net/openid-foundation-continues-to-evolve-in-2021/) - Dear OpenID Foundation Members: After 10 years I’ve decided to move on from my position as Executive Director of the OpenID Foundation at the end of 2020. It’s been an honor to serve the Board, members of the Foundation and the community at large. It has been a privilege and a lot of fun to help lead
- [The OpenID Foundation and the UK Open Banking Implementation Entity Hosting a Workshop Focused on Financial-grade API (FAPI) and Third Party Providers (TPPs)](https://openid.net/the-openid-foundation-and-the-uk-open-banking-implementation-entity-hosting-a-workshop-focused-on-financial-grade-api-fapi-and-third-party-providers-tpps/) - View the workshop recording in its entirety here. The OpenID Foundation (OIDF) and our development partner, the UK Open Banking Implementation Entity (OBIE), continue our collaboration in outreach to the fintech community via workshops in hosting another workshop on Tuesday, October 13, 2020 at 1pm UTC. This next event builds on a prior joint workshop in
- [OpenID Foundation Co-Sponsoring Santander Digital Trust Hackathon](https://openid.net/openid-foundation-co-sponsoring-santander-digital-trust-hackathon/) - The OpenID Foundation is excited to be a co-sponsor for the Santander Digital Trust Hackathon. This global virtual hackathon will capitalize on Santander’s Digital Trust API and the need to innovate how data is shared, verified and trusted. The goal is to reimagine how we verify identity and validate data, while ensuring users' privacy.OpenID Foundation
- [Update on OpenID Foundation Leadership Transition](https://openid.net/update-on-openid-foundation-leadership-transition/) - Dear OpenID Foundation Members:This is to update the OpenID Foundation community on our leadership transition and plans for 2021. We’ve enlisted the support of Women in Identity, IDPro and other groups to insure a broad international search and a diversity of backgrounds for the Foundation’s next Executive Director. Our search efforts are ongoing so please
- [OpenID Financial-grade API (FAPI) Conformance Tests Now Available for Australian Consumer Data Rights Participants & Push Authorization Requests (PAR)](https://openid.net/openid-financial-grade-api-fapi-conformance-tests-now-available-for-australian-consumer-data-rights-participants-push-authorization-requests-par/) - The OpenID Foundation is pleased to announce the availability of Financial-grade API (FAPI) conformance tests for banks and fintechs in Australia providing consumer data rights (CDR) compliant solutions.The Foundation recently updated the FAPI conformance suite to ensure that servers following the CDR standards comply with the underlying FAPI specifications, specifically FAPI-RW. These updates include minor
- [2021 OpenID Foundation Board Update](https://openid.net/2021-openid-foundation-board-update/) - Thank you to all who voted in the 2021 elections for representatives to the OpenID Foundation Board of Directors.As per our bylaws, three individual board members represent the membership and the community at large. As George Fletcher has one year remaining on his 2-year term, I want to thank George for his continued leadership and
- [Guest Blog: Financial-grade API (FAPI), Explained by an Implementer - Updated](https://openid.net/guest-blog-financial-grade-api-fapi-explained-by-an-implementer-updated/) - NOTE: This article was updated to align to the FAPI 1.0 Final version which was published in March, 2021.CLICK HERE TO VIEW THIS BLOG IN PORTUGUESEIntroductionFinancial-grade API (FAPI) is a technical specification that Financial-grade API Working Group of OpenID Foundation has developed. It uses OAuth 2.0 and OpenID Connect (OIDC) as its base and defines additional technical requirements for the financial industry and other industries that
- [Public Review Period for Proposed Final OpenID Connect Client-Initiated Backchannel Authentication (CIBA) Core Specification](https://openid.net/public-review-period-for-proposed-final-openid-connect-client-initiated-backchannel-authentication-ciba-core-specification-2/) - The OpenID MODRNA Working Group recommends approval of the following specification as an OpenID Final Specification:OpenID Connect Client-Initiated Backchannel Authentication Flow - Core 1.0A Final Specification provides intellectual property protections to implementers of the specification and is not subject to further revision. This note starts the 60-day public review period for the specification draft in
- [2021 OpenID Foundation New Corporate Member Representative Election Results](https://openid.net/2021-openid-foundation-new-corporate-member-representative-election-results/) - Thank you to all Corporate members who voted in the new 2021 OpenID Foundation Corporate Member Representative election.Each year, Corporate members of the OpenID Foundation elect a member to represent them on the board. Ashish Jain was elected by Corporate members during the 2021 elections that were conducted in January 2021. Ashish was at eBay
- [OpenID Financial-grade API (FAPI) Conformance Tests Released for Final FAPI 1.0 Parts 1 and 2 Specifications](https://openid.net/openid-financial-grade-api-fapi-conformance-tests-released-for-final-fapi-1-0-parts-1-and-2-specifications/) - The OpenID Foundation is pleased to announce the release of Financial-grade API (FAPI) OP and RP conformance tests for the Final FAPI 1.0 Part 1 and 2 specifications announced on March 31, 2021.Many organizations and jurisdictions utilized the FAPI Implementer’s Draft 2 as the starting point of their adoption of FAPI in defining their open banking solution stacks.
- [Open Banking Brazil’s Adoption of Financial-grade API (FAPI) & FAPI Certification](https://openid.net/open-banking-brazils-adoption-of-financial-grade-api-fapi-fapi-certification/) - The OpenID Foundation is pleased to announce the availability of Financial-grade API (FAPI) OP and dynamic client registration (DCR) tests for open banking Brazil. Release notes can be found here: https://gitlab.com/openid/conformance-suite/-/tags/release-v4.1.15Brazil recently published their open banking technology stack including the security and identity standards that the financial services sector must adopt and implement in multiple phases in
- [Announcing the Digital Credentials Protocols Working Group](https://openid.net/announcing-the-digital-credentials-protocols-working-group/) - Announcing the Digital Credentials Protocols Working GroupThe OpenID Foundation (OIDF) Specs Council has accepted a proposal to create a new working group as a dedicated home of the OpenID for Verifiable Credentials specs family. The new working group is designated as “Digital Credentials Protocols Working Group” (DCP WG).The first DCP WG meeting is scheduled for
- [Announcing the 2022 OpenID Foundation Individual Community Board Member Election](https://openid.net/announcing-the-2022-openid-foundation-individual-community-board-member-election/) - The OpenID Foundation plays an important role in the interoperability of Internet identity. This is to announce the OpenID Foundation individual community board member 2022 election schedule. Those elected will help determine the role the Foundation plays in facilitating the development and adoption of open identity standards as well as the strategic direction of the organizations.Per
- [Introducing the Global Assured Identity Network (GAIN) Proof of Concept Community Group](https://openid.net/introducing-the-global-assured-identity-network-gain-proof-of-concept-community-group/) - The OpenID Foundation is pleased to announce the launch of the Global Assured Identity Network (GAIN) Proof of Concept Community Group, which aims to test the technical hypotheses underlying the "GAIN Digital Trust" white paper.Back in September 2021, more than 150 co-authors called for the creation of a globally interoperable network for high-trust identity assurance.
- [2022 OpenID Foundation Kim Cameron Award Recipients Announced](https://openid.net/2022-openid-foundation-kim-cameron-award-recipients-announced/) - The OpenID Foundation is pleased to announce the first cohort of awardees for inaugural launch of the Kim Cameron Award Program. We first must thank the many well-qualified applicants who presented compelling interest in user-centric identity. The Foundation anticipates future opportunities for similar awards.The Foundation also thanks our partners; the organizers of the European Identity and
- [Guest Blog: Rachelle Sellung’s Experience as a 2022 Kim Cameron Award Recipient](https://openid.net/rachelle-sellung-2022-kim-cameron-award/) - When I found out that I was chosen to be one of the Kim Cameron Award winners from the OpenID foundation, I was truly humbled. While I did not know Kim Cameron personally, I knew of his work and his incredible impact as a visionary in the Identity space.With that, I am grateful for my
- [Guest Blog: Alen Horvat Attends EIC 2022 as Kim Cameron Award Recipient](https://openid.net/guest-blog-alen-horvat-attends-eic-2022-as-kim-cameron-award-recipient/) - The Kim Cameron Award program, initiated by the OpenID Foundation in 2022, is an essential step in evolving the global digital identity community. I’m genuinely honoured to be one of the first Award recipients, for my work and contributions are recognised.My digital identity journey began in the decentralised digital identity space. It expanded towards global
- [Guest Blog: Michal Kepkowski’s Experience as a Kim Cameron Award Recipient at Identiverse 2022](https://openid.net/guest-blog-michal-kepkowskis-experience-as-a-kim-cameron-award-recipient-at-identiverse-2022/) - Being one of the first recipients of the Kim Cameron Award is a great honour and distinction. Kim’s contribution to the identity world impacted and inspired many individuals, including me. Reading his blog and studying the laws of identity helped me advance in my professional and academic career. Therefore, for me, the reward has a
- [2023 OpenID Foundation Kim Cameron Awards Now Open for Submissions](https://openid.net/2023-kim-cameron-awards/) - OverviewThe OpenID Foundation board of directors established the OpenID Foundation Kim Cameron Award Program in May 2022. Our goal is to encourage representation from young people who have an interest in subjects consistent with the OpenID Foundation Mission, in creating identity standards that are secure, interoperable, and privacy preserving.The OpenID Foundation Kim Cameron Award is
- [Announcing “GAIN in 2023” Whitepaper](https://openid.net/announcing-gain-in-2023-whitepaper/) - We are delighted to announce the joint publication of “GAIN in 2023” which is a collaboration between six organizations who continue to pursue the vision of interoperable high trust identity networks, as articulated in the “GAIN Digital Trust” paper, published in 2021 by 156 independent identity industry experts and stakeholders.The paper explores all the ways
- [Announcing OpenID Foundation Sessions at Authenticate 2022 and the FIDO Member Plenary](https://openid.net/announcing-openid-foundation-sessions-at-authenticate-2022-and-the-fido-member-plenary/) - The OpenID Foundation is pleased to be a part of the Authenticate 2022 Conference October 17-29, 2022 and the FIDO Member Plenary October 20-21, 2022. Both events are taking place at the Sheraton Grande Seattle, Washington. OpenID Foundation members please check your inbox as a special offer to attend Authenticate and the Plenary in-person as
- [Announcing the Financial API (FAPI) Working Group](https://openid.net/announcing-the-financial-api-fapi-working-group/) - In many cases, Fintech services such as aggregation services uses screen scraping and stores user passwords. This model is both brittle and insecure. To cope with the brittleness, the new OpenID Foundation Work Group invites developers, architects and technologists to contribute to an open standard approach using an API model with structured data and to
- [Second Implementer’s Draft of Grant Management for OAuth 2.0 Approved](https://openid.net/second-implementers-draft-of-grant-management-for-oauth-2-0-approved/) - The OpenID Foundation membership has approved the following Financial-grade API (FAPI) specification as an OpenID Implementer’s Draft:Grant Management for OAuth 2.0An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This is the first Implementer’s Draft of this specification.The Implementer’s Draft is available at:https://openid.net/specs/oauth-v2-grant-management-ID1.htmlThe voting results
- [OpenID Foundation Announces Liaison Partnership with the European Telecommunications Standards Institute (ETSI)](https://openid.net/openid-foundation-announces-liaison-partnership-with-the-european-telecommunications-standards-institute-etsi/) - The OpenID Foundation is pleased to announce a liaison partnership with the European Telecommunications Standards Institute (ETSI).ETSI provides members with an open and inclusive environment to support the development, ratification and testing of globally applicable standards for ICT systems and services across all sectors of industry and society. ETSI is a not-for-profit body with over
- [Important Announcement about OpenID Foundation Transitions](https://openid.net/important-announcement-about-openid-foundation-transitions/) - Dear OpenID Foundation Members:It is with a heavy heart to share this news with you. Don Thibeau, after many years of his excellent service, informed the OpenID Board of his intention to move on from his position as the Executive Director at the end of 2020 to pursue other opportunities and challenges in the identity
- [Public Review Period for Proposed Second Implementer’s Draft of Grant Management for OAuth 2.0](https://openid.net/public-review-period-for-proposed-second-implementers-draft-of-grant-management-for-oauth-2-0/) - The OpenID Financial-grade API (FAPI) Working Group recommends approval of the following specification as an OpenID Implementer’s Draft:Grant Management for OAuth 2.0This would be the second Implementer’s Draft of this specification.An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This note starts the 45-day public
- [Announcing the 2023 OpenID Foundation Individual Community Board Members Election](https://openid.net/2023-board-members-election/) - This is to announce the OpenID Foundation individual community board members 2023 election schedule. Those elected will help determine the role the Foundation plays in facilitating the develop and adoption of important open identity standards enabling global interoperability as well as the strategic directions of the Foundation.Per the Foundation’s bylaws, three individual community board members are
- [OpenID Connect for Identity Assurance – Overview & Call to Action](https://openid.net/oidc4ida-overview-call-to-action/) - IntroductionAt the start of 2020 a new workgroup was formed under the OpenID Foundation that was to continue on from activities that had been ongoing in the AB/Connect Working Group | OpenID for some months. That new working group came to be known as the eKYC & Identity Assurance Working Group.The initiation of that activity was off the
- [OpenID Foundation Joins the OpenWallet Foundation](https://openid.net/joins-openwallet-foundation/) - OpenID Foundation Workshops provide technical insight and influence on current digital identity standards while offering a collaborative platform to openly address current trends and market opportunities. This OpenID Foundation Workshop includes a number of presentations focused on 2023 Foundation key initiatives as well as updates on active working groups.
- [Announcing the GAIN POC Pre-launch “Listening Tour”](https://openid.net/announcing-the-gain-poc-pre-launch-listening-tour/) - As a follow up to our blog announcement on September 20th heralding our plans to host the Global Assured Identity Network POC, we are delighted to kickoff our GAIN POC pre-launch “listening tour.” The objective of these sessions is to gather input for shaping the Community Group program targeted to launch in December of this year.All
- [Public Review Period for Proposed Final FAPI 1.0 Part 1 and Part 2 Specifications](https://openid.net/public-review-period-for-proposed-final-fapi-1-0-part-1-and-part-2-specifications/) - The OpenID Financial-grade API (FAPI) Working Group recommends approval of the following specifications as OpenID Final Specifications:Financial-grade API – Part 1: Baseline Security ProfileFinancial-grade API – Part 2: Advanced Security ProfileA Final Specification provides intellectual property protections to implementers of the specification and is not subject to further revision. This note starts the 60-day public
- [theSocialWeb.tv on the launch of the Open Identity Exchange](https://openid.net/thesocialweb-tv-on-the-launch-of-the-open-identity-exchange/) - theSocialWeb.tv visits Citizen Space in San Francisco during the RSA Conference to sit down with Don Thibeau of the OpenID Foundation and Drummond Reed of the Information Card Foundation to discuss the launch of the Open Identity Exchange, the result of a year-long collaboration between the two foundations. John McCrea and Chris Messina dive into
- [OpenID Certification Program Expansion and Fee Update](https://openid.net/openid-certification-program-expansion-and-fee-update/) - The OpenID Foundation launched the OpenID Certification Program in 2015. The Program enables organizations to certify that their OpenID Connect implementations conform to specified profiles of the OpenID Connect standard.The certification program is a tool to help ensure that implementations by different parties will interoperate. It provides assurance to the global community of developers that
- [Using OpenID to Power MySpace's Open Platform](https://openid.net/using-openid-to-power-myspaces-open-platform/) - About two weeks ago, MySpace released an update to MySpaceID taking advantage of OpenID combined with OAuth to provide a sign in and profile sharing with a user-experience at parity with Facebook Connect. Max Engel is MySpace's Product Lead for their Open Platform and took the time to write this post, providing some more details
- [User Experience, Attribute Exchange and MapQuest](https://openid.net/user-experience-attribute-exchange-and-mapquest/) - Last month at the first Content Provider Advisory Committee meeting in New York, several media companies and affinity groups identified two desired areas for improvement around OpenID: the user experience as it reaches mainstream adoption and the increased ability to exchange profile information given user consent. Since then, the OpenID Foundation, its members and the
- [2008: Momentum](https://openid.net/momentum/) - 2008 was an awesome year for OpenID where the community created significant momentum moving toward mainstream adoption. No, not every site on the web is using OpenID nor does every consumer know what OpenID does, but last year alone the number of sites that accept OpenID for sign in more than tripled. Today, there are over thirty-thousand publicly accessible sites supporting OpenID for sign in and well over half a billion OpenID enabled accounts.
- [OpenID 2.0...Final(ly)!](https://openid.net/openid-2_0-final-ly/) - While its certainly been a long process in the making, we're now quite excited to announce OpenID Authentication 2.0 and OpenID Attribute Exchange 1.0 as final specifications ("OpenID 2.0"). This morning was the closing day of the Internet Identity Workshop and David Recordon, Dick Hardt, and Josh Hoyt (three of the authors and editors) made
- [OpenID Libraries for Common Lisp](https://openid.net/openid-libraries-for-common-lisp/) - This is a guest post by Maciej Pasternacki, a Google Summer of Code student who created CL-OpenID. The summer is gone (September doesn't count as summer), and so is the Google Summer of Code 2008 program. My Summer of Code project was CL-OpenID, an implementation of OpenID for Common Lisp, and its a pleasure to
- [SourceForge + OpenID: Making it happen](https://openid.net/sourceforge-openid-making-it-happen/) - Last week SourceForge quietly added support for OpenID to their site. The news is official now. SourceForge implemented relying party support (as opposed to just being a provider) which is a trend not often seen by larger players. I wanted to talk with one of their developers to see what it took to make this
- [SourceForge Allows OpenID Logins](https://openid.net/sourceforge-allows-openid-logins/) - If you use open source software then you've probably heard about SourceForge before. If you develop open source software then you've probably even used some of their infrastructure in the past. Today they've made it even easier to login to SourceForge with OpenID. SourgeForge.net isn't acting as an OpenID Provider but rather is accepting OpenID
- [Supporting OpenID Communities Around the World](https://openid.net/openid_foundation_local_chapters/) - Earlier today in Tokyo, the OpenID Foundation along with eleven technology companies in Japan announced the formation of a Japanese chapter of the OpenID Foundation. Just as the OpenID Foundation's board is made up of some of the top Internet companies around the World, these initial participants in this local chapter are some of the
- [Microsoft and Google announce OpenID support](https://openid.net/microsoft-and-google-announce-openid-support/) - This is a historic week for OpenID. Google and Microsoft announced the release of code to support OpenID 2.0 across their most important properties. On Monday, Microsoft, announced OpenID 2.0 support for their 460 million users on the LiveID platform. On Wednesday Google said it will be supporting OpenID 2.0 for any user that has
- [OpenID 2009 Year in Review](https://openid.net/openid-2009-year-in-review/) - It's been an exciting year. A number of initiatives that were started in 2008 had a direct impact on the success of the platform in the past year, so many thanks to all the organizations and individuals who have contributed. Here's a quick summary of the state of OpenID. There are over 1 billion OpenID
- [OpenID: Now more powerful and easier to use!](https://openid.net/more-powerful-and-easier-to-use/) - Google, Yahoo!, and MySpace have launched support for the OpenID OAuth Hybrid Protocol, which combines OpenID authentication (sign in) with OAuth authorization (access control) into a single interface. Websites that accept OpenID can now let the hundreds of millions of users who already have either a MySpace, Google, or Yahoo! account sign in and enable
- [Open identity for the government](https://openid.net/open-identity-for-the-government/) - Chris Messina is a community board member of the OpenID Foundation, long time advocate for citizens of the web, and prolific blogger on all things “open”. Today in collaboration with Vivek Kundra, the nation’s first CIO, we are announcing a pilot program intended to enable individual citizens to login to government websites with their existing
- [Google and JanRain Release Support for the OpenID User Interface Extension](https://openid.net/google-and-janrain-release-support-for-the-openid-user-interface-extension/) - This morning, Google released an upgrade to their OpenID Provider to support the draft OpenID User Interface Extension along with JanRain who added support for it to their Relying Party service RPX. This means that Google users signing into sites like UserVoice (choose "Google" to see it in action) now have a much better user
- [FAPI 2.0 – Announcing New Drafts and Security Analysis](https://openid.net/fapi-2-0-announcement/) - The OpenID Foundation’s FAPI working group is pleased to announce the public review period has started for new Implementer’s Drafts of the FAPI 2.0 Security Profile and the FAPI 2.0 Attacker Model. These drafts coincide with the recently completed formal security analysis of the FAPI 2.0 specifications, the result of a first-of-its-kind collaboration between security
- [What are the differences between FAPI 1.0 and FAPI 2.0 and what do they mean to you?](https://openid.net/what-are-the-differences-between-fapi-1-0-and-fapi-2-0-and-what-do-they-mean-to-you/) - Last updated: February 2023.In one paragraph, FAPI 1.0 Advanced is secure, stable, and complete Final Specification with a certification test suite while FAPI 2.0 is still in development so new features can be incorporated. FAPI 2.0 Security Profile has been through a formal security analysis in the same way as FAPI 1.0 Advanced, but is
- [FAPI 2.0 Conformance Tests and Certifications Now Available](https://openid.net/fapi-2-0-conformance-tests-and-certifications-now-available/) - The OpenID Foundation is pleased to announce the availability of certification tests for both FAPI 2.0 Security Profile Implementers Draft 2and the upcoming first Implementer’s Draft of FAPI 2.0 Message Signing.The FAPI Working Group has taken many of the learnings from FAPI 1.0 and also formulated an attacker model, producing a second iteration of FAPI
- [Registration Open for OpenID Foundation Virtual Workshop — Thursday, December 9, 2021](https://openid.net/registration-open-for-openid-foundation-virtual-workshop-thursday-december-9-2021/) - Workshop Overview OpenID Foundation Workshops provide technical insight and influence on current Internet identity standards. Technologists from member organizations will provide updates on all active OpenID Foundation Working Groups as well the OpenID Certification Program. The workshop will also include a session on the GAIN POC with Don Thibeau and Donna Beatty providing updates from
- [Global Assured Identity Network White Paper](https://openid.net/global-assured-identity-network-white-paper/) - The Global Assured Identity Network White Paper was the centerpiece of the OpenID Foundation’s Chairman Nat Sakimura’s keynote at the European Identity Conference just a few days ago. His presentation can be found at https://nat.sakimura.org/2021/09/14/announcing-gain/. Nat describes GAIN as an overlay network on top of the Internet with all its participants identity proofed. One key benefit of the
- [Shared Signals: An Open Standard for Webhooks](https://openid.net/shared-signals-an-open-standard-for-webhooks/) - New OpenID Foundation draft enables secure and privacy protected webhooks to power an “API-First” worldAuthor: Atul Tulshibagwale APIs are an increasingly important aspect of software today, and “API-First” is the mantra being followed in a lot of new software development. A critical aspect of efficient APIs is their ability to notify callers of changes relating to
- [OpenID Foundation Workshop at Google — Monday, April 25, 2022](https://openid.net/openid-foundation-workshop-at-google-monday-april-25-2022/) - OpenID Foundation Workshops provide technical insight and influence on current digital identity standards while offering a collaborative platform to openly address current trends and market opportunities. This OpenID Foundation Workshop includes a number of presentations focused on 2023 Foundation key initiatives as well as updates on active working groups.
- [OpenID Board Election Results](https://openid.net/openid-board-election-results/) - I’m pleased to report that 175 out of 217 eligible members voted in the election for OpenID Foundation community board members. The election results (listing candidates and number of votes received) are as follows: Elected to serve 2-year terms: Snorri Giorgetti 106 Nat Sakimura 89 Chris Messina 76 David Recordon 76 Elected to serve 1-year
- [Announcing the 2023 OpenID Foundation Kim Cameron Award Recipients](https://openid.net/announcing-the-2023-openid-foundation-kim-cameron-award-recipients/) - The OpenID Foundation is pleased to announce the 2023 Kim Cameron award recipients. The goal of the awards is to increase representation from young people’s who’ve demonstrated an interest in subjects consistent with best practices and identity standards that are secure, interoperable, and privacy preserving.First, many thanks to the many qualified applicants who requested a
- [Implementer’s Draft of FAPI 2.0 Message Signing Approved](https://openid.net/implementers-draft-of-fapi-2-0-message-signing-approved/) - The OpenID Foundation membership has approved the following Financial-grade API (FAPI) specification as an OpenID Implementer’s Draft:FAPI 2.0 Message SigningAn Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This is the first Implementer’s Draft of this specification.The Implementer’s Draft is available at:https://openid.net/specs/fapi-2_0-message-signing-ID1.htmlThe voting results were:Approve
- [OIDF Workshop at Verizon Media - September 30, 2019](https://openid.net/oidf-workshop-at-verizon-media-september-30-2019/) - Verizon Media hosted this OpenID Foundation Workshop on Monday, September 30, 2019 in Sunnyvale, CA. It preceded the Internet Identity Workshop XXVIX in Mountain View, October 1-3, 2019. Workshop Agenda & UpdatesWelcome & Introduction: Lovlesh Chhabra — Verizon Media and Don Thibeau - OpenID FoundationBrowser Changes Impacting Identity Flows: George Fletcher – Verizon Media OpenID Certification
- [OIDF Workshop at PayPal - October 16, 2017](https://openid.net/oidf-workshop-at-paypal-october-16-2017/) - OpenID Foundation Sustaining Member, PayPal, hosted this workshop that preceded the Internet Identity Workshop #25 in Mountain View, October 17-19, 2017. Workshop Agenda & UpdatesWelcome & Introduction – Tushar Pradhan - PayPal and Don Thibeau - OpenID FoundationOpenID Certification Program: Mike Jones - Microsoft OpenID Connect: Mike Jones - Microsoft Account Chooser/OpenYOLO: Pam Dingle - Ping IdentityNo slidesFast Federation (FastFed):
- [OpenID Foundation & Open Banking Workshop:  The Implications for the Banking Industry - November 6, 2017](https://openid.net/openid-foundation-open-banking-workshop-the-implications-for-the-banking-industry-november-6-2017/) - This OpenID Foundation Workshop was co-hosted by Open Banking in London on Monday, November 6, 2017.This workshop immediately followed a face-to-face OpenID Financial API (FAPI) Working Group meeting with the goal of providing an overall update on the Open Banking initiative. Workshop Agenda & UpdatesVenue: Sandbox 2 Level39, One Canada Square, London, E14 5ABDate: Monday, November 6,
- [Open Banking Workshop Hosted by OpenID Foundation and Open Identity Exchange - January 30, 2018](https://openid.net/open-banking-workshop-hosted-by-openid-foundation-and-open-identity-exchange-january-30-2018/) - This Open Banking Workshop was co-hosted by the OpenID Foundation and Open Identity Exchange in London on Tuesday, January 30, 2018. Workshop Agenda & UpdatesVenue: Barclays Accelerator (RISE London), 41 Luke Street, LondonDate: Tuesday, January 30, 2018Time: 14.00 - 16.00 Agenda: Welcome - Don Thibeau Presentation: OpenID Foundation,OpenID Connect and OpenID Certification Program Overview - Mike Jones, OpenID Foundation SecretaryPresentation: V2 Open Banking Read/Write
- [OpenID Foundation's Risk Incident and Sharing Communication (RISC) Work Group Data Sharing Agreement Workshop - January 31, 2018](https://openid.net/openid-foundations-risk-incident-and-sharing-communication-risc-work-group-data-sharing-agreement-workshop-january-31-2018/) - The OpenID Foundation's Risk Incident and Sharing Communication Work Group (RISC WG) Data Sharing Agreement Workshop took place at the Google Campus in Mountain View on January 31, 2018.This special purpose workshop reviewed existing drafts of bilateral agreements between large internet ecosystem players with a goal of developing a common understanding of the legal obligations of
- [Open Banking Workshop Hosted by OpenID Foundation and Open Identity Exchange – March 21, 2018](https://openid.net/open-banking-workshop-hosted-by-openid-foundation-and-open-identity-exchange-march-21-2018/) - This Open Banking Workshop was co-hosted by the OpenID Foundation and Open Identity Exchange in London on Wednesday, March 21, 2018. Workshop Agenda & UpdatesVenue: Microsoft Paddington OfficeDate: Wednesday, March 21, 2018Time: 9.30 - 11.30 Agenda: Welcome and Introduction from OpenID Foundation - Mike Jones, OpenID FoundationOpen Banking Introduction - Gary FarrowOverview of existing Open Banking security profile - Chris
- [OIDF Workshop at Oracle - April 2, 2018](https://openid.net/oidf-workshop-at-oracle-april-2-2018/) - OpenID Foundation Sustaining Member, Oracle, hosted this workshop on April 2, 2018. It preceded the Internet Identity Workshop #26 in Mountain View, April 3-5, 2018.Workshop Agenda & UpdatesWelcome & Introduction – Prateek Mishra - Oracle and Don Thibeau - OpenID FoundationOpenID Certification Program: Mike Jones - Microsoft OpenID Connect: Mike Jones - Microsoft OpenID Connect Federation: Roland Hedberg - Catalogix Financial
- [OIDF Workshop at EIC 2018 - May 15, 2018](https://openid.net/oidf-workshop-at-eic-2018-may-15-2018/) - This OpenID Foundation Workshop took place at the European Identity & Cloud Conference 2018 on May 15, 2018 in Munich. Workshop Agenda & UpdatesWelcome & Introduction – Don Thibeau - OpenID FoundationOpenID Certification Program: Michael Jones - Microsoft  OpenID Connect: Michael Jones - Microsoft  DOWNLOAD PRESENTATION: Introduction to OpenID Connect Core Ch.7 -- Self Issued Identity Provider: Nat Sakimura
- [OIDF Workshop at VMware - October 22, 2018](https://openid.net/oidf-workshop-at-vmware-october-22-2018/) - OpenID Foundation Sustaining Member, VMware, hosted this workshop on Monday, October 22, 2018. It preceded the Internet Identity Workshop XXVII in Mountain View, October 23-25, 2018.Workshop Agenda & UpdatesWelcome & Introduction: Dale Olds - VWware and Don Thibeau - OpenID FoundationOpenID Certification Program: Mike Jones - Microsoft OpenID Connect: Mike Jones - Microsoft  OpenID Connect Federation: Roland Hedberg
- [OIDF Workshop at Verizon Media - April 29, 2019](https://openid.net/oidf-workshop-at-verizon-media-april-29-2019/) - Verizon Media hosted this workshop on Monday, April 29, 2019. It preceded the Internet Identity Workshop XXVIII in Mountain View, May 1-3, 2019. Workshop Agenda & UpdatesWelcome & Introduction: George Fletcher - Verizon Media and Don Thibeau - OpenID FoundationOpenID Certification Program: Mike Jones - Microsoft  OpenID Connect: Mike Jones - Microsoft  OpenID Connect Federation: Roland Hedberg
- [OIDF Workshop at 2019 European Identity Conference - May 14, 2019](https://openid.net/oidf-workshop-at-2019-european-identity-conference-may-14-2019/) - This OpenID Foundation Workshop took place at the 2019 European Identity Conference in Munich on Tuesday, May 14, 2019.Workshop Agenda & UpdatesWelcome & Introduction: Don Thibeau - OpenID FoundationOpenID Certification Program: Mike Jones - Microsoft Financial Grade API (FAPI) Certification Update: – Joseph Heenan - OpenID Foundation OpenID Connect: Mike Jones - Microsoft OpenID Connect Federation: Roland Hedberg
- [OpenID Foundation and the UK Open Banking Implementation Entity Conformance and Certification Workshop -- April 27, 2020](https://openid.net/openid-foundation-and-the-uk-open-banking-implementation-entity-conformance-and-certification-workshop-april-27-2020/) - The OpenID Foundation (OIDF) and our development partner, the UK Open Banking Implementation Entity (OBIE), recently hosted a workshop focused on Financial-grade API (FAPI) conformance and certification. It was a deep dive into the technical interface of our open, global standard with the OBIE’s functional UK standard. View the workshop recording in its entirety OpenID
- [OIDF Virtual Workshop - October 28, 2020](https://openid.net/oidf-virtual-workshop-october-28-2020/) - The OpenID Foundation hosted a virtual workshop on Wednesday, October 28, 2020. The workshop had 90+ participants with active dialogue within the audio and chat channels. The workshop featured OpenID Foundation Working Group updates as well as a panel discussion with OIDF liaison partner, Financial Data Exchange (FDX), discussing the future of open banking and
- [OIDF Virtual Workshop -- Thursday, April 29, 2021](https://openid.net/oidf-virtual-workshop-thursday-april-29-2021/) - The OpenID Foundation hosted a virtual workshop on Thursday, April 29, 2021. The workshop featured two guest presentations. The first was by Ryan Howells with the CARIN Alliance who has adopted OpenID Connect and is building an open source framework for federating trusted Identity Assurance Level 2 (IAL2) certified credentials across health care organizations using
- [OIDF FAPI Outreach Workshops in Australia in Partnership with the Data Standards Body – Spring 2021](https://openid.net/oidf-fapi-outreach-workshops-in-australia-in-partnership-with-the-data-standards-body-spring-2021/) - The OpenID Foundation recently hosted a series of Financial-grade API (FAPI) outreach workshops in Australia in partnership with the Data Standards Body team. The Foundation and the DSB team partnered in developing and delivering these workshops to educate the Australian market on the FAPI security profile and the value of FAPI conformance and certification. Workshop
- [OIDF Virtual Workshop - May 21, 2020](https://openid.net/oidf-virtual-workshop-may-21-2020/) - The OpenID Foundation hosted its first virtual workshop on Thursday, May 21, 2020. The workshop had 50+ participants with active dialogue within the audio and chat channels. The workshop featured OpenID Foundation Working Group updates as well as a presentation by Sam Goto with Google on interactions between browser privacy developments and federated login that
- [OpenID Foundation Publishes “OpenID for Verifiable Credentials” Whitepaper](https://openid.net/openid-foundation-publishes-openid-for-verifiable-credentials-whitepaper/) - The OpenID Foundation is pleased to share its new whitepaper, “OpenID for Verifiable Credentials”. The goal of this whitepaper is to inform and educate the readers about the work on the OpenID for Verifiable Credentials (OpenID4VC) specifications family. It addresses use-cases referred to as Self-Sovereign Identity, Decentralized Identity, or User-Centric Identity.The work is being conducted
- [OpenID Foundation Publishes “The Global Open Health Movement: Empowering People and Saving Lives by Unlocking Data” Whitepaper](https://openid.net/openid-foundation-publishes-the-global-open-health-movement-empowering-people-and-saving-lives-by-unlocking-data-whitepaper/) - The OpenID Foundation is pleased to share their 1st Editor’s Draft of the whitepaper, “The Global Open Health Movement: Empowering People and Saving Lives by Unlocking Data”. This whitepaper has been written for technologists in the public and private health sectors that are trying to deliver “Open Health”, by helping people to securely access and
- [Open for Comment: “Government-issued Digital Credentials and the Privacy Landscape” Whitepaper](https://openid.net/open-for-comment-government-issued-digital-credentials-and-the-privacy-landscape-whitepaper/) - Policymakers, technologists, and privacy advocates are invited to offer their feedback on the new white paper, “Government-issued Digital Credentials and the Privacy Landscape.” This paper, published in part by the OpenID Foundation, Kantara Initiative, and the Secure Identity Alliance, and including contributions from several individuals, seeks to engage and inspire thought leaders from government, civil
- [OpenID Connect Technology Meeting, Oct 22 , 2012](https://openid.net/openid-connect-technology-meeting-oct-22-2012/) - OpenID Connect Technology Meeting will be held on Oct. 22, 2012 at Google, Mountain View. Bluewater Tech Talk Room Google Building 1220 1220 Charleston Road Mountain View, CA Lunch is at 11:30am and the meeting starts at 12:30pm. Non Members are welcome to attend, but must be aware of the OIDF IPR policy. You can find
- [OpenID Connect / Account Chooser Meeting @ IETF 87 Berlin](https://openid.net/openid-connect-account-chooser-meeting-ietf-87-berlin/) - OpenID Foundation is hosting a joint WG meeting at IETF 87 Berlin on Sunday, July 28. Time: 2:00pm, Sunday, July 28 Venue: @IETF 87 Berlin, Germany Registration Site: http://openid-ietf-87.eventbrite.com People interested in OpenID Connect, Account Chooser, and how they relate to IETF specifications such as OAuth, JSON Web Token (JWT), and JSON Object Signing and Encryption (JOSE)
- [Registration Open for OpenID Foundation Workshop on Monday, May 1, 2017](https://openid.net/registration-open-for-openid-foundation-workshop-on-monday-may-1-2017/) - OpenID Foundation Workshops provide early insight and influence on important open identity standards like OpenID Connect. These workshops provide updates on the OpenID Certification Program as well as updates on OpenID Foundation Working Groups. The workshop will review the interface of the MODRNA (Mobile Profile of OpenID Connect) and the GSMA's Mobile Connect. We will review
- [Registration Open for OpenID Foundation Workshop on Monday, October 16, 2017](https://openid.net/registration-open-for-openid-foundation-workshop-on-monday-october-16-2017/) - OpenID Foundation Workshops provide insight and influence on important Internet identity standards. The workshops provide updates on the work happening within OpenID Foundation working groups as well as updates on the OpenID Certification Program. Leading technologists from Amazon, Microsoft, Google, Ping Identity, Yubico and others will update key issues and discuss how they help meet
- [Collaboration at the Core: The OpenID Foundation and the UK Open Banking Implementation Entity Host Conformance and Certification Workshop](https://openid.net/collaboration-at-the-core-the-openid-foundation-and-the-uk-open-banking-implementation-entity-host-conformance-and-certification-workshop/) - The OpenID Foundation (OIDF) and our development partner, the UK Open Banking Implementation Entity (OBIE), recently hosted a workshop focused on Financial-grade API (FAPI) conformance and certification. It was a deep dive into the technical interface of our open, global standard with the OBIE’s functional UK standard. Our success metrics: over 125 active participants, a
- [OpenID Foundation and Open Banking Implementation Entity Continue Collaboration with Conformance and Certification Workshop at OAuth Security Workshop 2020](https://openid.net/openid-foundation-and-open-banking-implementation-entity-continue-collaboration-with-conformance-and-certification-workshop-at-oauth-security-workshop-2020/) - The OpenID Foundation (OIDF) and the UK Open Banking Implementation Entity (OBIE), continue our collaboration efforts building on the success of our recent workshop focused on Financial-grade API (FAPI) conformance and certification. It was a deep dive into the technical interface of our open, international standard with the OBIE’s functional UK standard. More workshops are
- [Some of the OpenID Foundation Summit July 2012 videos available](https://openid.net/some-of-the-openid-foundation-summit-july-2012-videos-available/) - On July 16, 2012, we had OpenID Connect Interop and OpenID Foundation Summit in conjunction with the Cloud Identity Summit 2012, in Vale, Co. Both session were very well attended. We decided to record some of the session. It was an on-the-fly decision, so not all session were recorded and some had glitches, but I
- [Notice of Vote for Proposed Final JWT Secured Authorization Response Mode for OAuth 2.0 (JARM) Specification](https://openid.net/notice-of-vote-for-proposed-final-jwt-secured-authorization-response-mode-for-oauth-2-0-jarm-specification/) - The official voting period will be between Thursday, October 27, 2022 and Thursday, November 3, 2022, once the 60-day review of the specification has been completed. For the convenience of members, voting will actually begin on Thursday, October 20, 2022 for members who have completed their reviews by then. The Financial-grade API (FAPI) working group
- [OpenID Foundation Workshop at Microsoft – Monday, April 17, 2023](https://openid.net/openid-foundation-workshop-at-microsoft-monday-april-17-2023/) - OpenID Foundation Workshops provide technical insight and influence on current digital identity standards while offering a collaborative platform to openly address current trends and market opportunities. This OpenID Foundation Workshop includes a number of presentations focused on 2023 Foundation key initiatives as well as updates on active working groups.
- [Second Implementer’s Draft of OpenID for Verifiable Presentations Specification Approved](https://openid.net/second-implementers-draft-of-openid-for-verifiable-presentations-specification-approved/) - Second Implementer’s Draft of OpenID for Verifiable Presentations Specification Approved The OpenID Foundation membership has approved the following specification as an OpenID Implementer’s Draft: OpenID for Verifiable Presentations An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This is the second Implementer’s Draft of this
- [Notice of Vote for Proposed FAPI 2.0 Message Signing Implementer’s Draft](https://openid.net/notice-of-vote-for-proposed-fapi-2-0-message-signing-implementers-draft/) - The official voting period will be between Tuesday, May 9, 2023 and Tuesday, May 16, 2023, once the 45-day review of the specification has been completed. For the convenience of members, voting will actually open on Tuesday, May 2, 2023 for members who have completed their reviews by then, with the voting period still ending
- [OIDF Workshop at EIC 2022 — Tuesday, May 10, 2022](https://openid.net/oidf-workshop-at-eic-2022-tuesday-may-10-2022/) - The OpenID Foundation hosted a workshop at EIC 2022 in Berlin that was part of the pre-conference workshops on Tuesday, May 10, 2022.The Foundation was thrilled to welcome and introduce two of the 2022 Kim Cameron Award winners, Rachelle Sellung and Alen Horvat at the workshop. The Foundation will soon publish blogs from Rachelle and Alen
- [OIDF Sessions at 2022 Authenticate Conference & FIDO Member Plenary — October 2022](https://openid.net/oidf-sessions-at-2022-authenticate-conference-fido-member-plenary-october-2022/) - The OpenID Foundation was pleased to be a part of the 2022 Authenticate Conference on Tuesday, November 18, 2022 and the FIDO Alliance Member Plenary on Wednesday, November 19, 2022 in Seattle.Session details with links to presentations are below.2022 Authenticate ConferenceThe OpenID Foundation Strategy & a Deep Dive on FAPI and the Global Open Banking,
- [Guest Blog: Frederico Schardong Participates in Identiverse 2022 as a Kim Cameron Award Recipient](https://openid.net/frederico-schardongs-experience-as-a-kim-cameron-award-recipient/) - Despite the fact that I only discovered Kim Cameron’s seminar article on the seven laws of identity many years after it was published, it felt as current as anything new I was reading when I first began studying identity. Going through his thought-provoking blog posts about identity and privacy also provided me with ideas and
- [Notice of Vote for Proposed Second Implementer’s Draft of OpenID for Verifiable Presentations Specification](https://openid.net/notice-of-vote-for-proposed-second-implementers-draft-of-openid-for-verifiable-presentations-specification/) - The official voting period will be between Monday, April 24, 2023 and Monday, May 1, 2023, following the 45 day review of the specification. For the convenience of members, voting will actually open on Monday, April 17, 2023 for members who have completed their reviews by then, with the voting period still ending on Monday,
- [Public Review Period for Proposed FAPI 2.0 Message Signing Implementer’s Draft](https://openid.net/public-review-period-for-proposed-fapi-2-0-message-signing-implementers-draft/) - The OpenID Financial-grade API (FAPI) Working Group recommends approval of the following specification as an OpenID Implementer’s Draft: FAPI 2.0 Message Signing This would be the first Implementer’s Draft of this specification. An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This note starts the
- [Public Review Period for Proposed Second Implementer’s Draft of OpenID for Verifiable Presentations Specification](https://openid.net/public-review-period-for-proposed-second-implementers-draft-of-openid-for-verifiable-presentations-specification/) - The OpenID Connect Working Group recommends approval of the following specification as an OpenID Implementer’s Draft: OpenID for Verifiable Presentations This would be the second Implementer’s Draft of this specification. An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This note starts the 45-day public
- [OIDF Workshop for KSA Open Banking — Tuesday, February 28, 2023](https://openid.net/oidf-workshop-for-ksa-open-banking-tuesday-february-28-2023/) - This OpenID Foundation (OIDF) workshop was co-hosted with the Saudi Central Bank (SAMA) on Tuesday, February 28, 2023.This workshop introduced KSA fintechs to the FAPI specification as wella s FAPI conformance and certification. After the overview presentation, a detailed demonstration of the KSA FAPI Profile RP conformance test suite was provided.View workshop recordingView workshop presentationWorkshop
- [2023 OpenID Foundation Board of Directors Election Results](https://openid.net/2023-openid-foundation-board-of-directors-election-results/) - I want to personally thank all Foundation members who voted in the 2023 elections for representatives to the OpenID Foundation board of directors. Each year Corporate members of the Foundation elect a member to represent them on the board with all Corporate members in good standing eligible to nominate and vote for candidates. Thank you
- [Final Version of “Open Banking and Open Data: Ready to Cross Borders?” Whitepaper Published](https://openid.net/final-version-of-open-banking-and-open-data-ready-to-cross-borders-whitepaper-published/) - The number of Open Data ecosystems and industries covered is constantly growing and very soon people around the world will expect free and open access to their data across a wide range of use cases. But today, these ecosystems end at national or regional borders. The OpenID Foundation is pleased to share the final version
- [OpenID Foundation Workshop at Visa — Monday, November 14, 2022](https://openid.net/openid-foundation-workshop-at-visa-monday-november-14-2022/) - The OpenID Foundation hosted a hybrid workshop at Visa in Foster City, CA on Monday, November 14, 2022. A big thank you to Visa for hosting the Foundation and the workshop participants while enabling a hybrid event to allow for virtual participation.This workshop included a number of detailed presentations focused on the Foundation’s 2022 strategic
- [Second Implementer’s Drafts of Two FAPI 2.0 Specifications Approved](https://openid.net/second-implementers-drafts-of-two-fapi-2-0-specifications-approved/) - The OpenID Foundation membership has approved the following Financial-grade API (FAPI) specifications as OpenID Implementer’s Drafts: FAPI 2.0 Security Profile FAPI 2.0 Attacker Model An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. These are the second FAPI 2.0 Implementer’s Drafts. The Implementer’s Drafts are
- [Second Implementer’s Drafts of Two FAPI 2.0 Specifications Approved](https://openid.net/second-implementers-drafts-of-two-fapi-2-0-specifications-approved-2/) - The OpenID Foundation membership has approved the following Financial-grade API (FAPI) specifications as OpenID Implementer’s Drafts: FAPI 2.0 Security Profile FAPI 2.0 Attacker Model An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. These are the second FAPI 2.0 Implementer’s Drafts. The Implementer’s Drafts are
- [Notice of Vote for Proposed Second Implementer’s Drafts of Two FAPI 2.0 Specifications](https://openid.net/notice-of-vote-for-proposed-second-implementers-drafts-of-two-fapi-2-0-specifications/) - Voting will begin on Monday, January 9, 2023 and end on Monday, January 23, 2023, now that the 45-day review of the specifications has been completed. The Financial-grade API (FAPI) working group page is https://openid.net/wg/fapi/. If you’re not already a member, or if your membership has expired, please consider joining to participate in the approval
- [Implementer’s Draft of OpenID Connect Native SSO for Mobile Apps Approved](https://openid.net/implementers-draft-of-openid-connect-native-sso-for-mobile-apps-approved/) - The OpenID Foundation membership has approved the following specification as an OpenID Implementer’s Draft: OpenID Connect Native SSO for Mobile Apps 1.0 This is the first Implementer’s Draft of this specification. An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This specification is a product
- [Initiating User Registration via OpenID Connect is now a Final Specification](https://openid.net/initiating-user-registration-via-openid-connect-is-now-a-final-specification/) - The OpenID Foundation membership has approved the following OpenID Connect specification as an OpenID Final Specification: Initiating User Registration via OpenID Connect A Final Specification provides intellectual property protections to implementers of the specification and is not subject to further revision. The Final Specification is available at: https://openid.net/specs/openid-connect-prompt-create-1_0-final.html The voting results were: Approve - 48
- [Unmet Authentication Requirements is now a Final Specification](https://openid.net/unmet-authentication-requirements-is-now-a-final-specification/) - The OpenID Foundation membership has approved the following OpenID Connect specification as an OpenID Final Specification: OpenID Connect Core Error Code unmet_authentication_requirements A Final Specification provides intellectual property protections to implementers of the specification and is not subject to further revision. The Final Specification is available at: https://openid.net/specs/openid-connect-unmet-authentication-requirements-1_0-final.html The voting results were: Approve - 45
- [Notice of Vote for Proposed Implementer’s Draft of OpenID Connect Native SSO for Mobile Apps](https://openid.net/notice-of-vote-for-proposed-implementers-draft-of-openid-connect-native-sso-for-mobile-apps/) - The official voting period will be between Friday, November 18, 2022 and Friday, November 25, 2022, once the 45 day review of the specification has been completed. For the convenience of members, voting will actually continue until Friday, December 2, 2022. The OpenID Connect Working Group page is https://openid.net/wg/connect/. If you’re not already a member,
- [Public Review Period for Two Proposed FAPI 2.0 Second Implementer’s Drafts](https://openid.net/public-review-period-for-two-proposed-fapi-2-0-second-implementers-drafts/) - The OpenID Financial-grade API (FAPI) Working Group recommends approval of the following specifications as OpenID Implementer’s Drafts: FAPI 2.0 Security Profile FAPI 2.0 Attacker Model An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This note starts the 45-day public review period for the specification
- [JWT Secured Authorization Response Mode for OAuth 2.0 (JARM) is now a Final Specification](https://openid.net/jwt-secured-authorization-response-mode-for-oauth-2-0-jarm-is-now-a-final-specification/) - The OpenID Foundation membership has approved the following Financial-grade API (FAPI) specification as an OpenID Final Specification: JWT Secured Authorization Response Mode for OAuth 2.0 (JARM) A Final Specification provides intellectual property protections to implementers of the specification and is not subject to further revision. The Final Specification is available at: https://openid.net/specs/oauth-v2-jarm-final.html The voting results
- [Notice of Vote for Proposed Final Initiating User Registration via OpenID Connect Specification](https://openid.net/notice-of-vote-for-proposed-final-initiating-user-registration-via-openid-connect-specification/) - The official voting period will be between Tuesday, November 22, 2022 and Tuesday, November 29, 2022, once the 60-day review of the specification has been completed. For the convenience of members, voting will actually begin on Tuesday, November 15, 2022 for members who have completed their reviews by then. The OpenID Connect working group page
- [Notice of Vote for Proposed Final Unmet Authentication Requirements Specification](https://openid.net/notice-of-vote-for-proposed-final-unmet-authentication-requirements-specification/) - The official voting period will be between Wednesday, November 9, 2022 and Wednesday, November 16, 2022, once the 60-day review of the specification has been completed. For the convenience of members, voting will actually begin on Wednesday, November 2, 2022 for members who have completed their reviews by then. The OpenID Connect working group page
- [Fourth Implementer’s Draft of OpenID Connect for Identity Assurance Specification Approved](https://openid.net/fourth-implementers-draft-of-openid-connect-for-identity-assurance-specification-approved/) - The OpenID Foundation membership has approved the following specification as an OpenID Implementer’s Draft: OpenID Connect for Identity Assurance 1.0 An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This is the fourth Implementer’s Draft of this specification. This specification is a product of the
- [Public Review Period for Proposed Implementer’s Draft of OpenID Connect Native SSO for Mobile Apps](https://openid.net/public-review-period-for-proposed-implementers-draft-of-openid-connect-native-sso-for-mobile-apps/) - The OpenID Connect Working Group recommends approval of the following specification as an OpenID Implementer’s Draft: OpenID Connect Native SSO for Mobile Apps 1.0 This would be the first Implementer’s Draft of this specification. An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This note
- [Public Review Period for Proposed Final Initiating User Registration via OpenID Connect Specification](https://openid.net/public-review-period-for-proposed-final-initiating-user-registration-via-openid-connect-specification/) - The OpenID Connect Working Group recommends approval of the following specification as an OpenID Final Specification: Initiating User Registration via OpenID Connect A Final Specification provides intellectual property protections to implementers of the specification and is not subject to further revision. This note starts the 60-day public review period for the specification draft in accordance
- [Notice of Vote for Fourth Implementer’s Draft of OpenID Connect for Identity Assurance Specification](https://openid.net/notice-of-vote-for-fourth-implementers-draft-of-openid-connect-for-identity-assurance-specification/) - The official voting period will be between Tuesday, October 4, 2022 and Tuesday, October 11, 2022, following the 45 day review of the specification. For the convenience of members, voting will actually open on Monday, September 26, 2022 for members who have completed their reviews by then, with the voting period still ending on Tuesday,
- [The OpenID Connect Logout specifications are now Final Specifications](https://openid.net/the-openid-connect-logout-specifications-are-now-final-specifications/) - The OpenID Foundation membership has approved the following OpenID Connect specifications as OpenID Final Specifications: OpenID Connect Session Management 1.0 OpenID Connect Front-Channel Logout 1.0 OpenID Connect Back-Channel Logout 1.0 OpenID Connect RP-Initiated Logout 1.0 A Final Specification provides intellectual property protections to implementers of the specification and is not subject to further revision. The
- [Public Review Period for Proposed Final Unmet Authentication Requirements Specification](https://openid.net/public-review-period-for-proposed-final-unmet-authentication-requirements-specification/) - The OpenID Connect Working Group recommends approval of the following specification as an OpenID Final Specification: OpenID Connect Core Error Code unmet_authentication_requirements A Final Specification provides intellectual property protections to implementers of the specification and is not subject to further revision. This note starts the 60-day public review period for the specification draft in accordance
- [Public Review Period for Proposed Final JWT Secured Authorization Response Mode for OAuth 2.0 (JARM) Specification](https://openid.net/public-review-period-for-proposed-final-jwt-secured-authorization-response-mode-for-oauth-2-0-jarm-specification/) - The OpenID Financial-grade API (FAPI) Working Group recommends approval of the following specification as an OpenID Final Specification: JWT Secured Authorization Response Mode for OAuth 2.0 (JARM) A Final Specification provides intellectual property protections to implementers of the specification and is not subject to further revision. This note starts the 60-day public review period for
- [Second Implementer’s Draft of RISC Profile Approved](https://openid.net/second-implementers-draft-of-risc-profile-approved/) - The OpenID Foundation membership has approved the following Shared Signals and Events (SSE) specification as an OpenID Implementer’s Draft: OpenID RISC Profile Specification 1.0 An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. The Implementer’s Draft is available at: https://openid.net/specs/openid-risc-profile-specification-1_0-ID2.html The voting results were: Approve
- [Fourth Public Review Period for OpenID Connect for Identity Assurance Specification Started](https://openid.net/fourth-public-review-period-for-openid-connect-for-identity-assurance-specification-started/) - The OpenID eKYC and Identity Assurance Working Group recommends approval of the following specification as an OpenID Implementer’s Draft: OpenID Connect for Identity Assurance 1.0 This would be the fourth Implementer’s Draft of this specification. An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This
- [Notice of Vote for Proposed Final OpenID Connect Logout Specifications](https://openid.net/notice-of-vote-for-proposed-final-openid-connect-logout-specifications/) - The official voting period will be between Monday, September 5, 2022 and Monday, September 12, 2022, once the 60-day review of the specifications has been completed. For the convenience of members, voting will actually begin on Friday, August 26, 2022 for members who have completed their reviews by then, with the voting period ending on
- [Notice of Vote for Second Proposed RISC Profile Implementer’s Draft](https://openid.net/notice-of-vote-for-second-proposed-risc-profile-implementers-draft/) - The official voting period will be between Saturday, August 20, 2022 and Saturday, August 27, 2022, once the 45-day review of the specification has been completed. For the convenience of members, voting will actually begin on Friday, August 12, 2022 for members who have completed their reviews by then, with the voting period ending on
- [Public Review Period for Proposed Final OpenID Connect Logout Specifications](https://openid.net/public-review-period-for-proposed-final-openid-connect-logout-specifications/) - The OpenID OpenID Connect Working Group recommends approval of the following specifications as OpenID Final Specifications: OpenID Connect Session Management 1.0 OpenID Connect Front-Channel Logout 1.0 OpenID Connect Back-Channel Logout 1.0 OpenID Connect RP-Initiated Logout 1.0 A Final Specification provides intellectual property protections to implementers of the specification and is not subject to further revision.
- [Public Review Period for Second Proposed RISC Profile Implementer’s Draft](https://openid.net/public-review-period-for-second-proposed-risc-profile-implementers-draft/) - The OpenID Shared Signals and Events (SSE) Working Group recommends approval of the following specification as an OpenID Implementer’s Draft: OpenID RISC Profile Specification 1.0 An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This note starts the 45-day public review period for the specification
- [First Implementer’s Drafts of OpenID Connect SIOPV2 and OIDC4VP Specifications Approved](https://openid.net/first-implementers-drafts-of-openid-connect-siopv2-and-oidc4vp-specifications-approved/) - The OpenID Foundation membership has approved the following specifications as OpenID Implementer’s Drafts: Self-Issued OpenID Provider v2 OpenID Connect for Verifiable Presentations An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. These are the first Implementer’s Drafts of these specifications. These specifications are products of
- [First Implementer’s Draft of Initiating User Registration via OpenID Connect Approved](https://openid.net/first-implementers-draft-of-initiating-user-registration-via-openid-connect-approved/) - The OpenID Foundation membership has approved the following specification as an OpenID Implementer’s Draft: Initiating User Registration via OpenID Connect An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This is the first Implementer’s Draft of this specification. This specification is a product of the
- [Notice of Vote for First Implementer’s Draft of Initiating User Registration via OpenID Connect](https://openid.net/notice-of-vote-for-first-implementers-draft-of-initiating-user-registration-via-openid-connect/) - The official voting period will be between Tuesday, February 1, 2022 and Tuesday, February 8, 2022, following the 45-day review of the specification. For the convenience of members, voting will actually open on Tuesday, January 25, 2022 for members who have completed their reviews by then, with the voting period still ending on Tuesday, February
- [First Public Review Period for OpenID Connect SIOPV2 and OIDC4VP Specifications Started](https://openid.net/first-public-review-period-for-openid-connect-siopv2-and-oidc4vp-specifications-started/) - The OpenID Connect Working Group recommends approval of the following specifications as OpenID Implementer’s Drafts: Self-Issued OpenID Provider v2 OpenID Connect for Verifiable Presentations These would be the first Implementer’s Drafts of these specifications. An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This note
- [First Public Review Period for Initiating User Registration via OpenID Connect Started](https://openid.net/first-public-review-period-for-initiating-user-registration-via-openid-connect-started/) - The OpenID Connect Working Group recommends approval of the following specification as an OpenID Implementer’s Draft: Initiating User Registration via OpenID Connect This would be the first Implementer’s Draft of this specification. An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This note starts the
- [Okta Joins the OpenID Foundation Board to Further Advance Open Identity Standards](https://openid.net/okta-joins-the-openid-foundation-board-to-further-advance-open-identity-standards/) - The OpenID Foundation is delighted to welcome Okta to the Board, an elevation of their membership status since Okta and Auth0 joined forces in May 2021. “Okta and Auth0 are long-standing contributors and thought leaders in all aspects of the identity industry. We are thrilled for Okta and Auth0 to take on this elevated role,
- [Third Implementer’s Draft of OpenID Connect Federation Specification Approved](https://openid.net/third-implementers-draft-of-openid-connect-federation-specification-approved/) - The OpenID Foundation membership has approved the following specification as an OpenID Implementer’s Draft: OpenID Connect Federation 1.0 An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This is the third Implementer’s Draft of this specification. This specification is a product of the OpenID Connect
- [Third Implementer’s Draft of OpenID Connect for Identity Assurance Specification Approved](https://openid.net/third-implementers-draft-of-openid-connect-for-identity-assurance-specification-approved/) - The OpenID Foundation membership has approved the following specification as an OpenID Implementer’s Draft: OpenID Connect for Identity Assurance 1.0 An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This is the third Implementer’s Draft of this specification. This specification is a product of the
- [Notice of Vote for Third Implementer’s Draft of OpenID Connect Federation Specification](https://openid.net/notice-of-vote-for-third-implementers-draft-of-openid-connect-federation-specification/) - The official voting period will be between Wednesday, November 3, 2021 and Wednesday, November 10, 2021, following the 45 day review of the specification. For the convenience of members, voting will actually open on Wednesday, October 27, 2021 for members who have completed their reviews by then, with the voting period still ending on Wednesday,
- [Notice of Vote for Third Implementer’s Draft of OpenID Connect for Identity Assurance Specification](https://openid.net/notice-of-vote-for-third-implementers-draft-of-openid-connect-for-identity-assurance-specification/) - The official voting period will be between Wednesday, November 3, 2021 and Wednesday, November 10, 2021, following the 45 day review of the specification. For the convenience of members, voting will actually open on Wednesday, October 27, 2021 for members who have completed their reviews by then, with the voting period still ending on Wednesday,
- [Implementer’s Draft of FAPI Grant Management Approved](https://openid.net/implementers-draft-of-fapi-grant-management-approved/) - The OpenID Foundation membership has approved the following Financial-grade API (FAPI) specification as an OpenID Implementer’s Draft: Grant Management for OAuth 2.0 An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. The Implementer’s Draft is available at: https://openid.net/specs/fapi-grant-management-ID1.html The voting results were: Approve - 66
- [Third Public Review Period for OpenID Connect Federation Specification Started](https://openid.net/third-public-review-period-for-openid-connect-federation-specification-started/) - The OpenID Connect Working Group recommends approval of the following specification as an OpenID Implementer’s Draft: OpenID Connect Federation 1.0 This would be the third Implementer’s Draft of this specification. An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This note starts the 45-day public
- [Third Public Review Period for OpenID Connect for Identity Assurance Specification Started](https://openid.net/third-public-review-period-for-openid-connect-for-identity-assurance-specification-started/) - The OpenID eKYC and Identity Assurance Working Group recommends approval of the following specification as an OpenID Implementer’s Draft: OpenID Connect for Identity Assurance 1.0 This would be the third Implementer’s Draft of this specification. An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This
- [OpenID Connect Client-Initiated Backchannel Authentication (CIBA) Core is now a Final Specification](https://openid.net/openid-connect-client-initiated-backchannel-authentication-ciba-core-is-now-a-final-specification/) - The OpenID Foundation membership has approved the following MODRNA specification as an OpenID Final Specification: OpenID Connect Client-Initiated Backchannel Authentication Flow - Core 1.0 A Final Specification provides intellectual property protections to implementers of the specification and is not subject to further revision. The Final Specification is available at: https://openid.net/specs/openid-client-initiated-backchannel-authentication-core-1_0-final.html The voting results were: Approve
- [Implementer’s Drafts of Two SSE Specifications Approved](https://openid.net/implementers-drafts-of-two-sse-specifications-approved/) - The OpenID Foundation membership has approved the following Shared Signals and Events (SSE) specifications as OpenID Implementer’s Drafts: OpenID Shared Signals and Events Framework Specification OpenID Continuous Access Evaluation Profile An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. These are the first SSE Implementer’s
- [Notice of Vote for Proposed FAPI Grant Management Implementer’s Draft](https://openid.net/notice-of-vote-for-proposed-fapi-grant-management-implementers-draft/) - The official voting period will be between Monday, August 30, 2021 and Monday, September 6, 2021, once the 45-day review of the specification has been completed. For the convenience of members, voting will actually begin on Monday, August 23, 2021 for members who have completed their reviews by then, with the voting period ending on
- [Notice of Vote for Proposed Final OpenID Connect Client-Initiated Backchannel Authentication (CIBA) Core Specification](https://openid.net/notice-of-vote-for-proposed-final-openid-connect-client-initiated-backchannel-authentication-ciba-core-specification/) - The official voting period will be between Saturday, August 7, 2021 and Saturday, August 14, 2021, once the 60-day review of the specification has been completed. For the convenience of members, voting will actually begin on Saturday, July 31, 2021 for members who have completed their reviews by then, with the voting period ending on
- [Notice of Vote for Proposed Implementer’s Drafts of Two SSE Specifications](https://openid.net/notice-of-vote-for-proposed-implementers-drafts-of-two-sse-specifications/) - The voting period will be between Friday, July 23, 2021 and Friday, August 6, 2021, once the 45-day review of the specifications has been completed. The Shared Signals and Events (SSE) working group page is https://openid.net/wg/sse/. If you’re not already a member, or if your membership has expired, please consider joining to participate in the
- [Implementer’s Drafts of Two FAPI 2.0 Specifications Approved](https://openid.net/implementers-drafts-of-two-fapi-2-0-specifications-approved/) - The OpenID Foundation membership has approved the following Financial-grade API (FAPI) specifications as OpenID Implementer’s Drafts: FAPI 2.0 Baseline Profile FAPI 2.0 Attacker Model An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. These are the first FAPI 2.0 Implementer’s Drafts. The Implementer’s Drafts are
- [Public Review Period for Proposed FAPI Grant Management Implementer’s Draft](https://openid.net/public-review-period-for-proposed-fapi-grant-management-implementers-draft/) - The OpenID Financial-grade API (FAPI) Working Group recommends approval of the following specification as an OpenID Implementer’s Draft: Grant Management for OAuth 2.0 An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This note starts the 45-day public review period for the specification draft in
- [Public Review Period for Proposed RISC Profile Implementer’s Draft](https://openid.net/public-review-period-for-proposed-risc-profile-implementers-draft/) - The OpenID Shared Signals and Events (SSE) Working Group recommends approval of the following specification as an OpenID Implementer’s Draft: OpenID RISC Profile Specification An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This note starts the 45-day public review period for the specification draft
- [Notice of Vote for Proposed Implementer’s Drafts of Two FAPI 2.0 Specifications](https://openid.net/notice-of-vote-for-proposed-implementers-drafts-of-two-fapi-2-0-specifications/) - The official voting period will be between Saturday, July 10, 2021 and Saturday, July 17, 2021, once the 45-day review of the specifications has been completed. For the convenience of members, voting will actually begin on Saturday, July 3, 2021 for members who have completed their reviews by then, with the voting period ending on
- [Public Review Period for Proposed Final OpenID Connect Client-Initiated Backchannel Authentication (CIBA) Core Specification](https://openid.net/public-review-period-for-proposed-final-openid-connect-client-initiated-backchannel-authentication-ciba-core-specification/) - The OpenID MODRNA Working Group recommends approval of the following specification as an OpenID Final Specification: OpenID Connect Client-Initiated Backchannel Authentication Flow - Core 1.0 A Final Specification provides intellectual property protections to implementers of the specification and is not subject to further revision. This note starts the 60-day public review period for the specification
- [Public Review Period for Two Proposed SSE Implementer’s Drafts](https://openid.net/public-review-period-for-two-proposed-sse-implementers-drafts/) - The OpenID Shared Signals and Events (SSE) Working Group recommends approval of the following specifications as OpenID Implementer’s Drafts: OpenID Shared Signals and Events Framework Specification OpenID Continuous Access Evaluation Profile An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This note starts the 45-day
- [Public Review Period for Two Proposed FAPI 2.0 Implementer’s Drafts](https://openid.net/public-review-period-for-two-proposed-fapi-2-0-implementers-drafts/) - The OpenID Financial-grade API (FAPI) Working Group recommends approval of the following specifications as OpenID Implementer’s Drafts: FAPI 2.0 Baseline Profile FAPI 2.0 Attacker Model An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This note starts the 45-day public review period for the specification
- [The 7 Laws of Identity Standards](https://openid.net/the-7-laws-of-identity-standards/) - The OpenID Foundation is proud to participate in the first ever ‘Identity Management Day,’ an annual awareness event that will take place on the second Tuesday in April each year. The inaugural Identity Management Day is April 13, 2021. Founded by the Identity Defined Security Alliance (IDSA), the mission of Identity Management Day is to educate business leaders
- [OpenID Connect Federation Specification Resulting from a Year of Implementation Experience](https://openid.net/openid-connect-federation-specification-resulting-from-a-year-of-implementation-experience/) - The OpenID Foundation held three interop events for implementations of the OpenID Connect Federation specification during 2020. The learnings from each were used to iteratively refine the specification after each round, just as we did when developing OpenID Connect itself. The current specification is the result of the iterative rounds of improvement, informed by the
- [FAPI 1.0 Part 1 and Part 2 are now Final Specifications](https://openid.net/fapi-1-0-part-1-and-part-2-are-now-final-specifications/) - The OpenID Foundation membership has approved the following Financial-grade API (FAPI) specifications as OpenID Final Specifications: Financial-grade API 1.0 - Part 1: Baseline Security Profile Financial-grade API 1.0 - Part 2: Advanced Security Profile A Final Specification provides intellectual property protections to implementers of the specification and is not subject to further revision. The Final
- [The Identity, Unlocked “eKYC with Mark Haine” Podcast Now Live](https://openid.net/the-identity-unlocked-ekyc-with-mark-haine-podcast-now-live/) - The OpenID Foundation is pleased to sponsor the Identity, Unlocked podcast. This week’s episode “eKYC with Mark Haine” features host Vittorio Bertocci and special guest Mark Haine. The episode focuses on the work of the OpenID Foundation’s eKYC & Identity Assurance Working Group. Mark Haine is the Director at considrd.consulting and one of the Co-chairs
- [First Implementer’s Drafts of Three FastFed Specifications Approved](https://openid.net/first-implementers-drafts-of-three-fastfed-specifications-approved/) - The OpenID Foundation membership has approved the following Fast Federation (FastFed) specifications as OpenID Implementer’s Drafts: FastFed Core 1.0 FastFed Basic SAML Profile 1.0 FastFed Basic SCIM Profile 1.0 An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. These are the first FastFed Implementer’s Drafts.
- [Second Implementer’s Draft of OpenID Connect User Questioning API Specification Approved](https://openid.net/second-implementers-draft-of-openid-connect-user-questioning-api-specification-approved/) - The OpenID Foundation membership has approved the following specification as an OpenID Implementer’s Draft: OpenID Connect User Questioning API 1.0 An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This is the second Implementer’s Draft of this specification. This specification is a product of the
- [OpenID Foundation to Sponsor Auth0's Identity, Unlocked Podcast](https://openid.net/openid-foundation-to-sponsor-auth0s-identity-unlocked-podcast/) - Highly-rated identity specifications and trends podcast concludes season one; season two to launch in January 2021 BELLEVUE, Wash. – Dec. 17, 2020 – Auth0, the identity platform for application teams, today announced that the OpenID Foundation will be the exclusive sponsor for season two of Auth0's flagship podcast 'Identity, Unlocked,' scheduled to release in January 2021. Auth0 and the
- [Notice of Second Vote for Proposed Implementer’s Drafts of Three FastFed Specifications](https://openid.net/notice-of-second-vote-for-proposed-implementers-drafts-of-three-fastfed-specifications/) - The official voting period will be between Monday, December 14, 2020 and Wednesday, January 13, 2021, once the 45-day review of the specifications has been completed. For the convenience of members, voting will actually begin on Monday, December 7, 2020 for members who have completed their reviews by then, with the voting period ending on
- [Notice of Vote for Second Implementer’s Draft of OpenID Connect User Questioning API Specification](https://openid.net/notice-of-vote-for-second-implementers-draft-of-openid-connect-user-questioning-api-specification/) - The official voting period will be between Monday, December 14, 2020 and Wednesday, January 13, 2021, following the 45-day review of the specification. For the convenience of members, voting will actually open on Monday, December 7, 2020 for members who have completed their reviews by then, with the voting period ending on Wednesday, January 13,
- [Notice of Vote for Proposed Final FAPI 1.0 Part 1 and Part 2 Specifications](https://openid.net/notice-of-vote-for-proposed-final-fapi-1-0-part-1-and-part-2-specifications/) - The official voting period will be between Tuesday, December 29, 2020 and Tuesday, January 5, 2021, once the 60-day review of the specifications has been completed. For the convenience of members, voting will actually begin on Monday, December 7, 2020 for members who have completed their reviews by then, with the voting period ending on
- [Second Public Review Period for Three Proposed FastFed Implementer’s Drafts](https://openid.net/second-public-review-period-for-three-proposed-fastfed-implementers-drafts/) - The OpenID Fast Federation (FastFed) Working Group recommends approval of the following specifications as OpenID Implementer’s Drafts: FastFed Core 1.0 FastFed Basic SAML Profile 1.0 FastFed Basic SCIM Profile 1.0 An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This note starts the 45-day public
- [Second Public Review Period for OpenID Connect User Questioning API Specification Started](https://openid.net/second-public-review-period-for-openid-connect-user-questioning-api-specification-started/) - The OpenID MODRNA Working Group recommends approval of the following specification as an OpenID Implementer’s Draft: OpenID Connect User Questioning API 1.0 This would be the second Implementer’s Draft of this specification. An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This note starts the
- [OpenID Connect Federation Draft Incorporating Feedback from First Interop Event](https://openid.net/openid-connect-federation-draft-incorporating-feedback-from-first-interop-event/) - The OpenID Connect Federation specification has been updated to incorporate feedback from developers participating in the first OpenID Connect Federation interop event, which was held online in June 2020. The primary change is to use either signed request objects (JAR) or pushed authorization requests (PAR) for client authentication of automatic registration requests. The new draft
- [Second Implementer’s Draft of OpenID Connect for Identity Assurance Specification Approved](https://openid.net/second-implementers-draft-of-openid-connect-for-identity-assurance-specification-approved/) - The OpenID Foundation membership has approved the following specification as an OpenID Implementer’s Draft: OpenID Connect for Identity Assurance 1.0 An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This is the second Implementer’s Draft of this specification. This specification is a product of the
- [Notice of Vote for Second Implementer’s Draft of OpenID Connect for Identity Assurance Specification](https://openid.net/notice-of-vote-for-second-implementers-draft-of-openid-connect-for-identity-assurance-specification/) - The official voting period will be between Monday, May 11, 2020 and Monday, May 18, 2020, following the 45 day review of the specification. For the convenience of members, voting will actually open on Monday, May 4, 2020 for members who have completed their reviews by then, with the voting period still ending on Monday,
- [Notice of Vote for Proposed Implementer’s Drafts of Three FastFed Specifications](https://openid.net/notice-of-vote-for-proposed-implementers-drafts-of-three-fastfed-specifications/) - The official voting period will be between Thursday, April 30, 2020 and Thursday, May 7, 2020, once the 45 day review of the specifications has been completed. For the convenience of members, voting will actually begin on Thursday, April 23, 2020 for members who have completed their reviews by then, with the voting period ending
- [Second Public Review Period for OpenID Connect for Identity Assurance Specification Started](https://openid.net/second-public-review-period-for-openid-connect-for-identity-assurance-specification-started/) - The OpenID eKYC and Identity Assurance Working Group recommends approval of the following specification as an OpenID Implementer’s Draft: OpenID Connect for Identity Assurance 1.0 This would be the second Implementer’s Draft of this specification. An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This
- [Public Review Period for Three Proposed FastFed Implementer’s Drafts](https://openid.net/public-review-period-for-three-proposed-fastfed-implementers-drafts/) - The OpenID Fast Federation (FastFed) Working Group recommends approval of the following specifications as OpenID Implementer’s Drafts: FastFed Core 1.0 FastFed Basic SAML Profile 1.0 FastFed Basic SCIM Profile 1.0 An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This note starts the 45-day public
- [Second Implementer’s Draft of OpenID Connect Client Initiated Backchannel Authentication (CIBA) Core Specification Approved](https://openid.net/second-implementers-draft-of-openid-connect-client-initiated-backchannel-authentication-ciba-core-specification-approved/) - The OpenID Foundation membership has approved the following specification as an OpenID Implementer’s Draft: OpenID Connect Client Initiated Backchannel Authentication (CIBA) Core 1.0 An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This is the second Implementer’s Draft of this specification. This specification is a
- [Notice of Vote for Second Implementer’s Draft of OpenID Connect Client Initiated Backchannel Authentication (CIBA) Core Specification](https://openid.net/notice-of-vote-for-second-implementers-draft-of-openid-connect-client-initiated-backchannel-authentication-ciba-core-specification/) - The official voting period will be between Friday, March 6, 2020 and Friday, March 13, 2020, following the 45 day review of the specification. For the convenience of members, voting will actually open on Friday, February 28, 2020 for members who have completed their reviews by then, with the voting period ending on Friday, March
- [Second Public Review Period for OpenID Connect Client Initiated Backchannel Authentication (CIBA) Core Specification Started](https://openid.net/second-public-review-period-for-openid-connect-client-initiated-backchannel-authentication-ciba-core-specification-started/) - The OpenID MODRNA Working Group recommends approval of the following specification as an OpenID Implementer’s Draft: OpenID Connect Client Initiated Backchannel Authentication (CIBA) Core 1.0 This would be the second Implementer’s Draft of this specification. An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This
- [Second Implementer’s Draft of OpenID Connect Federation Specification Approved](https://openid.net/second-implementers-draft-of-openid-connect-federation-specification-approved/) - The OpenID Foundation membership has approved the following specification as an OpenID Implementer’s Draft: OpenID Connect Federation 1.0 An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This is the second Implementer’s Draft of this specification. This specification is a product of the OpenID Connect
- [Notice of Vote for Second Implementer’s Draft of OpenID Connect Federation Specification](https://openid.net/notice-of-vote-for-second-implementers-draft-of-openid-connect-federation-specification/) - The official voting period will be between Monday, December 16, 2019 and Tuesday, January 7, 2020, following the 45 day review of the specification. For the convenience of members, voting will actually open on Monday, December 16, 2019 for members who have completed their reviews by then, with the voting period ending on Tuesday, January
- [Implementer’s Draft of OpenID Connect for Identity Assurance Specification Approved](https://openid.net/implementers-draft-of-openid-connect-for-identity-assurance-specification-approved/) - The OpenID Foundation membership has approved the following specification as an OpenID Implementer’s Draft: OpenID Connect for Identity Assurance 1.0 An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This is the first Implementer’s Draft of this specification. This specification is a product of the
- [Dispatch from Innotribe@Sibos 2019](https://openid.net/dispatch-from-innotribesibos-2019/) - Innotribe is always a dynamic and thought-provoking opportunity for voices from outside the finance industry to collaborate at Sibos. At this years Sibos-2019-London, I led a panel discussion of fintech and identity experts to exchange experiences and discuss opportunities as we develop and implement community-driven, open standards for digital identity and global open banking initiatives.
- [Second Public Review Period for OpenID Connect Federation Specification Started](https://openid.net/second-public-review-period-for-openid-connect-federation-specification-started/) - The OpenID OpenID Connect Working Group recommends approval of the following specification as an OpenID Implementer’s Draft: OpenID Connect Federation 1.0 This would be the second Implementer’s Draft of this specification. An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This note starts the 45-day
- [Notice of Vote for Implementer’s Draft of OpenID Connect for Identity Assurance Specification](https://openid.net/notice-of-vote-for-implementers-draft-of-openid-connect-for-identity-assurance-specification/) - The official voting period will be between Monday, November 4, 2019 and Monday, November 11, 2019, following the 45 day review of the specification. For the convenience of members, voting will actually open on Monday, October 28, 2019 for members who have completed their reviews by then, with the voting period still ending on Monday,
- [Welcoming New OpenID Foundation Vice-Chairman](https://openid.net/welcoming-new-openid-foundation-vice-chairman/) - Before I welcome our new Vice-Chairman, on behalf of the OpenID Foundation, I would like to thank Adam Dawes of Google who has served on the Board of Directors for years as Vice-Chairman. Adam’s contributions to the board, the community and his leadership of Working Groups, most recently the groundbreaking work of RISC, are much
- [Apple Successfully Implements OpenID Connect with Sign In with Apple](https://openid.net/apple-successfully-implements-openid-connect-with-sign-in-with-apple/) - September 30, 2019 Mr. Craig Federighi Apple Senior Vice President of Software Engineering One Apple Park Way Cupertino, CA 95014 RE: Apple Successfully Implements OpenID Connect with Sign In with Apple Dear Mr. Federighi, As you are likely aware, on behalf of the OpenID Foundation Board of Directors, I published an open letter to you
- [Public Review Period for OpenID Connect for Identity Assurance Specification Started](https://openid.net/public-review-period-for-openid-connect-for-identity-assurance-specification-started/) - The OpenID OpenID Connect Working Group recommends approval of the following specification as an OpenID Implementer’s Draft: OpenID Connect for Identity Assurance 1.0 An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This note starts the 45-day public review period for the specification draft in
- [OpenID Certification Program Expands with the Release of Financial-grade API Client Initiated Backchannel Authentication Profile (FAPI-CIBA) Certification](https://openid.net/openid-certification-program-expands-with-the-release-of-financial-grade-api-client-initiated-backchannel-authentication-profile-fapi-ciba-certification/) - The OpenID Foundation announced today its expansion of the OpenID Certification program with conformance testing and self-certification of Financial-grade API Client Initiated Backchannel Authentication Profile (FAPI-CIBA) OpenID Providers. The ability to self-certify FAPI-CIBA implementations builds on the availability and success of Financial-grade API (FAPI) certifications whereby a number of vendors including banks have certified their
- [Implementer’s Draft of FAPI Client Initiated Backchannel Authentication (CIBA) Profile Approved](https://openid.net/implementers-draft-of-fapi-client-initiated-backchannel-authentication-ciba-profile-approved/) - The OpenID Foundation membership has approved the following specification as an OpenID Implementer’s Draft: Financial-grade API: Client Initiated Backchannel Authentication Profile An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This is the first Implementer’s Draft of this specification. This specification is a product of
- [Implementer’s Drafts of Two EAP Specifications Approved](https://openid.net/implementers-drafts-of-two-eap-specifications-approved/) - The OpenID Foundation membership has approved the following Enhanced Authentication Profile (EAP) specifications as OpenID Implementer’s Drafts: OpenID Connect Token Bound Authentication 1.0 OpenID Connect Extended Authentication Profile (EAP) ACR Values 1.0 An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. These are the first
- [Notice of Vote for Implementer’s Draft of FAPI Client Initiated Backchannel Authentication (CIBA) Profile](https://openid.net/notice-of-vote-for-implementers-draft-of-fapi-client-initiated-backchannel-authentication-ciba-profile/) - The official voting period will be between Friday, August 16 and Friday, August 23, 2019, following the 45 day review of the specification. For the convenience of members, voting will actually open early on Friday, August 9, providing for a two-week voting period. The FAPI working group page is https://openid.net/wg/fapi/. If you’re not already a
- [OpenID Connect Federation Progress](https://openid.net/openid-connect-federation-progress/) - The OpenID Connect Federation 1.0 specification is being developed to enable large-scale federations to be deployed using OpenID Connect. It enables trust among federation participants to be established through signed statements made by federation operators and organizations about federation participants. The design of this specification builds upon the experiences gained in operating large-scale SAML 2.0
- [Notice of Vote for Proposed Implementer’s Drafts of Two EAP Specifications](https://openid.net/notice-of-vote-for-proposed-implementers-drafts-of-two-eap-specifications/) - The official voting period will be between Friday, June 7, 2019 and Friday, June 14, 2019, once the 45 day review of the specifications has been completed. For the convenience of members, voting will actually remain open until Friday, June 21, 2019, providing for a two-week voting period. The Enhanced Authentication Profile (EAP) working group
- [Public Review Period for Two Proposed EAP Implementer’s Drafts](https://openid.net/public-review-period-for-two-proposed-eap-implementers-drafts/) - The OpenID Enhanced Authentication Profile (EAP) Working Group recommends approval of the following specifications as OpenID Implementer’s Drafts: OpenID Connect Token Bound Authentication 1.0 OpenID Connect Extended Authentication Profile (EAP) ACR Values 1.0 The first specification enables OpenID Connect implementations to apply Token Binding to the OpenID Connect ID Token. This use of Token Binding
- [Guest Blog: Formal Analysis of the OpenID Financial-grade API](https://openid.net/guest-blog-formal-analysis-of-the-openid-financial-grade-api/) - Guest blog post by Daniel Fett (yes.com), Pedram Hosseyni, and Ralf Küsters (University of Stuttgart). The security of a web protocol is crucial, especially in the domain of financial applications and in other high-stakes environments. For identifying weaknesses in protocols and ensuring security, formal protocol analysis is the state-of-the-art method. The OpenID Financial-grade API (FAPI)
- [Implementer’s Drafts of Four HEART Specifications Approved](https://openid.net/implementers-drafts-of-four-heart-specifications-approved/) - The OpenID Foundation membership has approved the following Health Relationship Trust (HEART) specifications as OpenID Implementer’s Drafts: Health Relationship Trust Profile for OAuth 2.0 Health Relationship Trust Profile for Fast Healthcare Interoperability Resources (FHIR) OAuth 2.0 Scopes Health Relationship Trust Profile for User-Managed Access 2.0 Health Relationship Trust Profile for Fast Healthcare Interoperability Resources (FHIR)
- [Notice of Vote for Implementer’s Drafts of Four HEART Specifications](https://openid.net/notice-of-vote-for-implementers-drafts-of-four-heart-specifications/) - The official voting period will be between Monday, March 4, 2019 and Monday, March 11, 2019, following the 45 day review of the specifications. For the convenience of members, voting will actually open on Monday, February 25, 2019 for members who have completed their reviews by then, with the voting period still ending on Monday,
- [Implementer’s Draft of OpenID Connect Client Initiated Backchannel Authentication (CIBA) Core Approved](https://openid.net/implementers-draft-of-openid-connect-client-initiated-backchannel-authentication-ciba-core-approved/) - The OpenID Foundation membership has approved the following specification as an OpenID Implementer’s Draft: OpenID Connect Client Initiated Backchannel Authentication Flow - Core 1.0 An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This is the first Implementer’s Draft of this specification. This specification is
- [Implementer’s Drafts of Two iGov Specifications Approved](https://openid.net/implementers-drafts-of-two-igov-specifications-approved/) - The OpenID Foundation membership has approved the following International Government Assurance Profile (iGov) specifications as OpenID Implementer’s Drafts: International Government Assurance Profile (iGov) for OAuth 2.0 International Government Assurance Profile (iGov) for OpenID Connect 1.0 An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. These
- [Public Review Period for Four HEART Specifications Started](https://openid.net/public-review-period-for-four-heart-specifications-started/) - The OpenID HEART Working Group recommends approval of the following specifications as OpenID Implementer’s Drafts: Health Relationship Trust Profile for OAuth 2.0 Health Relationship Trust Profile for Fast Healthcare Interoperability Resources (FHIR) OAuth 2.0 Scopes Health Relationship Trust Profile for User-Managed Access 2.0 Health Relationship Trust Profile for Fast Healthcare Interoperability Resources (FHIR) UMA 2
- [Notice of Vote for Implementer’s Draft of OpenID Connect Client Initiated Backchannel Authentication (CIBA) Core](https://openid.net/notice-of-vote-for-implementers-draft-of-openid-connect-client-initiated-backchannel-authentication-ciba-core/) - The official voting period will be between Monday, January 28 and Monday, February 4, 2019, following the 45 day review of the specification. For the convenience of members, voting will actually open early on Monday, January 21, providing for a two-week voting period. The MODRNA working group page is http://openid.net/wg/mobile/. If you’re not already a
- [Notice of Vote for Proposed Implementer’s Drafts of Two iGov Specifications](https://openid.net/notice-of-vote-for-proposed-implementers-drafts-of-two-igov-specifications/) - The official voting period will be between Thursday, January 17 and Thursday, January 24, 2019. The 45 day review of the specifications has been completed. For the convenience of members, voting will actually open early on Thursday, January 10, providing for a two-week voting period. The International Government Assurance Profile (iGov) working group page is
- [Public Review Period for OpenID Connect Client Initiated Backchannel Authentication (CIBA) Core Started](https://openid.net/public-review-period-for-openid-connect-client-initiated-backchannel-authentication-ciba-core-started/) - The OpenID OpenID MODRNA Working Group recommends approval of the following specification as an OpenID Implementer’s Draft: OpenID Connect Client Initiated Backchannel Authentication Flow - Core 1.0 An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This note starts the 45-day public review period for
- [Implementer’s Drafts of Three FAPI Specifications Approved](https://openid.net/implementers-drafts-of-three-fapi-specifications-approved/) - The OpenID Foundation membership has approved the following Financial-grade API (FAPI) specifications as OpenID Implementer’s Drafts: Financial-grade API — Part 1: Read Only API Security Profile Financial-grade API — Part 2: Read & Write API Security Profile Financial-grade API — JWT Secured Authorization Response Mode for OAuth 2.0 (JARM) An Implementer’s Draft is a stable
- [Notice of Vote for Implementer’s Drafts of Three FAPI Specifications](https://openid.net/notice-of-vote-for-implementers-drafts-of-three-fapi-specifications/) - The official voting period will be between Tuesday, October 15, 2018 and Tuesday, October 22, 2018, following the 45 day review of the specification. For the convenience of members, voting will actually open on Tuesday, October 8, 2018 for members who have completed their reviews by then, with the voting period still ending on Tuesday,
- [Implementer’s Draft of OpenID Connect Federation Specification Approved](https://openid.net/implementers-draft-of-openid-connect-federation-specification-approved/) - The OpenID Foundation membership has approved the following specification as an OpenID Implementer’s Draft: OpenID Connect Federation 1.0 An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This is the first Implementer’s Draft of this specification. This specification is a product of the OpenID Connect
- [Notice of Vote for Implementer’s Draft of OpenID Connect Federation Specification](https://openid.net/notice-of-vote-for-implementers-draft-of-openid-connect-federation-specification/) - The official voting period will be between Tuesday, July 24, 2018 and Tuesday, July 31, 2018, following the 45 day review of the specification. For the convenience of members, voting will actually open on Tuesday, July 17, 2018 for members who have completed their reviews by then, with the voting period still ending on Tuesday,
- [Three RISC Implementer’s Drafts Approved](https://openid.net/three-risc-implementers-drafts-approved/) - The OpenID Foundation membership has approved the following specifications as OpenID Implementer’s Drafts: OpenID RISC Profile of IETF Security Events 1.0 OpenID RISC Event Types 1.0 OAuth Event Types 1.0 An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. These are the first Risk and
- [OpenID Certification Now Available for Form Post Response Mode Implementations](https://openid.net/openid-certification-now-available-for-form-post-response-mode-implementations/) - Conformance profiles for OPs and RPs implementing Form Post Response Mode are now ready for you to test and use. These are in the pilot phase and so certifications using them are currently available to any OpenID Foundation member for free. If you aren't a member and want to certify during the pilot phase, you
- [Public Review Period for OpenID Connect Federation Specification Started](https://openid.net/public-review-period-for-openid-connect-federation-specification-started/) - The OpenID OpenID Connect Working Group recommends approval of the following specification as an OpenID Implementer’s Draft: OpenID Connect Federation 1.0 An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This note starts the 45-day public review period for the specification draft in accordance with
- [Notice of Vote for Implementer’s Drafts of Three RISC Specifications](https://openid.net/notice-of-vote-for-implementers-drafts-of-three-risc-specifications/) - The official voting period will be between Friday, June 22, 2018 and Friday, June 29, 2018, following the 45 day review of the specifications. For the convenience of members, voting will actually open on Friday, June 15, 2018 for members who have completed their reviews by then, with the voting period still ending on Friday,
- [OpenID Certification program wins 2018 European Identity and Cloud Award](https://openid.net/openid-certification-program-wins-2018-european-identity-and-cloud-award/) - I’m thrilled to report that the OpenID Certification program has won the 2018 European Identity and Cloud Award for Best Innovation at the European Identity and Cloud (EIC) conference. This recognition follows also being awarded the 2018 Identity Innovation Award at the IDnext conference in March. While the OpenID Connect standard won the 2012 European
- [Public Review Period for Three RISC Specifications Started](https://openid.net/public-review-period-for-three-risc-specifications-started/) - The OpenID Risk and Incident Sharing and Coordination (RISC) Working Group recommends approval of the following specifications as OpenID Implementer’s Drafts: OpenID RISC Profile of IETF Security Events 1.0 OpenID RISC Event Types 1.0 OAuth Event Types 1.0 An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of
- [OpenID Certification program wins 2018 Identity Innovation Award](https://openid.net/openid-certification-program-wins-2018-identity-innovation-award/) - I’m very pleased to report that the OpenID Certification program has won the 2018 Identity Innovation Award at the IDnext conference. While the OpenID Connect standard won the 2012 European Identity Award for best innovation/new standard and has been widely deployed since then, a standard is only as good as its implementations. The OpenID Foundation
- [The London Chapter of Women in Identity Held It's First Ever Event on the 29th of January 2018.](https://openid.net/the-london-chapter-of-women-in-identity-held-its-first-ever-event-on-the-29th-of-january-2018/) - Three members of the steering committee: myself and Colette D’Alessandro of Ping Identity and Emma Lindley of Innovate Identity, hosted the first Women in Identity (WID) London Chapter event at the Barclays’ RISE building based in Shoreditch, London. Barclays and Ping Identity sponsored the event which was attended by over 25 women from many different
- [Women In Identity Event - January 29, 2018](https://openid.net/women-in-identity-event-january-29-2018/) - Women In Identity (WiD) kicked off at Identiverse in Chicago in June 2017. We were wondering at the time how many people would turn up…….we shouldn’t have been concerned because it was a fantastic success and there was standing room only! In June we also launched our website, twitter handle @womeninID and Linkedin group. Please do follow us, share our thoughts
- [Notice of Vote for Implementer’s Drafts of Two iGov Specifications](https://openid.net/notice-of-vote-for-implementers-drafts-of-two-igov-specifications/) - The official voting period will be between Friday, August 25 and Friday, September 1, 2017, following the 45 day review of the specifications. For the convenience of members, voting will actually open on Monday, August 21st for members who have completed their reviews by then, with the voting period still ending on Friday, September 1,
- [Five HEART Implementer’s Drafts Approved](https://openid.net/five-heart-implementers-drafts-approved/) - The OpenID Foundation membership has approved the following specifications as OpenID Implementer’s Drafts: Health Relationship Trust Profile for OAuth 2.0 Health Relationship Trust Profile for OpenID Connect 1.0 Health Relationship Trust Profile for User Managed Access 1.0 Health Relationship Trust Profile for Fast Healthcare Interoperability Resources (FHIR) OAuth 2.0 Scopes Health Relationship Trust Profile for
- [Relying Party OpenID Certification Entering Production Phase](https://openid.net/relying-party-openid-certification-entering-production-phase/) - The OpenID Certification program for OpenID Connect Relying Parties has reached a level of maturity that the time has come to end the pilot phase, in which we were "testing the tests". After August 8th, 2017, the Relying Party Certification program will join the OpenID Provider Certification program in production status. Thanks to those who
- [FAPI Part 2 Implementer’s Draft Approved](https://openid.net/fapi-part-2-implementers-draft-approved/) - The OpenID Foundation membership has approved "Financial API - Part 2: Read and Write API Security Profile" as an OpenID Implementer’s Draft. An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. The specification is available at: http://openid.net/specs/openid-financial-api-part-2-ID1.html The voting results were: Approve – 39 votes
- [Public Review Period for Two iGov Specifications Started](https://openid.net/public-review-period-for-two-igov-specifications-started/) - The OpenID iGov Working Group recommends approval of the following specifications as OpenID Implementer’s Drafts: International Government Assurance Profile (iGov) for OAuth 2.0 International Government Assurance Profile (iGov) for OpenID Connect 1.0 An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This note starts the
- [Notice of Vote for Implementer’s Drafts of Five HEART Specifications](https://openid.net/notice-of-vote-for-implementers-drafts-of-five-heart-specifications/) - The official voting period will be between Wednesday, July 19 and Wednesday, July 26, 2017, following the 45 day review of the specifications. For the convenience of members, voting will actually open on Wednesday, July 12th for members who have completed their reviews by then, with the voting period still ending on Wednesday, July 26,
- [Notice of Vote for Implementer’s Draft of “Financial API – Part 2: Read and Write API Security Profile”](https://openid.net/notice-of-vote-for-implementers-draft-of-financial-api-part-2-read-and-write-api-security-profile/) - The official voting period will be between Monday, July 17 and Monday, July 24, 2017, following the 45 day review of the specification. For the convenience of members, voting will actually open on Tuesday, July 11th for members who have completed their reviews by then, with the voting period still ending on Monday, July 24,
- [OpenID Implementer’s Draft of OpenYOLO for Android Specification Approved](https://openid.net/openid-implementers-draft-of-openyolo-for-android-specification-approved/) - The OpenID Foundation membership has approved the OpenYOLO for Android specification as an OpenID Implementer’s Draft. An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. The specification is available at: http://openid.net/specs/openyolo-android-ID1.html The voting results were: Approve – 45 votes Object – 2 vote Abstain –
- [Notice of Vote for Implementer’s Draft of OpenYOLO for Android Specification](https://openid.net/notice-of-vote-for-implementers-draft-of-openyolo-for-android-specification/) - The official voting period will be between Friday, June 19 and Friday, June 26, 2017, following the 45 day review of the specification. For the convenience of members, voting will actually open a week before this on Friday, June 12 for members who have completed their reviews by then. If you’re not already an OpenID
- [Public Review Period for Five HEART Specifications Started](https://openid.net/public-review-period-for-five-heart-specifications-started/) - The OpenID HEART Working Group recommends approval of the following specifications as OpenID Implementer’s Drafts: Health Relationship Trust Profile for OAuth 2.0 Health Relationship Trust Profile for OpenID Connect 1.0 Health Relationship Trust Profile for User Managed Access 1.0 Health Relationship Trust Profile for Fast Healthcare Interoperability Resources (FHIR) OAuth 2.0 Scopes Health Relationship Trust
- [Public Review Period for "Financial API - Part 2: Read and Write API Security Profile" Started](https://openid.net/public-review-period-for-financial-api-part-2-read-and-write-api-security-profile-started/) - OpenID Foundation's Financial API (FAPI) Working Group recommends approval of the following specification as OpenID Implementer’s Draft: Financial API - Part 2: Read and Write API Security Profile, draft 02 This document is a Part 2 of a set of documents that specifies a Financial API. It provides a profile of OAuth that is suitable
- [Connecting Standards: RESO and OpenID Connect](https://openid.net/connecting-standards-reso-and-openid-connect/) - Don Thibeau, The OpenID Foundation, with Jeremy Crawford, CEO, Real Estate Standards Organization One of the sure signs of increasing momentum is when other standards organizations adopt yours. And it’s particularly noteworthy when that adoption not only builds on OpenID Connect, but adds OpenID Connect conformance compliance as part of the overall standards certification
- [Public Review Period for OpenYOLO for Android Specification Started](https://openid.net/public-review-period-for-openyolo-for-android-specification-started/) - The OpenID Foundation Account Chooser/Open YOLO (You Only Login Once) Working Group recommends approval of the following specification as OpenID Implementer’s Draft: OpenYOLO for Android, draft 03 An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This note starts the 45-day public review period for
- [OpenID Implementer’s Drafts of Four MODRNA Specifications Approved](https://openid.net/openid-implementers-drafts-of-four-modrna-specifications-approved/) - The OpenID Foundation membership has approved these specifications as OpenID Implementer’s Drafts. An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. OpenID Connect MODRNA Authentication Profile 1.0 OpenID Connect Account Porting OpenID Connect User Questioning API 1.0 OpenID Connect MODRNA Client initiated Backchannel Authentication Flow
- [Notice of Vote for Implementer’s Drafts of Four MODRNA Specifications](https://openid.net/notice-of-vote-for-implementers-drafts-of-four-modrna-specifications/) - The official voting period will be between Friday, April 21 and Friday, April 28, 2017, following the 45 day review of the specifications. For the convenience of members, voting will actually open a week before this on Friday, April 14 for members who have completed their reviews by then, with the voting period still ending
- [OpenID Connect Logout Implementer’s Drafts Approved](https://openid.net/openid-connect-logout-implementers-drafts-approved/) - The OpenID Foundation membership has approved these specifications as OpenID Implementer’s Drafts. An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. Session Management - Defines how to manage OpenID Connect sessions, including postMessage-based logout functionality Front-Channel Logout - Defines a front-channel logout mechanism that does
- [Notice of Vote for Implementer’s Drafts of OpenID Connect Logout Specifications](https://openid.net/notice-of-vote-for-implementers-drafts-of-openid-connect-logout-specifications/) - The official voting period will be between Tuesday, March 21 and Tuesday, March 28, 2017, following the 45 day review of the specification. For the convenience of members, voting will actually open a week before Tuesday, March 21 on Tuesday, March 14 for members who have completed their reviews by then, with the voting period
- [Public Review Period for Four MODRNA Specifications Started](https://openid.net/public-review-period-for-four-modrna-specifications-started/) - The OpenID Foundation MODRNA Working Group recommends approval of the following specifications as OpenID Implementer’s Drafts: OpenID Connect MODRNA Authentication Profile 1.0, draft 06 OpenID Connect Account Porting, draft 07 OpenID Connect User Questioning API 1.0, draft 10 OpenID Connect MODRNA Client initiated Backchannel Authentication Flow 1.0, draft 03 An Implementer’s Draft is a stable
- [OpenID Connect Relying Party Certification Adoption](https://openid.net/openid-connect-relying-party-certification-adoption/) - The adoption of the new OpenID Connect Relying Party (RP) Certification has exceeded our expectations – especially the surprising number of early adopters who tested a wide variety of implementations. The tests were improved at an accelerating rate, with many organizations actively “testing the tests”. All of the OpenID Foundation’s success metrics – the volume,
- [Review of Proposed Implementer’s Drafts of OpenID Connect Logout Specifications](https://openid.net/review-of-proposed-implementers-drafts-of-openid-connect-logout-specifications/) - The OpenID Connect Working Group recommends approval of the following specifications as OpenID Implementer’s Drafts: Session Management - Defines how to manage OpenID Connect sessions, including postMessage-based logout functionality Front-Channel Logout - Defines a front-channel logout mechanism that does not use an OP iframe on RP pages Back-Channel Logout - Defines a logout mechanism that
- [Notice of Vote for Implementer’s Draft of “Financial API – Part 1: Read Only API Security Profile”](https://openid.net/notice-of-vote-for-implementers-draft-of-financial-api-part-1-read-only-api-security-profile/) - The official voting period will be between Friday, February 3 and Friday, February 10, 2017, following the 45 day review of the specification. For the convenience of members, voting will actually open a week before Friday, February 3 on Friday, January 27 for members who have completed their reviews by then, with the voting period
- [Public Review Period for "Financial API - Part 1: Read Only API Security Profile" Started](https://openid.net/public-review-period-for-financial-api-part-1-read-only-api-security-profile-started/) - OpenID Foundation's Financial API (FAPI) Working Group has advised the foundation to start the public review period for consideration as an Implementer's Draft for the specification: Financial API - Part 1: Read Only API Security Profile, draft 01 It is a specification that documents the security profiles of OAuth 2.0 and OpenID Connect to be used
- [Initial OpenID Connect Enhanced Authentication Profile (EAP) Specifications](https://openid.net/initial-openid-connect-enhanced-authentication-profile-eap-specifications/) - The OpenID Enhanced Authentication Profile (EAP) working group charter states that: The purpose of this working group is to develop a security and privacy profile of the OpenID Connect specifications that enable users to authenticate to OpenID Providers using strong authentication specifications. The resulting profile will enable use of IETF Token Binding specifications with OpenID
- [HEART Implementer’s Drafts Approved](https://openid.net/heart-implementers-drafts-approved/) - The OpenID Foundation members have approved of the following specifications as OpenID Implementer’s Drafts: Health Relationship Trust Profile for OAuth 2.0 Health Relationship Trust Profile for OpenID Connect 1.0 Health Relationship Trust Profile for User Managed Access 1.0 An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of
- [Leaders Lead](https://openid.net/igov-working-group-commences-leaders-lead-by-example-whether-one-intends-to-or-not/) - The inaugural meeting of the iGov Working Group took place on Wednesday, January 14th where three co-chairs were elected by acclamation. John Bradley of Ping Identity, Paul Grassi of the US NIST and Adam Cooper of the UK Cabinet Office Identity Assurance Program are the elected co-chairs. Acclamation may be a bit strong describing an
- [Review of Proposed Implementer’s Drafts of HEART Specifications](https://openid.net/review-of-proposed-implementers-drafts-of-heart-specifications/) - The OpenID HEART Working Group recommends approval of the following specifications as OpenID Implementer’s Drafts: Health Relationship Trust Profile for OAuth 2.0 Health Relationship Trust Profile for OpenID Connect 1.0 Health Relationship Trust Profile for User Managed Access 1.0 An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers
- [Building on What's Built: OpenID Certification Momentum](https://openid.net/openid-certification-momentum/) - At the OpenID Certification Launch in April 2015, 6 organizations had certified 8 OpenID Connect Provider implementations for 21 conformance profiles. Now, as you can see at http://openid.net/certification/, 14 organizations and individuals have certified 16 OpenID Connect Provider implementations for 48 conformance profiles. The OpenID Foundation has championed self-certification as an important new trust building
- [Announcing the OIDF iGov Working Group](https://openid.net/announcing-the-oidf-igov-working-group/) - A recent US NIST announcement describes the newly formed OIDF International Government Assurance Profile (iGov) Working Group which is an international public and private sector collaboration that will develop an interoperable profile of OpenID Connect to allow users to authenticate and share consented attribute information in a consistent and user-centric manner. With over 10 international
- [The Path Forward for Self-Certification](https://openid.net/the-path-forward-for-self-certification/) - The increasing adoption of OpenID Connect deployments has required the OpenID Foundation to develop new certification models that support the practical business, legal and technical realities of today’s Internet scale deployments. Throughout 2015, the pilot phase of OpenID Connect self-certification has been testing the efficiencies, cost effectiveness and trustworthiness of this new approach. Early adopters
- [Certification pilot expanded to all OIDF members](https://openid.net/certification-pilot-expanded-to-all-oidf-members/) - The OpenID Foundation has opened the OpenID Certification pilot phase to all OpenID members, as the Board previously announced we would do in May. This enables individual and non-profit members to also self-certify OpenID Connect implementations. The OpenID Board has not yet finalized beta pricing to cover the costs of certification applications during the next
- [Certification Accomplishments and Next Steps](https://openid.net/certification-accomplishments-and-next-steps/) - I’d like to take a moment and congratulate the OpenID Foundation members who made the successful OpenID Certification launch happen. By the numbers, six organizations were granted 21 certifications covering all five defined conformance profiles. See Mike Jones’ note Perspectives on the OpenID Connect Certification Launch for reflections on what we’ve accomplished and how we
- [Final OAuth 2.0 Form Post Response Mode Specification Approved](https://openid.net/final-oauth-2-0-form-post-response-mode-specification-approved/) - The OAuth 2.0 Form Post Response Mode specification has been approved as a Final Specification by a vote of the OpenID Foundation members. A Final Specification provides intellectual property protections to implementers of the specification and is not subject to further revision. This specification defines how to return OAuth 2.0 Authorization Response parameters (including OpenID
- [The OpenID Foundation Launches OpenID Connect Certification Program](https://openid.net/openid-connect-certification-program/) - Google, Microsoft, Ping Identity, ForgeRock, Nomura Research Institute, and PayPal OpenID Connect Deployments First to Self-Certify Conformance RSA Conference 2015, San Francisco, CA – April 22, 2015 – Today the OpenID® Foundation introduced OpenID Connect Certification – a program that enables organizations to certify that their OpenID Connect implementations conform to specified profiles of the
- [Final OpenID 2.0 to OpenID Connect Migration Specification Approved](https://openid.net/final-openid-2-0-to-openid-connect-migration-specification-approved/) - The OpenID 2.0 to OpenID Connect Migration specification has been approved as a Final Specification by a vote of the OpenID Foundation members. A Final Specification provides intellectual property protections to implementers of the specification and is not subject to further revision. This specification defines how to migrate from OpenID 2.0 to OpenID Connect. The
- [Vote to approve final OAuth 2.0 Form Post Response Mode specification](https://openid.net/vote-to-approve-final-oauth-2-0-form-post-response-mode-specification/) - The OpenID Connect Working Group recommends approval of the following specification as an OpenID Final Specification: OAuth 2.0 Form Post Response Mode 1.0 – Defines how to return OAuth 2.0 Authorization Response parameters (including OpenID Connect Authentication Response parameters) using HTML form values that are auto-submitted by the User Agent using HTTP POST A Final
- [Review of proposed final OAuth 2.0 Form Post Response Mode specification](https://openid.net/review-of-proposed-final-oauth-2-0-form-post-response-mode-specification/) - The OpenID Connect Working Group recommends approval of the following specification as an OpenID Final Specification: OAuth 2.0 Form Post Response Mode 1.0 – Defines how to return OAuth 2.0 Authorization Response parameters (including OpenID Connect Authentication Response parameters) using HTML form values that are auto-submitted by the User Agent using HTTP POST A Final
- [Industry Leaders Lead: Google Asks Developers to Migrate from OpenID 2.0 to OpenID Connect](https://openid.net/industry-leaders-lead-google-asks-developers-to-migrate-from-openid-2-0-to-openid-connect/) - In 2015, waves of disruption are coursing through the Internet identity ecosystem as standard development organizations, companies and governments look to bolster the security and privacy of the information they are charged with protecting. Implementing the latest open standards is one of the many practical steps identity providers and relying parties can take now to
- [2015 Board of Directors Election Results](https://openid.net/2015-board-of-directors-election-results/) - Thanks to all who voted for those who will represent corporate members and the community at large on the OpenID Foundation Board of Directors. John Bradley and Mike Jones have been elected to two year terms and George Fletcher to a one year term. The returning board members help ensure the leadership, continuity and deep
- [Review of proposed final OpenID 2.0 to OpenID Connect Migration specification](https://openid.net/review-of-proposed-final-openid-2-0-to-openid-connect-migration-specification/) - The OpenID Connect Working Group recommends approval of the following specification as an OpenID Final Specification: OpenID 2.0 to OpenID Connect Migration 1.0 – Defines how to migrate from OpenID 2.0 to OpenID Connect A Final Specification provides intellectual property protections to implementers of the specification and is not subject to further revision. This note
- [Errata to OpenID Connect Specifications Approved](https://openid.net/errata-to-openid-connect-specifications-approved/) - Errata to the following specifications have been approved by a vote of the OpenID Foundation members: OpenID Connect Core 1.0 – Defines the core OpenID Connect functionality: authentication built on top of OAuth 2.0 and the use of Claims to communicate information about the End-User OpenID Connect Discovery 1.0 – Defines how Relying Parties dynamically
- [Implementer’s Draft of OpenID 2.0 to OpenID Connect Migration Specification Approved](https://openid.net/implementers-draft-of-openid-2-0-to-openid-connect-migration-specification-approved/) - The following specification has been approved as an OpenID Implementer’s Draft by a vote of the OpenID Foundation members: OpenID 2.0 to OpenID Connect Migration 1.0 – Defines how to migrate from OpenID 2.0 to OpenID Connect An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the
- [Notice of Vote for Errata to OpenID Connect Specifications](https://openid.net/notice-of-vote-for-errata-to-openid-connect-specifications/) - The official voting period will be between Friday, October 31 and Friday, November 7, 2014, following the 45 day review of the specifications. For the convenience of members, voting will actually open a week before Friday, October 31 on Friday, October 24 for members who have completed their reviews by then, with the voting period
- [Notice of Vote for Implementer’s Draft of OpenID 2.0 to OpenID Connect Migration Specification](https://openid.net/notice-of-vote-for-implementers-draft-of-openid-2-0-to-openid-connect-migration-specification/) - The official voting period will be between Friday, October 31 and Friday, November 7, 2014, following the 45 day review of the specification. For the convenience of members, voting will actually open a week before Friday, October 31 on Friday, October 24 for members who have completed their reviews by then, with the voting period
- [The Name is the Thing: "The ARPU of Identity”](https://openid.net/the-name-is-the-thing-the-arpu-of-identity/) - The name is the thing. The name of this Open Identity Exchange White Paper, the "ARPU of Identity”, is deliberate. ARPU, Average Revenue Per User, is one metric telcos use to measure success. By deliberately using a traditional lens that telcos use, this paper puts emerging Internet identity markets into a pragmatic perspective. The focus of the white paper is
- [Crossing the Chasm In Mobile Identity: OpenID Foundation’s Mobile Profile Working Group](https://openid.net/crossing-the-chasm-in-mobile-identity-openid-foundations-mobile-profile-working-group/) - Mobile Network Operators (MNOs) worldwide are in various stages of “crossing the chasm” in the Internet identity markets. As Geoffrey A. Moore noted in his seminal work, the most difficult step is making the transition between early adopters and pragmatists. The chasm crossing Moore refers to points to the bandwagon effect and the role standards
- [General Availability of Microsoft OpenID Connect Identity Provider](https://openid.net/general-availability-of-microsoft-openid-connect-identity-provider/) - Microsoft has announced the general availability of the Azure Active Directory OpenID Connect Identity Provider. It supports the discovery of provider information as well as session management (logout). On this occasion, the OpenID Foundation wants to recognize Microsoft for its contributions to the development of the OpenID Connect specifications and congratulate them on the general availability of their
- [Review of Proposed Errata to OpenID Connect Specifications](https://openid.net/review-of-proposed-errata-to-openid-connect-specifications/) - The OpenID Connect Working Group recommends the approval of Errata to the following specifications: OpenID Connect Core 1.0 – Defines the core OpenID Connect functionality: authentication built on top of OAuth 2.0 and the use of Claims to communicate information about the End-User OpenID Connect Discovery 1.0 – Defines how Relying Parties dynamically discover information
- [Review of Proposed Implementer’s Draft of OpenID 2.0 to OpenID Connect Migration Specification](https://openid.net/review-of-proposed-implementers-draft-of-openid-2-0-to-openid-connect-migration-specification/) - The OpenID Connect Working Group recommends approval of the following specification as an OpenID Implementer’s Draft: OpenID 2.0 to OpenID Connect Migration 1.0 – Defines how to migrate from OpenID 2.0 to OpenID Connect An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This note
- [US Government Office of the National Coordinator for Health Information Technology (ONC) Joins the OpenID Foundation](https://openid.net/us-government-office-of-the-national-coordinator-for-health-information-technology-onc-joins-the-openid-foundation/) - The Office of the National Coordinator for Health Information Technology (ONC) located within the Office of the Secretary for the U.S. Department of Health and Human Services (HHS) has joined the OpenID Foundation (OIDF). ONC is the principal federal entity charged with coordination of nationwide efforts to implement and utilize the most advanced health information
- [Last Call on the Launch and the Move to Mobile](https://openid.net/last-call-on-the-launch-and-the-move-to-mobile/) - This is my first blog after a successful OpenID Connect launch in San Francisco, Barcelona and Japan on February 26th. The launch generated global buzz and coverage. Below are a few links to my previous posts highlighting statements of support and press coverage: Statements of Support Additional Statements of Support OpenID Connect Press Coverage Congratulations
- [No Oscars, But OpenID Connect Launch Receives International Raves](https://openid.net/no-oscars-but-openid-connect-launch-receives-international-raves/) - This past Wednesday, February 26th, the OpenID Foundation, it’s members and the OpenID Connect Working Group successfully launched the OpenID Connect standard in the US, Europe and Japan. The launch generated press coverage at RSA in San Francisco and the Mobile World Congress in Barcelona. This was made possible by you; our members, contributors. Thanks
- [The OpenID Foundation Launches the OpenID Connect Standard](https://openid.net/the-openid-foundation-launches-the-openid-connect-standard/) - Providing Increased Security, Usability, and Privacy on the Internet RSA 2014 and Mobile World Congress- San Francisco, CA, and Barcelona, Spain – Feb. 26, 2014 – The OpenID Foundation announced today that its membership has ratified the OpenID Connect standard. Organizations and businesses can now use OpenID Connect to develop secure, flexible, and interoperable identity
- [A Great Day for Internet Identity](https://openid.net/a-great-day-for-internet-identity/) - Passwords are a pain. Internet security is difficult. But getting consensus among competing vendors, independent developers, privacy advocates seemed impossible. But OpenID Connect is finally done. This internet identity layer is already helping websites, enterprises and mobile network operators identify people. OpenID Connect enables better privacy controls and stronger (and more user friendly) authentication. Application
- [OpenID Connect Launch: Statements of Support](https://openid.net/openid-connect-launch-statements-of-support/) - Last week I blogged about how we are in the final stretch of launching OpenID Connect on Thursday, February 26, 2014 at RSA in San Francisco, Mobile World Congress in Barcelona and in Tokyo with OpenID Foundation Japan. In that blog, I mentioned some of the industry leaders who have been and will be adopting
- [Vote for Final OpenID Connect Specifications and Implementer’s Drafts is Open](https://openid.net/vote-for-final-openid-connect-specifications-and-implementers-drafts-is-open/) - The vote is closed. Please vote now at https://openid.net/foundation/members/polls/80. The OpenID Connect Working Group recommends approval of the following specifications as Final OpenID Specifications: OpenID Connect Core – Defines the core OpenID Connect functionality: authentication built on top of OAuth 2.0 and the use of Claims to communicate information about the End-User. OpenID Connect
- [14 Day Notice of Vote for Final OpenID Connect Specifications and Implementer’s Drafts](https://openid.net/14-day-notice-of-vote-for-final-openid-connect-specifications-and-implementers-drafts/) - The official voting period will be between Tuesday, February 18 and Tuesday, February 25, 2014, following the 60 day review of the specifications. For the convenience of members, voting will actually open a week before Tuesday, February 18 on Tuesday, February 11 for members who have completed their reviews by then, with the voting period
- [Review of Proposed Final OpenID Connect Specifications and Implementer’s Drafts](https://openid.net/review-of-proposed-final-openid-connect-specifications-and-implementers-drafts/) - The OpenID Connect Working Group recommends approval of the following specifications as Final OpenID Specifications: OpenID Connect Core – Defines the core OpenID Connect functionality: authentication built on top of OAuth 2.0 and the use of Claims to communicate information about the End-User. OpenID Connect Discovery – Defines how Relying Parties dynamically discover information about
- [Microsoft publicly participates in OpenID Connect interoperability testing. | Thread Safe](https://openid.net/microsoft-publicly-participates-in-openid-connect-interoperability-testing-thread-safe/) - While the testing of Windows Azure Active Directory (WAAD) support for OpenID Connect has been going on for some months, Microsoft is now publicly participating in the OSIS interoperability testing. While most people think of Connect as being adopted by Social sites like Google for Login, it is also gaining traction in enterprise
- [Login to Your Salesforce Org with OpenID Connect in Winter ’14](https://openid.net/login-to-your-salesforce-org-with-openid-connect-in-winter-14/) - The Winter ’14 release includes OpenID Connect Authentication Providers, allowing your org to be an OpenID Connect Client, and leverage an Authorization Server for user login. Let’s take a look at how this works: If you want to walk through the protocol in detail, there’s an excellent, detailed description on Google’s Developer site. (Source) http://blogs.developerforce.com/developer-relations/2013/09/login-to-your-salesforce-org-with-openid-connect-in-winter-14.html
- [Second OpenID Connect Implementer’s Drafts Approved](https://openid.net/second-openid-connect-implementers-drafts-approved/) - The OpenID membership has approved the following specifications as OpenID Implementer’s Drafts in the vote held from July 23 and July 30, 2013: Basic Client Profile – Simple, self-contained profile for a Web-based Relying Parties using the OAuth code flow. Implicit Client Profile – Simple, self-contained profile for a Web-based Relying Parties using the OAuth
- [OpenID Connect Server in a Nutshell](https://openid.net/openid-connect-server-in-a-nutshell/) - Nat Sakimura has written a valuable post describing how to write an OpenID Connect server in three simple steps. It shows by example how simple it is for OAuth servers to add OpenID Connect functionality. This post is a companion to his previous post OpenID Connect in a Nutshell, which described how simple it is
- [Vote for Second OpenID Connect Implementer’s Drafts is Open](https://openid.net/vote-for-second-openid-connect-implementers-drafts-is-open/) - Please vote now at https://openid.net/foundation/members/polls/68. The vote is open between July 23 and July 30, 2013. The OpenID Connect Working Group recommends approval of the following specifications as OpenID Implementer’s Drafts: • Basic Client Profile – Simple, self-contained profile for a Web-based Relying Parties using the OAuth code flow. • Implicit Client Profile – Simple,
- [Review of Proposed Second OpenID Connect Implementer’s Drafts](https://openid.net/review-of-proposed-openid-connect-implementers-drafts-2/) - The OpenID Connect Working Group recommends approval of the following specifications as OpenID Implementer’s Drafts: Basic Client Profile – Simple, self-contained profile for a Web-based Relying Parties using the OAuth code flow. Implicit Client Profile – Simple, self-contained profile for a Web-based Relying Parties using the OAuth implicit flow. Messages – Defines the messages that
- [OpenID Connect: Salesforce.com works with OIDF members to transform the future of enterprise identity](https://openid.net/openid-connect-salesforce-com-works-with-oidf-members-to-transform-the-future-of-enterprise-identity/) - Since 1999, salesforce.com has been a driving force in enterprise cloud computing, sparking an “end of software” revolution that is now extending into the world of enterprise identity. At its annual Dreamforce conference last year, the company unveiled Salesforce Identity -- a Cloud Identity and Access Management Platform that provides a single, social, trusted identity
- [OpenID Connect and Account Chooser Deployers' Meeting at IETF 85](https://openid.net/openid-connect-and-account-chooser-deployers-meeting-at-ietf-85/) - People interested in OpenID Connect, Account Chooser, and how they relate to IETF specifications such as OAuth, JSON Web Token (JWT), and JSON Object Signing and Encryption (JOSE) are meeting at IETF #85. We will meet at 1:00 on Sunday, November 4th, and have the room all afternoon. An overview of the specifications and status will be provided
- [Open Source Approach Needed for Advancing Internet Identity](https://openid.net/open-source-approach-needed-for-advancing-internet-identity/) - European-based identity and security analyst firm, KuppingerCole, announced last week that OpenID Connect was awarded the 2012 European Identity and Cloud Award in the category for Best Innovation/New Standard. This recognition was largely based on OpenID Connect’s potential to significantly change digital identity using a simple interoperable Internet identity protocol to improve the way we
- [OpenID Connect Wins 2012 European Identity and Cloud Award](https://openid.net/openid-connect-wins-2012-european-identity-and-cloud-award/) - Today at the European Identity and Cloud Conference it was announced that OpenID Connect has won the 2012 European Identity and Cloud Award for “Best Innovation / New Standard”. The OpenID Foundation and the Connect working group members want to thank Kuppinger Cole for this prestigious award and their vote of confidence in the significance
- [OpenID Connect Implementer’s Drafts Approved](https://openid.net/openid-connect-implementers-drafts-approved/) - The OpenID membership has approved the following specifications as OpenID Implementer’s Drafts in the vote held from February 7th to 15th, 2012: • Basic Client Profile – Simple self-contained specification for a web-based Relying Party. (This spec contains a subset of the information in Messages and Standard.) • Discovery – Defines how user and provider endpoints
- [Vote for OpenID Connect Implementer's Drafts is open](https://openid.net/vote-for-openid-connect-implementers-drafts-are-open/) - Link: https://openid.net/foundation/members/polls/62 The OpenID AB+Connect Working Group recommends approval of the following specifications as OpenID Implementer’s Drafts: • Basic Client Profile – Simple self-contained specification for a web-based Relying Party. (This spec contains a subset of the information in Messages and Standard.) • Discovery – Defines how user and provider endpoints can be dynamically discovered. •
- [OpenID Connect in a Nutshell](https://openid.net/openid-connect-in-a-nutshell/) - Nat Sakimura has written a valuable post describing OpenID Connect in a nutshell. It shows by example how simple it is for relying parties to use basic OpenID Connect functionality. If you’re involved in OpenID Connect in any way, or are considering becoming involved, his post is well worth reading.
- [Review of Proposed OpenID Connect Implementer’s Drafts](https://openid.net/review-of-proposed-openid-connect-implementers-drafts/) - The OpenID AB+Connect Working Group recommends approval of the following specifications as OpenID Implementer’s Drafts: Basic Client Profile – Simple self-contained specification for a web-based Relying Party. (This spec contains a subset of the information in Messages and Standard.) Discovery – Defines how user and provider endpoints can be dynamically discovered. Dynamic Registration – Defines
- [Verizon, Building the Foundation for a Safe, Security Identity Ecosystem](https://openid.net/verizon-building-the-foundation-for-a-safe-security-identity-ecosystem/) - Verizon announced today an important milestone in the Open Identity arena. Verizon announced that it is the first ever identity provider to achieve a Level 3 US Government certification in providing identity credentials and access management to relying parties. The importance of building a standardized framework that protects valuable personal data from Internet security risks
- [Sony’s Weakest Link Hijack](https://openid.net/sonys-weakest-link-hijack/) - Sony announced today that a large number of accounts were hijacked using an attack based on the fact that people reuse passwords across websites. These “weakest link hijackings” are an evolution of the phishing attacks that have become so well known over the last few years. These attacks are referred to as “weakest link hijackings”
- [Internet Identity System Said Readied by Obama](https://openid.net/internet-identity-system-said-readied-by-obama/) - Internet Identity System Said Readied by Obama Administration 2011-01-07 05:00:01.9 GMT By James Sterngold Jan. 7 (Bloomberg) -- The Obama administration plans to announce today plans for an Internet identity system that will limit fraud and streamline online transactions, leading to a surge in Web commerce, officials said. While the White House has spearheaded development
- [Seven sites you didn't know were using OpenID](https://openid.net/another-adoption-update/) - The past twenty days have been a real whirlwind in terms of new sites adopting OpenID for sign in. Some of the larger deployments have made the news (Google and Yahoo! Store), but here are seven others you've likely not heard about. 7-Eleven Australia Slurpee campaign (http://www.slurpee.com.au/) American Cancer Society (http://www.cancer.org/) Dr. Oz (http://members.doctoroz.com/login) Fylde
- [Authenware Joins OpenID Foundation](https://openid.net/authenware-joins-openid-foundation/) - Authenware today announced its membership in the OpenID Foundation – an industry organization aimed at protecting identities and intellectual property through the bolstering online security. Through its membership, Authenware becomes part of a community of IT powerhouses that seeks to collectively build awareness of the emerging digital security pandemic. “The exploitation of security vulnerabilities creates
- [NTT docomo is now an OpenID Provider](https://openid.net/ntt-docomo-is-now-an-openid-provider/) - The largest mobile operator in Japan, NTT docomo, which covers approximately 50% of Japanese population, started offering OpenID authentication on March 9. Every docomo user has an identifier called i-modeID. Using this, users can single sign-on to mobile sites using docomo handsets, making one-click payment and other authenticated actions. These kind of features fueled the
- [Government of Japan started accepting OpenID](https://openid.net/government-of-japan-started-accepting-openid/) - Japanese government opened an OpenID Enabled Policy proposal and discussion site.
- [Open Identity Exchange Launches at RSA](https://openid.net/open-identity-exchange-launches-at-rsa/) - Washington, D.C. and San Francisco — March 3, 2010 — Industry leaders Google, PayPal, Equifax, VeriSign, Verizon, CA, and Booz Allen Hamilton today announced at the RSA Conference 2010 the formation of the Open Identity Exchange (OIX) www.openidentityexchange.org, a non-profit organization dedicated to building trust in the exchange of online identity credentials across public and
- [OpenID UX Summit at Sears Report](https://openid.net/openid-ux-summit-at-sears-report/) - Last Thursday over 60 OpenID advocates met at Sears World Headquarters in Chicago for a full day of discussions on progress to date and future plans for OpenID deployment and utilization. There is a summary of the event on the OpenID Foundation wiki. See Twitter coverage of the event with the hash tag #openidux Who
- [Ping Identity Joins OpenID Foundation Board](https://openid.net/ping-identity-joins-openid-foundation-board/) - Ping Identity®, the leader in Internet Identity Security, today announced it has joined the OpenID Foundation to help develop, promote and extend digital identity and choice on the Web. Pam Dingle, a senior technical architect in Ping Identity’s Office of the CTO, will represent the company on the OpenID Foundation’s board of directors. “The marketplace
- [Mobile Services in Japan begin OpenID experiment](https://openid.net/mobile-services-in-japan-begin-openid-experiment/) - 22 companies including NTT docomo, KDDI, Sony, NEC, etc. have formed "ID Platform Federation Forum". With JPY12 billion (approx. US$1.3M) in funding from the Ministry of Internal Affairs and Communication, the forum members will initiate the experiment, based largely on OpenID, by the end of the year. The forum itself is operated by Nomura Research
- [Payment Working Group started at OpenID Foundation Japan (OIDF-J)](https://openid.net/payment-working-group-started-at-openid-foundation-japan-oidf-j/) - In response to the newly enacted "Fund Transfer and Payment Services Act of Japan", the OpenID Foundation Japan has announced the formation of the "Payment Working Group (WG)" on December 8, 2009. The Payment WG consists of 14 member companies and aims to create whitepapers on ”Guidelines for Secure Management of Information”, “Guidelines for Outsourcing”
- [OpenID Foundation Board Update - Expanded Representation](https://openid.net/openid-foundation-board-update-expanded-representation/) - The voting results are in for the 2010 Board. In addition to a strong group of returning members, we're glad to see four new members who will bring tremendous value and new perspectives. Marc Frons, CTO of the New York Times Daniel Jacobson, Director of Application Development at NPR John Bradley, who has been focused
- [Etelos to Enable OpenID® Across Multiple Business Apps](https://openid.net/etelos-to-enable-openid-across-multiple-business-apps/) - Etelos, Inc. a developer and operator of private-labeled marketplaces for Web-based business applications, announced support for OpenID for user authentication and Single Sign On (SSO) within the Etelos Platform Suite (more)
- [Sears and KMart Adopt OpenID to Simplify Customer Registration and Login While Enhancing the Shopping Experience](https://openid.net/sears-and-kmart-adopt-openid-signin/) - Yesterday, Sears Holding Company (SHC) announced it has adopted OpenID technology, enabling website visitors to easily register and login at the MySears and MyKmart communities using existing accounts at Google, Facebook, MySpace, Twitter, Windows Live, and Yahoo!. This is exciting news for for online retailers and follows shortly after the OpenID Foundation hosted the first
- [An Update on the Retail Advisory Committee and Improving User Experience](https://openid.net/an-update-on-the-retail-advisory-committee-and-improving-user-experience/) - The Retail Advisory Committee Last week representatives from the OpenID Foundation (Google, JanRain, NRI and Yahoo!) led a discussion about third-party authentication and user-centric identity with representatives from several online retailers. Topics included: Business case for OpenID and third-party authentication Best practices for online retailers leveraging OpenID Leveraging rich user data from third party identity
- [PAPE Approved as an OpenID Specification](https://openid.net/pape-approved-as-an-openid-specification/) - The OpenID Foundation membership has approved OpenID Provider Authentication Policy Extension 1.0 as an OpenID specification by a vote of forty-two to three, with seven abstentions. This is a significant development for the OpenID community for two reasons...
- [Member Vote to Approve the PAPE Specification](https://openid.net/member-vote-to-approve-the-pape-specification/) - The 60 day public review of the Provider Authentication Policy Extension (PAPE) Specification draft is complete. No comments were received that the working group believed required changes to the draft specification. Therefore, it is the recommendation of the PAPE working group that the membership approve the draft as an OpenID specification, per the OpenID IPR Procedures.
- [OpenID Foundation Board of Director Nominations Open](https://openid.net/openid-foundation-board-of-director-nominations-open/) - The OpenID Foundation is holding its first election of community board members. All members of the OpenID Foundation are eligible to nominate themselves, second the nominations of others who self-nominated, and vote for candidates. If you're not already a member of the OpenID Foundation, we encourage you to join. Board participation requires a substantial ongoing
- [Barack Obama's Change.gov Adds OpenID Commenting](https://openid.net/barack-obamas-changegov-adds-openid-commenting/) - As first reported by ReadWriteWeb, President-elect Obama's website Change.gov now supports OpenID sign in for commenting on certain blog posts and sections of their site. Change.gov uses Intense Debate to power their comment who recently relaunched with OpenID support. As ReadWriteWeb wrote: Every other major player that has announced support for OpenID has in fact
- [PAPE Specification Review Period Commencing](https://openid.net/pape-specification-review-period-commencing/) - The OpenID Provider Authentication Policy Extension (PAPE) Working Group recommends approval of PAPE Draft 7 as an OpenID Specification. The draft is available at these locations: http://openid.net/specs/openid-provider-authentication-policy-extension-1_0-07.html http://openid.net/specs/openid-provider-authentication-policy-extension-1_0-07.txt This note starts the 60 day public review period for the specification draft in accordance with the OpenID Foundation IPR policies and procedures. This review period
- [The Wall Street Journal Looks at OpenID](https://openid.net/the-wall-street-journal-looks-at-openid/) - Today's Wall Street Journal takes a look at OpenID and how it is being used since it's creation in 2005; asking the question if it could become the solution to so many user names and passwords around the web. While OpenID by itself helps with this problem, it will ultimately be OpenID as a piece
- [Challenges facing OpenID](https://openid.net/challenges-facing-openid/) - Its been an busy week in the world of OpenID. On Friday Ben Laurie announced a security vulnerability around OpenID that relates to existing problems with DNS and certain SSL certificates. Discussions on the OpenID General mailing list have been fruitful and the major OpenID providers out there today have disclosed that they are either
- [MySpace announces support for OpenID](https://openid.net/myspace-announces-support-for-openid/) - On Tuesday of this week, popular social networking site MySpace announced support for OpenID and integration with their Data Availability initiative. MySpace is launching as an OpenID provider to begin with bringing the grand total of OpenID enabled users on the Internet to well over 500 million users. What's interesting to note about this announcement
- [Demand OpenID campaign launched](https://openid.net/demand-openid-campaign-launched/) - The folks over at JanRain have launched demand.openid.net. This is a great little tool that will help users tell the sites they like how much they really want OpenID. It comes complete with a handy-dandy bookmarklet you install in your browser to quickly tell the world about the sites you want OpenID enabled. Great work
- [BBC Joins OpenID Foundation](https://openid.net/british-broadcasting-corp-bbc-joins-openid-foundation/) - This week (April 22, 2008) the BBC Internet Blog informed readers it has become a member of the OpenID Foundation. Naturally this is exciting news and another indication of how OpenID has the clear potential and momentum to provide great value to users everywhere around the globe. BBC is one of, if not indeed, the
- [Thanks TechCrunch for Supporting Us!](https://openid.net/thanks-techcrunch-for-supporting-us/) - Last week PopSugar and TechCrunch hosted a party in Los Angeles and managed to raise an incredible $13,250 to donate to to charity which they've graciously decided to split evenly between the DataPortability.org working group and the OpenID Foundation. We're thrilled by their continuing support of the OpenID community and will use this money to
- [Evolving the OpenID Foundation Board](https://openid.net/evolving-the-openid-foundation-board/) - This morning the OpenID Foundation announced that Google, IBM, Microsoft, VeriSign, and Yahoo! have joined the board. The OpenID Foundation was formed in early 2006 by seven community members with the goal of helping promote, protect and enabling the OpenID technologies and community. Today's announcement marks a milestone in the maturity and impact that the
- [OpenIDDevCamp this Weekend in San Francisco](https://openid.net/openiddevcamp-this-weekend-in-san-francisco/) - This weekend Six Apart will be hosting the first OpenIDDevCamp which is inspired by BarCamp, SuperHappyDevHouse, iPhoneDevCamp and MacHack, to develop web-based applications that use OpenID. It is a non-commercial event, organized by volunteers, with attendance free to all. By the completion of the weekend event we want to OpenID-enable many public web sites as
- [OpenID Intellectual Property Policy Approved](https://openid.net/openid-intellectual-property-policy-approved/) - Its taken us months of effort but I'm happy to announce that the OpenID Foundation has finalized its intellectual property policy and process. During the 12/13/2007 OpenID Foundation board meeting, we approved the IP policy and process documents. The gist of this means that we have a process in place that will help the OpenID
- [Microsoft and Google Both Ship OpenID](https://openid.net/microsoft-and-google-both-ship-openid/) - As a great way to lead into the Internet Identity Workshop this week in Mountain View CA, both Microsoft and Google shipped OpenID features in beta products this past Friday. Microsoft Research announced an experimental Provider while Google announced the ability to comment on Blogger blogs using OpenID. As some backstory, this past February at
- [Provider Asserton Policy Extension - Draft 2](https://openid.net/provider-asserton-policy-extension-draft-2/) - We’ve just published Draft 2 of the OpenID Provider Assertion Policy Extension which replaces Draft 1 from July of this year. This draft adds clarifications to the spec and builds on implementation experiences from JanRain, Sxip, and VeriSign. The main goal of PAPE is to allow OpenID Relying Parties the ability to request and be
- [Welcome to the new OpenID Site!](https://openid.net/welcome-to-the-new-openid-site/) - Scott Kveton and I have spent today out in the sunny Tulsa, Oklahoma offices of Vidoop working with their team on a gigantic update to OpenID.net. As you can see, we've touched just about every part of the site. The theme is upgraded, content reorganized and rewritten, no longer using a theme system from before

## Pages

- [OpenID](https://openid.net/) - Our mission is to lead the global community in creating digital identity standards that are secure, interoperable, and privacy-preserving.
- [Naming and Contents of Specifications](https://openid.net/wg/resources/naming-and-contents-of-specifications/) - OpenID Working Group specifications use the following naming conventions: The title line of a draft contains the draft title, a specification version number (typically 1.0), and a draft number, for example "OpenID Federation 1.0 - draft 32". The filenames for a draft specification in source code repositories incorporate the title and version but not the
- [OpenID Foundation Contribution Agreements](https://openid.net/intellectual-property/openid-foundation-contribution-agreements/) - To ensure that OpenID Foundation community develops specifications that are freely implementable, the Foundation requires all contributors to sign its standard form Contribution Agreement.
- [Presentations & Media](https://openid.net/presentations-media/) - Links to OpenID Foundation presentations and recordings from industry events and workshops.
- [Artificial Intelligence Identity Management - Participation Agreements](https://openid.net/cg/artificial-intelligence-identity-management-community-group/artificial-intelligence-identity-management-participation-agreements/) - Artificial Intelligence Identity Management Community Group This CG provides a safe space to assess use cases, modularization (role, scope, outcomes), existing and emerging AI architectures, progress CG and whitepaper recommendations, develop liaisons, and mature other AI community partners as appropriate. AI Identity ManagementOVERVIEW AI Identity ManagementPARTICIPATION AGREEMENTS The Artificial Intelligence Identity Management Community Group is
- [How to Run Conformance Tests for OpenID for Verifiable Presentations](https://openid.net/certification/conformance-testing-for-openid-for-verifiable-presentations/) - How to Run Conformance Tests for OpenID for Verifiable Presentations OpenID Foundation is currently developing tests for checking that wallets and verifiers correctly & securely implement the OpenID for Verifiable Presentation specification (and, later, will create tests for OpenID for Verifiable Credential Issuance). We have tests for: https://openid.net/specs/openid-4-verifiable-presentations-1_0.html – 1.0 Final https://openid.net/specs/openid-4-verifiable-presentations-1_0-ID2.html (as used in ISO mDL
- [Foundation Leadership](https://openid.net/foundation/leadership/) - OpenID Foundation Leadership as well as Certification Team
- [Australian Digital Trust - Participation Agreements](https://openid.net/cg/australian-digital-trust-community-group/participation-agreements/) - Australian Digital Trust Community Group The Australian Digital Trust Community Group has been established to enable members of the Australian community to collaborate on identity topics. Australian Digital TrustOVERVIEW Australian Digital TrustREPOSITORY Australian Digital TrustPARTICIPATION AGREEMENTS The Australian Digital Trust Community Group is open to the public, including organizations and individuals. If you are interested
- [Sponsoring Members](https://openid.net/foundation/sponsoring-members/) - Sponsoring Members OpenID Foundation members include leading companies and individuals in the digital identity industry. Our sponsor members are critical contributors to the success of our mission through funding and the active participation of their employees and affiliates. Working together, we develop specifications and champion the application and adoption of OpenID worldwide. Sustaining Corporate Members
- [Certified OpenID Connect Implementations](https://openid.net/developers/certified-openid-connect-implementations/) - Certified OpenID Connect Implementations The following OpenID Connect Implementations have attained OpenID Certification for one or more certification profiles, including an authentication profile. Their certifications are listed here. Featured Certified OpenID Implementations for Developers Certified Relying Party Libraries C mod_auth_openidc 2.4.12.2 OpenID Connect Relying Party for Apache HTTPd 2.x Target Environment: Apache HTTPd Server module
- [Board of Directors](https://openid.net/foundation/board/) - Officers & Community Board Members as well as Corporate Board Members
- [Shared Signals Working Group](https://openid.net/wg/sharedsignals/) - The Shared Signals working group is providing data sharing schemas, privacy recommendations and protocols to share security event information to thwart attackers from leveraging compromised accounts from one Service Provider to gain access to accounts on other Service Providers and enable users and providers to coordinate to securely restore accounts following a compromise
- [DADE - Participation Agreements](https://openid.net/cg/death-and-the-digital-estate/dade-participation-agreements/) - Death and the Digital Estate (DADE) Community Group The Death and the Digital Estate Community Group (DADE CG) enables interested parties to develop the use cases that support an individual’s right to choose what happens to their digital data upon their death or disablement. Death and the Digital EstateOVERVIEW Death and the Digital EstateREPOSITORY Death
- [GAIN POC](https://openid.net/cg/gain-poc/) - More than 150 co-authors released the GAIN Digital Trust whitepaper which called for the creation of a globally interoperable network for high-trust identity assurance.
- [Guidelines and Policies](https://openid.net/policies/) - Organizational Documents and Policies This page contains all OpenID Foundation organizational documents, policies and processes. Organizational Documents OpenID Foundation Articles of Incorporation OpenID Foundation Bylaws Antitrust Policy The OpenID Foundation (OIDF) Antitrust Policy, and any applicable U.S. and international antitrust and competition law, governs the conduct of all attendees and participants in all OIDF-sponsored activities,
- [HEART Working Group - Specifications](https://openid.net/wg/heart/specifications/) - The HEART working group intends to harmonize and develop a set of privacy and security specifications that enable an individual to control the authorization of access to RESTful health-related data sharing APIs, and to facilitate interoperable implementations of these specifications by others.
- [HEART Working Group](https://openid.net/wg/heart/) - The HEART working group intends to harmonize and develop a set of privacy and security specifications that enable an individual to control the authorization of access to RESTful health-related data sharing APIs, and to facilitate interoperable implementations of these specifications by others.
- [FastFed Working Group - Specifications](https://openid.net/wg/fastfed/specifications/) - The purpose of this Working Group is to develop a meta-data document specification, APIs, and workflow to enable an administrator to federate an identity provider and a hosted application that supports one or more of OpenID Connect, SAML, and SCIM and enable configuration changes to be communicated between the identity provider and hosted application.
- [EAP Working Group](https://openid.net/wg/eap/) - The EAP working group is developing a security and privacy profile of the OpenID Connect specifications to enable users to authenticate to OpenID Providers using strong authentication specifications. The resulting profile will enable use of IETF Token Binding specifications with OpenID Connect and integration with FIDO relying parties and other strong authentication technologies.
- [FastFed Working Group](https://openid.net/wg/fastfed/) - The purpose of this Working Group is to develop a meta-data document specification, APIs, and workflow to enable an administrator to federate an identity provider and a hosted application that supports one or more of OpenID Connect, SAML, and SCIM and enable configuration changes to be communicated between the identity provider and hosted application.
- [EAP Working Group - Specifications](https://openid.net/wg/eap/specifications/) - The EAP working group is developing a security and privacy profile of the OpenID Connect specifications to enable users to authenticate to OpenID Providers using strong authentication specifications. The resulting profile will enable use of IETF Token Binding specifications with OpenID Connect and integration with FIDO relying parties and other strong authentication technologies.
- [Community Groups](https://openid.net/cg/) - Community Groups invite interested parties to collaborate on a specific proof-of-concept or industry challenge.
- [Archived Groups](https://openid.net/wg/archived-groups/) - Working Groups that have fulfilled their original charter or otherwise retired.
- [Working Groups](https://openid.net/wg/) - Work Groups are focused on a specific problem, technology, or opportunity. Members work to deliver a specification or profile according to a charter.
- [Calendar](https://openid.net/calendar/) - Integrated Calendar for all Foundation related events, summits and workshops as well as standing Working Group and Community Group meetings.
- [Certification](https://openid.net/certification/) - OpenID Certification The OpenID Foundation enables deployments of OpenID Connect and FAPI to be certified to specific conformance profiles to promote interoperability among implementations. The OpenID Foundation’s certification process utilizes self-certification and conformance test suites developed by the Foundation. Certified implementations can use the “OpenID Certified” certification mark. Learn more about the OpenID Certification program: How
- [Digital Credentials Protocols (DCP) Working Group - Specifications](https://openid.net/wg/digital-credentials-protocols/specifications/) - Digital Credentials Protocols (DCP) Working Group – Specifications The goal of the Digital Credentials Protocols (DCP) working group is to develop OpenID specifications for the Issuer-Holder-Verifier-Model use-cases to enable issuance and presentations of the Digital Credentials of any format (W3C VCs, IETF SD-JWT VCs, ISO/IEC 18013-5, etc.) and pseudonymous authentication from the End-User to the
- [Ecosystem Support - Participation Agreements](https://openid.net/cg/ecosystem-support-community-group/ecosystem-support-participation-agreements/) - Ecosystem Support Community Group Coming Soon Ecosystem SupportOVERVIEW Ecosystem SupportREPOSITORY Ecosystem SupportPARTICIPATION AGREEMENTS The Ecosystem Support Community Group is open to the public including organizations and individuals. If you are interested in participating, please sign the Participation Agreement via DocuSign. A hard copy of the Participation Agreement can be found here if digital signature does not
- [Conformance Testing for OpenID Federation](https://openid.net/certification/federation_testing/) - Conformance Testing for OpenID Federation This page describes how to run the conformance tests for OpenID Federation entities. At the time of writing, the set of tests currently available in production are in an early stage and mostly concerned with metadata validation. Do not hesitate to register issues in the conformance suite project if you’re
- [Ecosystem Support Community Group](https://openid.net/cg/ecosystem-support-community-group/) - Ecosystem Support Community Group The Ecosystem Support Community Group is dedicated to supporting new Open Data ecosystems as they implement and profile OIDF standards. The CG is developing an Open Banking Reference Technical Architecture and Best Practices document (see version 0.1). Ecosystem SupportOVERVIEW Ecosystem SupportREPOSITORY Ecosystem SupportPARTICIPATION AGREEMENTS What is the Ecosystem Support Community Group
- [Digital Credentials Protocols (DCP) Working Group](https://openid.net/wg/digital-credentials-protocols/) - Digital Credentials Protocols (DCP) Working Group – Overview The goal of the Digital Credentials Protocols (DCP) working group is to develop OpenID specifications for the Issuer-Holder-Verifier-Model use-cases to enable issuance and presentations of the Digital Credentials of any format (W3C VCs, IETF SD-JWT VCs, ISO/IEC 18013-5, etc.) and pseudonymous authentication from the End-User to
- [Certification](https://openid.net/certification-3/) - OpenID Certification The OpenID Foundation enables deployments of OpenID Connect and FAPI to be certified to specific conformance profiles to promote interoperability among implementations. The OpenID Foundation’s certification process utilizes self-certification and conformance test suites developed by the Foundation. Certified implementations can use the “OpenID Certified” certification mark. Learn more about the OpenID Certification program: How
- [OpenID for Verifiable Credentials - Specifications](https://openid.net/sg/openid4vc/specifications/) - OpenID for Verifiable Credentials (OID4VC) consists of the specifications listed hereafter.
- [Explore All Specifications](https://openid.net/developers/specs/) - What are OpenID Specifications OpenID specifications are developed by working groups in three phases: Drafts, Implementer’s Drafts, and Final Specifications. Implementer’s Drafts and Final Specifications provide intellectual property protections to implementers. Final Specifications are OpenID Foundation standards. Final Specifications FAPI working group specifications FAPI 2.0 Security Profile – A secured OAuth profile that aims to provide specific
- [Death and the Digital Estate Community Group](https://openid.net/cg/death-and-the-digital-estate/) - The proposed DADE CG will develop the use cases to support an individual’s right to choose what happens to their digital data upon their death or disablement.
- [Australian Digital Trust Community Group](https://openid.net/cg/australian-digital-trust-community-group/) - Australian Digital Trust Community Group The Australian Digital Trust Community Group has been established to enable members of the Australian community to collaborate on identity topics. Australian Digital TrustOVERVIEW Australian Digital TrustREPOSITORY Australian Digital TrustPARTICIPATION AGREEMENTS What is the Australian Digital Trust Community Group The Australian Digital Trust Community Group (ADT CG) fosters cooperation among
- [Artificial Intelligence Identity Management Community Group](https://openid.net/cg/artificial-intelligence-identity-management-community-group/) - Artificial Intelligence Identity Management Community Group This CG provides a safe space to assess use cases, modularization (role, scope, outcomes), existing and emerging AI architectures, progress CG and whitepaper recommendations, develop liaisons, and mature other AI community partners as appropriate. AI Identity ManagementOVERVIEW AI Identity ManagementREPOSITORY AI Identity ManagementPARTICIPATION AGREEMENTS What is the Artificial Intelligence
- [FAPI Working Group](https://openid.net/wg/fapi/) - The FAPI working group provides JSON data schemas, security and privacy recommendations and protocols to enable applications to utilize the data stored in a financial account, to enable applications to interact with a financial account, and enable users to control the security and privacy settings.
- [AuthZEN Working Group](https://openid.net/wg/authzen/) - AuthZEN Working Group – Overview AuthZEN will focus on specific areas of interoperability by documenting common authorization patterns, define standard mechanisms, protocols and formats for communication between authorization components, and recommend best practices for developing secure applications. AuthZEN Working GroupOVERVIEW AuthZEN Working GroupCHARTER AuthZEN Working Group SPECIFICATIONS AuthZEN Working GroupREPOSITORY What is theAuthZEN Working Group?
- [Conformance Testing for FAPI 2 and FAPI1 Advanced-Final OPs](https://openid.net/certification/certification-fapi_op_testing/) - Conformance Testing for FAPI 2 and FAPI1 Advanced-Final OPs Supported FAPI specifications The OpenID Foundation currently supports certification for two different versions of the FAPI specifications: FAPI 1.0 Part 2 Advanced Final, as published March 2021. FAPI 2.0 Security Profile Final FAPI 2.0 Security Profile Implementer Draft 2 FAPI 2.0 Message Signing Implementers Draft 1
- [How to submit your certification request](https://openid.net/how-to-submit-your-certification-request/) - Steps for the Conformance Certification process The certification process consists of three main parts: Completing the tests and publishing the results. Important information for RP certifications Paying the certification fee and obtaining a payment code. Filling out a form with the certification information, and signing the self-declaration document. This document goes through these steps in
- [How to Certify Your Implementation](https://openid.net/how-to-certify-your-implementation/) - OpenID Certification Instructions These resources are available to those considering or seeking certification. Resources for All Certifications OpenID Certification Frequently Asked Questions (FAQ) OpenID Certification Terms and Conditions OpenID Certification of Conformance (docx) (PDF) OpenID Certification Fee Schedule and Certification Payment page OpenID Certified Mark About the conformance suite How to get certified: Steps for
- [AB/Connect Working Group - Repositories](https://openid.net/wg/connect/repositories/) - AB/Connect Working Group – Repositories OVERVIEW AB/Connect Working GroupCHARTER AB/Connect Working GroupSPECIFICATIONS AB/Connect Working GroupREPOSITORIES The working group uses the following specification repositories and corresponding Editor’s Drafts rendered in HTML: Repositories OpenID Connect Bitbucket Repository OpenID Federation Repository OpenID Federation Extended Subordinate Listing Repository OpenID Federation Wallet Profile Repository OpenID Connect RP Metadata Choices Repository
- [AB/Connect Working Group - Specifications](https://openid.net/wg/connect/specifications/) - The AB/Connect working group is a combined working group of the Artifact Binding (AB) Working Group and the Connect Working Group aimed at producing the OAuth 2.0 based “OpenID Connect” specifications. It also includes a project named OpenID for Verifiable Credentials which consists of three specifications.
- [Working Group Resources](https://openid.net/wg/resources/) - This page references resources useful to working groups, such as documentation about the specification development process.Naming and Contents of SpecificationsPublishing SpecificationsDemonstration of the Specification Publishing ToolApproving SpecificationsSpecification Process Diagrams (PowerPoint)OpenID Foundation Website User ManualOIDF Groups, Activities & Events Note Well slidesPDFPPT
- [Specs Council](https://openid.net/specs-council/) - Specs Council Specs council is the body defined in the Section 4.2 of OpenID Process Document. Its mandate is to review the proposed charter for a new or modified working group and advise the board on recommending it or to reject it based on the following reasons: (a) an incomplete Proposal (i.e., failure to comply
- [IPSIE Working Group](https://openid.net/wg/ipsie/) - The Interoperability Profiling for Secure Identity in the Enterprise (IPSIE) WG develops interoperability and security profiles of existing specifications.
- [Uncertified OpenID Connect Implementations](https://openid.net/developers/uncertified-openid-connect-implementations/) - Uncertified OpenID Connect Implementations Below is a list of OpenID Connect implementations that have not attained OpenID Certification. While several of these implementations have been tested, they are maintained by members of the OpenID community or vendors and are not necessarily known to work. Please review the documentation and test your own implementation thoroughly before
- [Conformance Testing for OpenID for Verifiable Credential Issuance](https://openid.net/certification/conformance-testing-for-openid-for-verifiable-credential-issuance/) - Conformance Testing for OpenID for Verifiable Credential Issuance This page describes how to run conformance tests and gather testing results for the OpenID for Verifiable Credential Issuance specification. Instructions for Running Tests The tests are under active development, please see the google document for information and instructions on running them. About the Conformance Suite For more
- [GAIN - Participation Agreements](https://openid.net/cg/gain-poc/participation-agreements/) - Enrollment in the POC is open to the public including organizations and individuals. If you are interested in becoming a member of the POC, please complete the registration form and sign the Participation Agreement.
- [eKYC & IDA Working Group - Charter](https://openid.net/wg/ekyc-ida/charter/) - The eKYC and Identity Assurance (eKYC & IDA) WG is developing extensions to OpenID Connect that will standardise the communication of assured identity information, i.e. verified claims and information about how the verification was done and how the respective claims are maintained.
- [Publishing Specifications](https://openid.net/wg/resources/publishing-specifications/) - Working groups publish specifications as follows:Working groups use source code repositories to hold their specification sources. These repositories are currently either under bitbucket.org/openid/ or github.com/openid/.Specification sources are typically either XML, which is compiled with xml2rfc, or Markdown, which is complied with a variety of different toolchains.HTML and optionally .txt versions of the specifications are complied
- [AuthZEN - Specifications](https://openid.net/wg/authzen/specifications/) - AuthZEN Working Group – Specifications AuthZEN will focus on specific areas of interoperability by documenting common authorization patterns, define standard mechanisms, protocols and formats for communication between authorization components, and recommend best practices for developing secure applications. AuthZEN Working GroupOVERVIEW AuthZEN Working GroupCHARTER AuthZEN Working GroupSPECIFICATIONS AuthZEN Working GroupREPOSITORY Final Specifications None yet. Implementer’s Drafts
- [Submission of Results for OP Certification](https://openid.net/certification/op_submission/) - Submission of Results for OP Certification This page describes how to submit completed conformance testing results to the OpenID Foundation to request OpenID Certifications. Before submission, first all tests must be successfully passed for the desired conformance profiles and testing results gathered, as described in the instructions. All tests MUST be in the ‘FINISHED’ status.
- [Submission of Results for OP Certification](https://openid.net/certification/fapi_op_submission/) - Submission of Results for OP Certification This page describes how to submit completed conformance testing results to the OpenID Foundation to request OpenID Certifications. Before submission, first all tests must be successfully passed for the desired conformance profiles and testing results gathered, as described in the instructions. All tests MUST be in the ‘FINISHED’ status.
- [Submission of Results for FAPI Read/Write RPs](https://openid.net/certification/fapi_rp_submission/) - Submission of Results for FAPI RPs This page describes how to submit completed FAPI-RW, FAPI 1 Advanced Final and FAPI 2 RP conformance testing results to the OpenID Foundation to request OpenID Certifications. Before submission, first all tests must be successfully passed for the desired conformance profiles and testing results gathered, as described in the
- [Submission of Certification Results for OpenID Connect RPs](https://openid.net/certification/connect_rp_submission/) - Submission of Certification Results for OpenID Connect RPs This page describes how to submit completed RP conformance testing results to the OpenID Foundation to request OpenID Connect certifications. Before submission, first all tests must be successfully passed for the desired conformance profiles and testing results gathered, as described in the RP Testing Instructions. All tests
- [Australian ConnectID: FAPI RP Payment Instructions](https://openid.net/certification/australian-connectid-fapi-rp-payment-instructions/) - Australian ConnectID: FAPI RP Payment Instructions If you received a coupon code from ConnectID for FAPI RP certification, please follow the instructions below to redeem coupon: Start at the certification payment page: https://openid.net/foundation/members/certifications/new. Enter the unique code in Step 1 and complete the rest of the details. The RP will then be presented with a $0 certification
- [eKYC & IDA Working Group - Specifications](https://openid.net/wg/ekyc-ida/specifications/) - The eKYC and Identity Assurance (eKYC & IDA) WG is developing extensions to OpenID Connect that will standardise the communication of assured identity information, i.e. verified claims and information about how the verification was done and how the respective claims are maintained.
- [Events](https://openid.net/events/) - Events OpenID Foundation Workshops provide insight and influence on important Internet identity standards. The workshops provide updates on the work happening within OpenID Foundation working groups as well as updates on the OpenID Certification Program. Leading technologists from member organizations and others provide updates on key issues and discuss how they help meet social, enterprise and
- [News List](https://openid.net/news/) - Latest News Current news about the OpenID Foundation and the community at large. Please visit the News Archive to view news older than two years.
- [FAPI Working Group - Specifications](https://openid.net/wg/fapi/specifications/) - The FAPI working group provides JSON data schemas, security and privacy recommendations and protocols to enable applications to utilize the data stored in a financial account, to enable applications to interact with a financial account, and enable users to control the security and privacy settings.
- [Digital Credentials Protocols (DCP) Working Group - Repository](https://openid.net/wg/digital-credentials-protocols/digital-credentials-protocols-dcp-working-group-repository2/) - Repositories and Open Source libraries supporting the Digital Credentials Protocols Working Group.
- [OpenID for Verifiable Credentials](https://openid.net/sg/openid4vc/) - OpenID4VC empowers End-Users to directly present identity information to Verifiers.
- [Program Rules: 2025 CAEP Interop at Gartner IAM Summit in London](https://openid.net/wg/sharedsignals/program-rules-2025-caep-interop/) - OpenID Foundation hosted CAEP interoperability sessions at Gartner IAM in 2024. These are the program rules for the 2025 interop in London.
- [MODRNA Working Group - Specifications](https://openid.net/wg/modrna/specifications/) - The MODRNA working group is developing a profile of OpenID Connect designed for use by mobile network operators (MNOs) providing identity services to relying parties (RPs) and for RPs in consuming these services in an interoperable manner.
- [Digital Credentials Protocols (DCP) Working Group - Repository](https://openid.net/wg/digital-credentials-protocols/repository/) - Digital Credentials Protocols (DCP) Working Group – Repository The goal of the Digital Credentials Protocols (DCP) working group is to develop OpenID specifications for the Issuer-Holder-Verifier-Model use-cases to enable issuance and presentations of the Digital Credentials of any format (W3C VCs, IETF SD-JWT VCs, ISO/IEC 18013-5, etc.) and pseudonymous authentication from the End-User to the
- [Security Disclosures](https://openid.net/security-disclosures/) - Security Disclosures This page is updated whenever the OpenID Foundation or its partners identify a security risk. This includes academic partners who have been commissioned to perform rigorous testing and analysis. The OpenID Foundation is not aware of any actual compromises based on the possible attack vector on this list. OIDF Responsible Disclosure Notice on
- [eKYC & IDA Working Group](https://openid.net/wg/ekyc-ida/) - The eKYC and Identity Assurance (eKYC & IDA) WG is developing extensions to OpenID Connect that will standardise the communication of assured identity information, i.e. verified claims and information about how the verification was done and how the respective claims are maintained.
- [News Archive](https://openid.net/news-archive/) - News Archive Repository of all Foundation news older than two years. For the most current news, please visit the News page. 2024 News 2023 News 2022 News 2021 News 2020 News 2019 News 2018 News 2017 News 2016 News 2015 News 2014 News 2013 News 2012 News 2011 News 2010 News 2009 News 2008 News
- [AB/Connect Working Group - Charter](https://openid.net/wg/connect/charter/) - The AB/Connect working group is a combined working group of the Artifact Binding (AB) Working Group and the Connect Working Group aimed at producing the OAuth 2.0 based “OpenID Connect” specifications. It also includes a project named OpenID for Verifiable Credentials which consists of three specifications.
- [AB/Connect Working Group](https://openid.net/wg/connect/) - The AB/Connect working group is a combined working group of the Artifact Binding (AB) Working Group and the Connect Working Group aimed at producing the OAuth 2.0 based “OpenID Connect” specifications. It also includes a project named OpenID for Verifiable Credentials which consists of three specifications.
- [Shared Signals Working Group - Specifications](https://openid.net/wg/sharedsignals/specifications/) - The Shared Signals working group is providing data sharing schemas, privacy recommendations and protocols to share security event information to thwart attackers from leveraging compromised accounts from one Service Provider to gain access to accounts on other Service Providers and enable users and providers to coordinate to securely restore accounts following a compromise
- [Software Grant and Contribution License Agreements](https://openid.net/intellectual-property/contribution-license-agreement/) - Software Grant and Contribution License Agreements To clarify the intellectual property license granted with Contributions from any person or entity, the OpenID Foundation (“OIDF) must have a Software Grant and Contribution License Agreement (CLA) on file that has been signed by each Contributor, indicating agreement to the license terms. This license is for your protection
- [FAPI OP Conformance Testing & Certification Submission Overview for Open Banking Brazil](https://openid.net/fapi-op-conformance-testing-certification-submission-overview-for-open-banking-brazil/) - FAPI OP Conformance Testing & Certification Submission Overview for Open Banking Brazil INSTRUCTIONS STEP 1 The first step is to pay for FAPI certification fees: https://openid.net/certification/fees/ Some Open Banking Brazil organizations have chosen to pay certification fees via OpenFinance Brasil, and others pay the OpenID Foundation directly. If your organization has paid via OpenFinance Brasil, there
- [Sign Up](https://openid.net/sign-up/) - Step 1: OpenID and Membership Type Membership Type Contact Information Legal Agreements Membership Dues Your preferred OpenID Sign-In We’ll use this OpenID for your login and identifying you to other members. If you need an OpenID, peruse our listing of providers. Membership Type Individual $50 This is the membership for you if you want to
- [Membership​](https://openid.net/foundation/membership/) - OpenID Foundation Membership The OpenID Foundation (OIDF) was formed in June 2007 to help promote, protect and enable the OpenID technologies and community. This entails managing intellectual property, brand marks as well as fostering viral growth and global participation in the proliferation of OpenID. The OIDF does not dictate the technical direction of OpenID; instead it will
- [Dashboard](https://openid.net/foundation/dashboard/) - Dashboard Join aWorking Group Join and participate in a technical Working Group Join aWorking Group Join and participate in a technical Working Group EAP Working Group Enhanced Authentication Security and Privacy Profile for OpenID Providers… EAP Working Group Enhanced Authentication Security and Privacy Profile for OpenID Providers… eKYC and IDA Working Group Electronic Know Your
- [Join the OpenID Foundation](https://openid.net/foundation/benefits-members/) - Join the OpenID Foundation Membership Membership is affordable and designed to be inclusive of individuals, non-profits, government entities, and organizations of all sizes and types who collectively share an interest in the vision and mission of the OpenID Foundation. The OpenID Foundation Member Agreement for review. You are encouraged to join the Foundation using the
- [AuthZEN - Charter](https://openid.net/wg/authzen/charter/) - AuthZEN Working Group – Charter AuthZEN will focus on specific areas of interoperability by documenting common authorization patterns, define standard mechanisms, protocols and formats for communication between authorization components, and recommend best practices for developing secure applications. AuthZEN Working GroupOVERVIEW AuthZEN Working GroupCHARTER AuthZEN Working GroupSPECIFICATIONS AuthZEN Working GroupREPOSITORY AuthZEN Working Group Charter 1) Working
- [FAPI Working Group - Charter](https://openid.net/wg/fapi/charter/) - The FAPI working group provides JSON data schemas, security and privacy recommendations and protocols to enable applications to utilize the data stored in a financial account, to enable applications to interact with a financial account, and enable users to control the security and privacy settings.
- [IPSIE - Charter](https://openid.net/wg/ipsie/ipsie-charter/) - IPSIE develops interoperability and security profiles of existing specifications that enable secure identity management within the enterprise.
- [OpenID Federation Implementations](https://openid.net/developers/openid-federation-implementations/) - OpenID Federation Implementations These OpenID Federation implementations are listed by programming language, followed by a list of products C# spid-cie-oidc-aspnetcore SPID/CIE OIDC Federation SDK for AspNetCore License: Apache 2.0 Go go-oidfed Go implementation of OpenID Federation – Work in Progress License: MIT Java Nimbus OAuth 2.0 SDK with OpenID Connect extensions OpenID Federation core functionality, including
- [JWT, JWS, JWE, JWK, and JWA Implementations](https://openid.net/developers/jwt-jws-jwe-jwk-and-jwa-implementations/) - JWT, JWS, JWE, JWK, and JWA Implementations OpenID Connect uses the JSON Web Token (JWT) and JSON Object Signing and Encryption (JOSE) specifications. Libraries implementing JWT and the JOSE specs JWS, JWE, JWK, and JWA are listed here. C/C++ cjose C JOSE library License: MIT Supports: JWS, JWE, and JWK Target Environment: C/C++ C# JsonWebToken
- [iGov Working Group](https://openid.net/wg/igov/) - The iGov working group is developing a security and privacy profile of the OpenID Connect specifications to enable users to authenticate and share consented attribute information with public sector services across the globe. The resulting profile will enable standardized integration with public sector relying parties in multiple jurisdictions, including identity broker implementations.
- [Approving Specifications](https://openid.net/wg/resources/approving-specifications/) - Here's a draft diagram of the specification approval process:Draft working group specifications can be approved as Implementer's Drafts, Final Specifications, or Final Specifications incorporating Errata corrections by the OpenID Foundation members. These approvals convey IPR protections to implementers. The steps for these approvals are:Obtain working group consensus to propose foundation-wide approval of the draft specification.
- [OpenID Certification Fee Schedule](https://openid.net/certification/fees/) - This OpenID Connect Certification Fee Schedule page is designed to assist in understanding the associated fees for OpenID Certification by members and non-members.
- [What is Self-Certification (FAQ)](https://openid.net/what-is-self-certification-faq/) - What is Self-Certification Self-certification is a formal declaration by an entity that its identified deployment of a product or service conforms to a specific conformance profile of the OpenID Connect protocol. Why are the benefits of certification? Entities looking to use or rely on a deployment of a product or service that implements a specific
- [OpenID Conformance Suite](https://openid.net/certification/about-conformance-suite/) - About the Conformance Suite The conformance suite is an open source project run by the OpenID Foundation, the source code can be found on gitlab: https://gitlab.com/openid/conformance-suite/. There is no cost to utilize the conformance suite to test OpenID deployments and is available for all to utilize at any time. A fee is required for OpenID
- [Foundation](https://openid.net/foundation/) - About OpenID The OpenID Foundation’s vision is to help people assert their identity wherever they choose. And our mission is to lead the global community in creating identity standards that are secure, interoperable, and privacy-preserving. Founded in 2007, the OpenID Foundation (OIDF) is a non-profit open standards body developing identity and security specifications that serve
- [Calendar of OpenID Foundation Meetings](https://openid.net/foundation/calendar-of-events/) - Integrated Calendar for all Foundation related events, summits and workshops as well as standing Working Group and Community Group meetings.
- [Papers List](https://openid.net/papers/) - Latest Papers The latest whitepapers published by the OpenID Foundation or co-branded by the OpenID Foundation. For more information on the whitepaper process and approach, refer to the Whitepaper Process document.
- [MODRNA Working Group](https://openid.net/wg/modrna/) - The MODRNA working group is developing a profile of OpenID Connect designed for use by mobile network operators (MNOs) providing identity services to relying parties (RPs) and for RPs in consuming these services in an interoperable manner.
- [Digital Credentials Protocols (DCP) Working Group - Charter](https://openid.net/wg/digital-credentials-protocols/charter/) - Digital Credentials Protocols (DCP) Working Group – Charter The goal of the Digital Credentials Protocols (DCP) working group is to develop OpenID specifications for the Issuer-Holder-Verifier-Model use-cases to enable issuance and presentations of the Digital Credentials of any format (W3C VCs, IETF SD-JWT VCs, ISO/IEC 18013-5, etc.) and pseudonymous authentication from the End-User to the
- [Conformance Testing for OpenID Connect OPs](https://openid.net/certification/connect_op_testing/) - Conformance Testing for OpenID Connect OPs This page describes how to run conformance tests and gather testing results for OpenID Providers (OPs). These instructions are for the new Java-based system (the previous python system used for OpenID Connect certifications was retired in August 2020, as described at Migration of OpenID Connect Certification Software.). Available Certification
- [R&D Working Group - Specifications](https://openid.net/wg/rande/specifications/) - The R&E working group is creating a set of profiles for the OpenID Connect specifications to ease adoption in the Research and Education (R&E) sector. The profiles will include current international standards to represent users that belong to R&E institutions and the existing international trust fabric based on R&E identity federations and multi-lateral trust exchange.
- [R&E Working Group](https://openid.net/wg/rande/) - The R&E working group is creating a set of profiles for the OpenID Connect specifications to ease adoption in the Research and Education (R&E) sector. The profiles will include current international standards to represent users that belong to R&E institutions and the existing international trust fabric based on R&E identity federations and multi-lateral trust exchange.
- [iGov Working Group - Specifications](https://openid.net/wg/igov/specifications/) - The iGov working group is developing a security and privacy profile of the OpenID Connect specifications to enable users to authenticate and share consented attribute information with public sector services across the globe. The resulting profile will enable standardized integration with public sector relying parties in multiple jurisdictions, including identity broker implementations.
- [Shared Signals Working Group - Charter](https://openid.net/wg/sharedsignals/charter/) - The Shared Signals working group is providing data sharing schemas, privacy recommendations and protocols to share security event information to thwart attackers from leveraging compromised accounts from one Service Provider to gain access to accounts on other Service Providers and enable users and providers to coordinate to securely restore accounts following a compromise
- [Libraries for Obsolete Specifications](https://openid.net/developers/libraries-for-obsolete-specifications/) - Libraries for Obsolete Specifications This page lists libraries for OpenID 2.0 – a now obsolete specification. OpenID 2.0 has been superseded by OpenID Connect. The Librariespage lists libraries for current OpenID specifications. We have setup a code repository for gathering libraries and other supporting examples. While several of these libraries have been tested, they are
- [How OpenID Connect Works](https://openid.net/developers/how-connect-works/) - What is OpenID Connect OpenID Connect is an interoperable authentication protocol based on the OAuth 2.0 framework of specifications (IETF RFC 6749 and 6750). It simplifies the way to verify the identity of users based on the authentication performed by an Authorization Server and to obtain user profile information in an interoperable and REST-like manner.
- [OpenID for Verifiable Credentials - Libraries](https://openid.net/sg/openid4vc/libraries/) - A list of Open Source Libraries for the OID4VC specifications.
- [Third-Party Support Certification Policy](https://openid.net/certification/third-party-support-certification-policy/) - Third-Party Support Certification Policy Third-Party Support Certification Policy and Available Consultants. The OpenID Foundation operates the certification program utilizing a self-certification approach to provide a low cost, efficient process to provide assurance of compliance with profiles of OpenID specifications. PURPOSE The OpenID Foundation operates the certification program utilizing a self-certification approach to provide a low
- [Submission of Results for OPs](https://openid.net/certification/submission/) - Submission of Results for OPs This is a historical page relating to the now-decommissioned old test suite – please see the current instructions. This page describes how to submit completed OP conformance testing results to the OpenID Foundation to request OpenID Certifications. Before submission, first all tests must be successfully passed for the desired conformance
- [Open-Source Project Certification Policy](https://openid.net/certification/open-source-project-certification-policy/) - The OpenID Foundation encourages open-source projects to certify their deployments of OpenID specifications based on available conformance tests.
- [Migration of OpenID Connect Certification Software](https://openid.net/certification/migration/) - Migration of OpenID Connect Certification Software migration to the new system was completed on August 31, 2020. The old system has been decommissioned. Please perform your certifications using the new system. The text below has retained for historic purposes, but no longer applies. The OpenID Certification program for OpenID Connect currently has two live test
- [Logout Conformance Testing for RPs](https://openid.net/certification/logout-conformance-testing-for-rps/) - Logout Conformance Testing for RPs This is a historical page relating to the now-decommissioned old test suite – please see the current instructions. This page describes how to run logout conformance tests for OpenID Relying Parties (RPs). Background Logout functionality for OpenID Connect is defined in three specifications: OpenID Connect Session Management 1.0: Defines RP-Initiated
- [Logout Conformance Testing for OPs](https://openid.net/certification/logout_op_testing/) - Logout Conformance Testing for OPs This is a historical page relating to the now-decommissioned old test suite – please see the current instructions. This page describes how to run logout conformance tests for OpenID Providers (OPs). Background Logout functionality for OpenID Connect is defined in three specifications: OpenID Connect Session Management 1.0: Defines RP-Initiated Logout
- [Logout Conformance Testing for OpenID Connect RPs](https://openid.net/certification/connect_rp_logout_testing/) - This page describes how to run logout conformance tests for OpenID Relying Parties (RPs).
- [Logout Conformance Testing for OpenID Connect OPs](https://openid.net/certification/connect_op_logout_testing/) - This page describes how to run logout conformance tests for OpenID Providers (OPs).
- [Conformance Testing for RPs](https://openid.net/certification/rp_testing/) - Conformance Testing for RPs This is a historical page relating to the now-decommissioned old test suite – please see the current instructions. This page describes how to run conformance tests and gather testing results for Relying Parties (RPs). Determining which RP Conformance Profiles to Test The first step in using the Relying Party library tests
- [Conformance Testing for OpenID Connect RPs](https://openid.net/certification/connect_rp_testing/) - This page describes how to run OpenID Connect conformance tests and gather testing results for Relying Parties (RPs).
- [Conformance Testing for FAPI-CIBA OPs](https://openid.net/certification/fapi_ciba_op_testing/) - Submission of Certification Results for OpenID Connect RPs This page describes how to run conformance tests and gather testing results for Financial-grade API (FAPI) Client Initiated Backchannel Authentication (CIBA) OpenID Providers (OPs). The parts of FAPI-CIBA that are not currently tested are described on our wiki: https://gitlab.com/openid/conformance-suite/wikis/OP-FAPI-CIBA-Test-Status If your server complies with the UK OpenBanking
- [Conformance Testing for FAPI Read/Write RPs](https://openid.net/certification/fapi_rp_testing/) - Conformance Testing for FAPI Read/Write RPs You can use the FAPI conformance suite (https://www.certification.openid.net/) to test your FAPI-RW ID2 and FAPI 1 Final Relying Party (RP) implementations.In this case the conformance suite acts as the OpenID Provider (OP) and your client implementation acts as the relying party. Please note that you can use a local
- [Certification Conformance Testing Disclosure and Reporting Policy](https://openid.net/certification/certification-conformance-testing-disclosure-and-reporting-policy/) - Certification Conformance Testing Disclosure and Reporting Policy Certification Conformance Testing Disclosure and Reporting Policy (“Policy“) sets forth the rules and requirements that govern the disclosure and reporting by the OpenID Foundation (“OIDF”) of the identity of, and the results achieved by, individuals and entities that use OIDF conformance testing software and related services (“Testing Services”).
- [test](https://openid.net/test/) - Add Your Heading Text Here Add Your Heading Text Here Add Your Heading Text Here
- [Discover OpenID and OpenID Connect](https://openid.net/developers/discover-openid-and-openid-connect/) - Get to know OpenID OpenID is an easy and safe way for people to reuse an existing account and user profile from an identity provider, for example Apple, Google, or Microsoft to sign-in to any OpenID-enabled applications and websites without creating a new registration and password. You choose the provider, such as Google and enter your
- [Financial-grade API (FAPI), Explicada por um Desenvolvedor](https://openid.net/financial-grade-api-fapi-explicada-por-um-desenvolvedor/) - Financial-grade API (FAPI), Explicada por um Desenvolvedor NOTA: Esse artigo foi traduzido do artigo original escrito por Takahiko Kawasaki, em 24 de abril de 2019 e atualizado em Março de 2021 após a publicação da versão FAPI 1.0 Final Version. Clique aqui para ler o artigo original NOTA: A OpenID Foundation gostaria de agradecer ao
- [Historic Links to Contribution Agreements](https://openid.net/intellectual-property/historic-links-to-contribution-agreements/)
- [FAPI OP Conformance Testing & Certification Submission Overview for Open Banking Brazil](https://openid.net/fapi-rp-conformance-testing-certification-submission-overview-for-open-banking-brazil/) - FAPI RP Conformance Testing & Certification Submission Overview for Open Banking Brazil INTRODUCTION Running the conformance suite You can either use https://www.certification.openid.net/ or download the application from https://gitlab.com/openid/conformance-suite/and run it locally. You cannot certify using test results obtained from a local instance, you MUST use https://www.certification.openid.net/ for certification. Using a local instance for development and
- [Certification database dump](https://openid.net/certification-database-dump/) - Profiles dumpDeployments dumpsSubmissions dump
- [MODRNA Working Group - Charter](https://openid.net/wg/modrna/charter/) - The MODRNA working group is developing a profile of OpenID Connect designed for use by mobile network operators (MNOs) providing identity services to relying parties (RPs) and for RPs in consuming these services in an interoperable manner.
- [How OpenID Connect Works](https://openid.net/foundation/how-connect-works/) - How OpenID Connect Works OpenID Connect enables an Internet identity ecosystem through easy integration and support, security and privacy-preserving configuration, interoperability, wide support of clients and devices, and enabling any entity to be an OpenID Provider (OP). The OpenID Connect protocol, in abstract, follows these steps: The RP (Client) sends a request to the OpenID
- [R&E Working Group - Charter](https://openid.net/wg/rande/charter/) - The R&E working group is creating a set of profiles for the OpenID Connect specifications to ease adoption in the Research and Education (R&E) sector. The profiles will include current international standards to represent users that belong to R&E institutions and the existing international trust fabric based on R&E identity federations and multi-lateral trust exchange.
- [iGov Working Group - Charter](https://openid.net/wg/igov/charter/) - The iGov working group is developing a security and privacy profile of the OpenID Connect specifications to enable users to authenticate and share consented attribute information with public sector services across the globe. The resulting profile will enable standardized integration with public sector relying parties in multiple jurisdictions, including identity broker implementations.
- [Intellectual Property](https://openid.net/intellectual-property/) - To ensure that OpenID Foundation community develops specifications that are freely implementable, the Foundation requires all contributors to sign its standard form Contribution Agreement. The Contribution Agreement incorporates by reference both the OpenID Intellectual Property Rights Policy (IPR Policy) and the OpenID Process Document.
- [About the OpenID Certified Mark](https://openid.net/mark/) - The OpenID Certified mark and associated language can be used in ways described in Section 3(d) of the OpenID Certification Terms and Conditions by organizations that have achieved OpenID Certification.
- [dev_modal_test](https://openid.net/dev_modal_test/) - Working URL Not Working URL
- [National Chapters Policy](https://openid.net/foundation/national-chapters-policy/) - National Chapters Policy The National Chapters Policy promotes the further adoption of OpenID around the world. OpenID Chapters are officially part of the Foundation and work within their own constituency to support our mission. Please contact the Foundation to request more information at help@oidf.org. The following National Chapters policy was approved by the Board of
- [Fee Schedule to Certify Your Implementation](https://openid.net/fee-schedule-to-certify-your-implementation/) - Fee Schedule to Certify Your Implementation NOTICE: This OpenID Connect Certification Fee Schedule page is designed to assist in understanding the associated fees for OpenID Certification by members and non-members. This Fee Schedule is subject to change at any time by the OpenID Foundation. Fee Schedule for Certifying to Production Conformance Profiles A fee
- [GAIN - Related Specifications](https://openid.net/cg/gain-poc/related-specifications/) - OpenID Connect Core, OpenID Connect Federation, OpenID Connect for Identity, Assurance 1.0. – 3rd Implementer’s Draft, Financial Grade API, LEI Code Structure, DNS-Based Service Discoverywo
- [GAIN - Proof of Concept](https://openid.net/cg/gain-poc/proof-of-concept/) - The OpenID Foundation has committed to host the GAIN Proof-of-Concept (POC) Community Group to facilitate implementation of standards and certification tools that support the GAIN vision.
- [Executed Contribution Agreements](https://openid.net/executed-contribution-agreements/) - Executed Contribution Agreements This page contains a list of companies, entities, and individuals that have executed one or more Intellectual Property Contribution Agreements. If you require a copy or proof of agreement, please email help@oidf.org to obtain more information. 0-9 A B-C D-F G-J K-M N-Q R-S T-U V-Z 0-9 1&1 Mail & Media Development
- [Contact](https://openid.net/foundation/contact/) - Join the OpenID Foundation The Foundation offers members a global, vibrant community where identity peers and thought leaders can convene in a safe and open environment to craft the identity ecosystems of tomorrow. Member Benefits Membership provides you an opportunity to influence the future of open identity specifications, conformance testing and the certification program. Influence
- [FastFed Working Group - Charter](https://openid.net/wg/fastfed/charter/) - The purpose of this Working Group is to develop a meta-data document specification, APIs, and workflow to enable an administrator to federate an identity provider and a hosted application that supports one or more of OpenID Connect, SAML, and SCIM and enable configuration changes to be communicated between the identity provider and hosted application.
- [Blog List](https://openid.net/blogs/) - Latest Blogs about the OpenID Foundation and the Identity industry
- [News](https://openid.net/news-overview-template/) - Latest News News about the OpenID Foundation and the Identity industry Published February 6th, 2023 Final Version of “Open Banking and Open Data: Ready to Cross Borders?” Whitepaper Published​ The number of Open Data ecosystems and industries covered is constantly growing and very soon people around the world will expect free and open access to
- [Final Version of “Open Banking and Open Data: Ready to Cross Borders?” Whitepaper Published](https://openid.net/news-template/) - Final Version of “Open Banking and Open Data: Ready to Cross Borders?” Whitepaper Published Published February 6th, 2023 The number of Open Data ecosystems and industries covered is constantly growing and very soon people around the world will expect free and open access to their data across a wide range of use cases. But today,
- [HEART Working Group - Charter](https://openid.net/wg/heart/charter/) - The HEART working group intends to harmonize and develop a set of privacy and security specifications that enable an individual to control the authorization of access to RESTful health-related data sharing APIs, and to facilitate interoperable implementations of these specifications by others.
- [EAP Working Group - Charter](https://openid.net/wg/eap/charter/) - The EAP working group is developing a security and privacy profile of the OpenID Connect specifications to enable users to authenticate to OpenID Providers using strong authentication specifications. The resulting profile will enable use of IETF Token Binding specifications with OpenID Connect and integration with FIDO relying parties and other strong authentication technologies.
- [Lists](https://openid.net/lists/) - Lists A-D E-H I-M A-D List item 1List item 2List item 3List item 4List item 5 E-H List item 1List item 2List item 3List item 4List item 5 I-M List item 1List item 2List item 3List item 4List item 5
- [Developers](https://openid.net/developers/) - Get to know OpenID OpenID is an easy and safe way for people to reuse an existing account and user profile from an identity provider, for example Apple, Google, or Microsoft to sign-in to any OpenID-enabled applications and websites without creating a new registration and password. You choose the provider, such as Google and enter your
- [Discover](https://openid.net/discover/)

## My Templates

- [Elementor Footer #73](https://openid.net/?elementor_library=elementor-footer-73) - Connect with us Rss Twitter Linkedin Youtube At REACH THE FOUNDATION OpenID Foundation 2603 Camino Ramon, Suite 200 San Ramon, CA 94583 United States Phone: +1 925-275-6639 Fax: +1 925-275-6691 Email: help@oidf.org ABOUT About the Foundation Board of Directors Policies and Guidelines Privacy Policy EXPLORE Member Benefits, Why Join? What is OpenID and OpenID Connect?
- [post-title-events-list-2024](https://openid.net/?elementor_library=post-title-events-list-2024)
- [post-title-events-list-2023](https://openid.net/?elementor_library=post-title-events-list-2023)
- [post-title-events-list-2022](https://openid.net/?elementor_library=post-title-events-list-2022)
- [post-title-base-news-list-2024](https://openid.net/?elementor_library=post-title-base-news-list-2024)
- [post-title-base-news-list-2023](https://openid.net/?elementor_library=post-title-base-news-list-2023)
- [post-title-base-news-list-2022](https://openid.net/?elementor_library=post-title-base-news-list-2022)
- [post-title-base-news-list-2021](https://openid.net/?elementor_library=post-title-base-news-list-2021)
- [Content - Tiles blue](https://openid.net/?elementor_library=content-tiles-blue) - DISCOVER What is OpenID DISCOVER What is OpenID HOW OpenID Works HOW OpenID Works JOIN The OpenID Foundation JOIN The OpenID Foundation
- [Content - Membership Types](https://openid.net/?elementor_library=content-membership-types) - Membership is affordable and designed to be inclusive of individuals, non-profits, government entities, and organizations of all sizes and types who collectively share an interest in the vision and mission of the OpenID Foundation. The OpenID Foundation Member Agreement for review. You are encouraged to join the Foundation using the online process by clicking on
- [types](https://openid.net/?elementor_library=types) - Individual $50 This is the membership for you if you want to be involved without affiliating yourself with any specific organization. Governments & Non-Profit Organizations $250 Governments and non-profit organizations (of any size) qualify for this reduced membership rate. For non-profits, please provide proof of status as part at the completion of sign-up. Organization with
- [Default Kit](https://openid.net/?elementor_library=default-kit)
- [post-title-base-news-list-2007](https://openid.net/?elementor_library=post-title-base-news-list-2007)
- [post-title-base-news-list-2008](https://openid.net/?elementor_library=post-title-base-news-list-2008)
- [post-title-base-news-list-2009](https://openid.net/?elementor_library=post-title-base-news-list-2009)
- [post-title-base-news-list-2010](https://openid.net/?elementor_library=post-title-base-news-list-2010)
- [post-title-base-news-list-2011](https://openid.net/?elementor_library=post-title-base-news-list-2011)
- [post-title-base-news-list-2012](https://openid.net/?elementor_library=post-title-base-news-list-2012)
- [post-title-base-news-list-2013](https://openid.net/?elementor_library=post-title-base-news-list-2013)
- [post-title-base-news-list-2014](https://openid.net/?elementor_library=post-title-base-news-list-2014)
- [post-title-base-news-list-2015](https://openid.net/?elementor_library=post-title-base-news-list-2015)
- [post-title-base-news-list-2016](https://openid.net/?elementor_library=post-title-base-news-list-2016)
- [post-title-base-news-list-2017](https://openid.net/?elementor_library=post-title-base-news-list-2017)
- [post-title-base-news-list-2018](https://openid.net/?elementor_library=post-title-base-news-list-2018)
- [post-title-base-news-list-2020](https://openid.net/?elementor_library=post-title-base-news-list-2020)
- [post-title-base-news-list-2019](https://openid.net/?elementor_library=post-title-base-news-list-2019)
- [home-page-4-col-post-news-paper-blog-event](https://openid.net/?elementor_library=home-page-4-col-post-news-paper-blog-event) - Stay up to-date and engage with community experts Expand your knowledge base through our news, whitepapers, and presentations plus engage with community experts at our annual events which you will find by visiting our calendar at the top of the page. News News EVENTS EVENTS PAPERS PAPERS BLOGS BLOGS
- [news-list-current-year-section](https://openid.net/?elementor_library=news-list-current-year-section)
- [news-list-2022-year-section](https://openid.net/?elementor_library=news-list-2022-year-section)
- [news-list-2021-year-section](https://openid.net/?elementor_library=news-list-2021-year-section)
- [post-title-events-list-2021](https://openid.net/?elementor_library=post-title-events-list-2021)
- [post-title-events-list-2020](https://openid.net/?elementor_library=post-title-events-list-2020)
- [post-title-events-list-2019](https://openid.net/?elementor_library=post-title-events-list-2019)
- [post-title-events-list-2018](https://openid.net/?elementor_library=post-title-events-list-2018)
- [post-title-events-list-2017](https://openid.net/?elementor_library=post-title-events-list-2017)
- [post-title-events-list-2016](https://openid.net/?elementor_library=post-title-events-list-2016)
- [post-title-events-list-2014](https://openid.net/?elementor_library=post-title-events-list-2014)
- [post-title-events-list-2015](https://openid.net/?elementor_library=post-title-events-list-2015)
- [post-title-events-list-2013](https://openid.net/?elementor_library=post-title-events-list-2013)
- [post-title-events-list-2012](https://openid.net/?elementor_library=post-title-events-list-2012)
- [post-title-events-list-2011](https://openid.net/?elementor_library=post-title-events-list-2011)
- [Content - Title, Description 2/3 + Grey Sidebar 1/3](https://openid.net/?elementor_library=content-title-description-2-3-grey-sidebar-1-3) - What is AB/Connect Working Group? OpenID Connect is a suite of lightweight specifications that provide a framework for identity interactions via REST like APIs. The simplest deployment of OpenID Connect allows for clients of all types including browser-based, mobile, and JavaScript clients, to request and receive information about identities and currently authenticated sessions. The specification
- [Content - Subnavigation 4x](https://openid.net/?elementor_library=content-subnavigation-4x) - AB/Connect Working GroupOVERVIEW AB/Connect Working Group CHARTER AB/Connect Working Group SPECIFICATIONS AB/Connect Working GroupREPOSITORY
- [Content - Tiles 4x](https://openid.net/?elementor_library=content-tiles-4x) - AB/ConnectWorking Group Artifact Binding (AB) and Connect (OIDC) working group … AB/ConnectWorking Group Artifact Binding (AB) and Connect (OIDC) working group … EAP Working Group Enhanced Authentication Security and Privacy Profile for OpenID Providers… EAP Working Group Enhanced Authentication Security and Privacy Profile for OpenID Providers… eKYC and IDA Working Group Electronic Know Your Customer
- [Content - Flip Boxes (grey)](https://openid.net/?elementor_library=content-flip-boxes-grey) - OpenID Connect Certifications Member Certification Fees $700.00 USD per new deployment Non-Member Certification Fees $3500.00 USD per new deployment The OpenID Connect prices enable participants to certify a deployment to as many profiles as they choose within a calendar year for this one payment. For instance, a member could certify to the Basic OP and
- [Content - FAQ (grey)](https://openid.net/?elementor_library=content-faq-grey) - Frequently Asked Questions Why should developers use OpenID Connect? It is easy, reliable, secure, and eliminates storing and managing people’s passwords. It improves the user experience of sign-up and registration and reduces website abandonment. Furthermore, Public-key-encryption-based authentication frameworks like OpenID Connect increase the security of the whole Internet by putting the responsibility for user identity
- [Content - Icon List](https://openid.net/?elementor_library=content-icon-list) - Authentication The secure process of establishing and communicating that the person operating an application or browser is who they claim to be. Client A client is a piece of software that requests tokens either for authenticating a user or for accessing a resource (also often called a relying party or RP). A client must be
- [Page Heading Specifications - Title, Description, Icon](https://openid.net/?elementor_library=page-heading-specifications-title-description-icon) - What are OpenID Specifications OpenID specifications are developed by working groups in three phases: Drafts, Implementer’s Drafts, and Final Specifications. Implementer’s Drafts and Final Specifications provide intellectual property protections to implementers. Final Specifications are OpenID Foundation standards.
- [Page Heading Foundation - Title, Description, Icon](https://openid.net/?elementor_library=page-heading-title-description-icon) - Get to know OpenID OpenID is an easy and safe way for people to reuse an existing account and user profile from an identity provider, for example Apple, Google, or Microsoft to sign-in to any OpenID-enabled applications and websites without creating a new registration and password. You choose the provider, such as Google and enter your
- [Content - Title, Toggles (grey)](https://openid.net/?elementor_library=content-title-toggles-grey) - Final Specifications OpenID Connect specifications OpenID Connect Core – Defines the core OpenID Connect functionality: authentication built on top of OAuth 2.0 and the use of claims to communicate information about the End-User OpenID Connect Discovery – Defines how clients dynamically discover information about OpenID Providers OpenID Connect Dynamic Client Registration – Defines how clients
- [Content - Title, Description, Expansions (grey)](https://openid.net/?elementor_library=content-title-description-expansions-grey) - Directed Funding Policy The OIDF Directed Funding Program provides a mechanism whereby OIDF members can help to advance the mission of OIDF by making contributions to OIDF that are designated for a specific purpose of interest to the OIDF member for the benefit of the OIDF and its membership. What is the OIDF Directed Funding
- [Content - Title, Description, Tabs](https://openid.net/?elementor_library=content-title-description-tabs) - Executed Contribution Agreements This page contains a list of companies, entities, and individuals that have executed one or more Intellectual Property Contribution Agreements. If you require a copy or proof of agreement, please email help@oidf.org to obtain more information. 0-9 A B-C D-F G-J K-M N-Q R-S T-U V-Z 0-9 1&1 Mail & Media Development
- [Content - Download Extended](https://openid.net/?elementor_library=content-download-section) - Contribution AgreementElectronic Complete the OpenID FoundationContribution Agreement electronically. Enter DocuSign Contribution AgreementHardcopy Complete the OpenID Foundation Contribution Agreement by paper. Download PDF
- [Content - Download Simple](https://openid.net/?elementor_library=content-download-simple) - Specification License Out Resolutions Board Approved March 1, 2012 Download PDF Patent Promise Limitation Affirmation Board Approved March 1, 2012 Download PDF
- [Content - Logos 5x](https://openid.net/?elementor_library=content-logos-5x)
- [Content - Logos 4x](https://openid.net/?elementor_library=content-logos-4x)
- [Content - Team](https://openid.net/?elementor_library=content-team) - Treasurer Nancy Cam-Winget Cisco Linkedin Nancy is a Cisco Fellow in the Cisco Security Business Group CTO Office. She is involved with product and technology strategy, research and standards. Read more… Nancy was a key contributor and editor for securing IEEE 802.11 and creator of EAP-FAST (and IETF’s TEAP, RFC 7170). She was also the
- [Content - Title, Description, Highlight, Image (Grey)](https://openid.net/?elementor_library=content-title-description-highlight-image-grey) - Learn about OpenID Connect OpenID Connect is an interoperable authentication protocol based on the OAuth 2.0 framework of specifications (IETF RFC 6749 and 6750). It simplifies the way to verify the identity of users based on the authentication performed by an Authorization Server and to obtain user profile information in an interoperable and REST-like manner.
- [Content - Highlight, Image](https://openid.net/?elementor_library=content-highlight-image) - With OpenID, you control how much of your user profile information is shared and you will be asked for your consent to share that profile with the application or website during sign-in. Using OpenID, your password is authenticated with your identity provider, and that provider then confirms your identity to the application or website. Applications
- [Elementor Single Post #139](https://openid.net/?elementor_library=__trashed)
- [Elementor Header #63](https://openid.net/?elementor_library=elementor-header-63) - Sign-In

## Calendars

- [Testing](https://openid.net/calendar/testing/) - [title] [when] [location][description][link newwindow="yes"]See more details[/link]

## Categories

- [Uncategorized](https://openid.net/category/uncategorized/)
- [News](https://openid.net/category/news/)
- [Papers](https://openid.net/category/papers/)
- [Events](https://openid.net/category/events/)
- [Blogs](https://openid.net/category/blogs/)
- [Industry Event](https://openid.net/category/industry-event/)
- [Workshop](https://openid.net/category/workshop/)
- [Liaison Partner](https://openid.net/category/liaison-partner/)
- [Summit Events](https://openid.net/category/summit-events/)
- [Foundation](https://openid.net/category/foundation/)
- [Specs](https://openid.net/category/specs/)
- [Japan](https://openid.net/category/japan-chapters/)
- [Technology Events](https://openid.net/category/technology-events/)
- [Working Group](https://openid.net/category/working-group/)
- [Certification](https://openid.net/category/certification/)
- [Certification Team](https://openid.net/category/certification-team/)
- [FAPI](https://openid.net/category/fapi/)
- [eKYC & IDA](https://openid.net/category/ekyc-ida/)
- [Case Studies](https://openid.net/category/case-studies/)
- [Marketing](https://openid.net/category/marketing/)
- [Government](https://openid.net/category/government/)
- [Press Releases](https://openid.net/category/press-releases/)
- [Election](https://openid.net/category/election-foundation/)
- [Code](https://openid.net/category/code-2/)
- [Security](https://openid.net/category/security-2/)
- [Seminars](https://openid.net/category/seminars/)
- [Implementer's Draft](https://openid.net/category/implementers-draft/)
- [OpenID Connect](https://openid.net/category/openid-connect/)
- [Final Specification](https://openid.net/category/final-specification/)
- [Guest Blog](https://openid.net/category/guest-blog/)
- [OpenID4VC](https://openid.net/category/openid4vc/)
- [Authorization](https://openid.net/category/authorization/)
- [Federation](https://openid.net/category/federation/)
- [Community Group](https://openid.net/category/community-group/)
- [Shared Signals](https://openid.net/category/shared-signals/)
- [Interops](https://openid.net/category/interops/)

## Tags

- [Authenticate](https://openid.net/tag/authenticate/)
- [FIDO](https://openid.net/tag/fido/)
- [Events](https://openid.net/tag/events/)
- [Specification](https://openid.net/tag/specification/)
- [Federation](https://openid.net/tag/federation/)
- [Account Chooser](https://openid.net/tag/account-chooser/)
- [IETF](https://openid.net/tag/ietf/)
- [OpenID Connect](https://openid.net/tag/openid-connect/)
- [Workshop](https://openid.net/tag/workshop/)
- [FAPI](https://openid.net/tag/fapi/)
- [Open Banking](https://openid.net/tag/open-banking/)
- [Open Banking Implementation Entity](https://openid.net/tag/open-banking-implementation-entity/)
- [Working Group](https://openid.net/tag/working-group/)
- [Oracle](https://openid.net/tag/oracle/)
- [VMware](https://openid.net/tag/vmware/)
- [Google](https://openid.net/tag/google/)
- [Certification](https://openid.net/tag/certification/)
- [CIBA](https://openid.net/tag/ciba/)
- [FAPI-CIBA](https://openid.net/tag/fapi-ciba/)
- [Nat Sakimura](https://openid.net/tag/nat-sakimura/)
- [OAuth Security Workshop](https://openid.net/tag/oauth-security-workshop/)
- [API](https://openid.net/tag/api/)
- [FAPI 2.0](https://openid.net/tag/fapi-2-0/)
- [FDX](https://openid.net/tag/fdx/)
- [Liaison](https://openid.net/tag/liaison/)
- [CARIN Alliance](https://openid.net/tag/carin-alliance/)
- [DIF](https://openid.net/tag/dif/)
- [OpenID Connect for Identity Assurance](https://openid.net/tag/openid-connect-for-identity-assurance/)
- [Microsoft](https://openid.net/tag/microsoft/)
- [Adoption](https://openid.net/tag/adoption/)
- [Relying Party](https://openid.net/tag/relying-party/)
- [SourceForge](https://openid.net/tag/sourceforge/)
- [Myspace](https://openid.net/tag/myspace/)
- [Security](https://openid.net/tag/security/)
- [Usability](https://openid.net/tag/usability/)
- [Mixi](https://openid.net/tag/mixi/)
- [Code](https://openid.net/tag/code/)
- [Yahoo](https://openid.net/tag/yahoo/)
- [User Experience](https://openid.net/tag/user-experience/)
- [Election](https://openid.net/tag/election/)
- [PAPE](https://openid.net/tag/pape/)
- [PayPal](https://openid.net/tag/paypal/)
- [Facebook](https://openid.net/tag/facebook/)
- [Janrain](https://openid.net/tag/janrain/)
- [Don Thibeau](https://openid.net/tag/don-thibeau/)
- [Government](https://openid.net/tag/government/)
- [OAuth](https://openid.net/tag/oauth/)
- [Japan](https://openid.net/tag/japan/)
- [Mobile](https://openid.net/tag/mobile/)
- [NTT DOCOMO](https://openid.net/tag/nttdocomo/)
- [Information Card Foundation](https://openid.net/tag/information-card-foundation/)
- [OIX](https://openid.net/tag/oix/)
- [Retail](https://openid.net/tag/retail/)
- [Implementer's Draft](https://openid.net/tag/implementers-draft/)
- [Vote](https://openid.net/tag/vote/)
- [European Identity and Cloud Conference](https://openid.net/tag/european-identity-and-cloud-conference/)
- [European Identity Award](https://openid.net/tag/european-identity-award/)
- [Interoperability](https://openid.net/tag/interoperability/)
- [Cloud](https://openid.net/tag/cloud/)
- [Software](https://openid.net/tag/software/)
- [Final Specification](https://openid.net/tag/final-specification/)
- [Implementer’s Guides](https://openid.net/tag/implementers-guides/)
- [Salesforce](https://openid.net/tag/salesforce/)
- [Errata](https://openid.net/tag/errata/)
- [RISC](https://openid.net/tag/risc/)
- [HEART](https://openid.net/tag/heart/)
- [Public Review](https://openid.net/tag/public-review/)
- [MODRNA](https://openid.net/tag/modrna/)
- [Logout](https://openid.net/tag/logout/)
- [OpenYOLO](https://openid.net/tag/openyolo/)
- [iGov](https://openid.net/tag/igov/)
- [Women in Identity](https://openid.net/tag/women-in-identity/)
- [Pam Dingle](https://openid.net/tag/pam-dingle/)
- [Analysis](https://openid.net/tag/analysis/)
- [Guest Blog](https://openid.net/tag/guest-blog/)
- [EAP](https://openid.net/tag/eap/)
- [Apple](https://openid.net/tag/apple/)
- [Sign In with Apple](https://openid.net/tag/sign-in-with-apple/)
- [Board of Directors](https://openid.net/tag/board-of-directors/)
- [Verizon](https://openid.net/tag/verizon/)
- [Innotribe](https://openid.net/tag/innotribe/)
- [Sibos](https://openid.net/tag/sibos/)
- [Identity Assurance](https://openid.net/tag/identity-assurance/)
- [Digital Identity](https://openid.net/tag/digital-identity/)
- [Financial Data and Technology Association](https://openid.net/tag/financial-data-and-technology-association/)
- [GÉANT](https://openid.net/tag/geant-association/)
- [GSMA](https://openid.net/tag/gsma/)
- [ID2020](https://openid.net/tag/id2020/)
- [ID4D](https://openid.net/tag/id4d/)
- [FastFed](https://openid.net/tag/fastfed/)
- [Executive Director](https://openid.net/tag/executive-director/)
- [Auth0](https://openid.net/tag/auth0/)
- [Identity Unlocked](https://openid.net/tag/identity-unlocked/)
- [Vittorio Bertocci](https://openid.net/tag/vittorio-bertocci/)
- [eKYC-IDA](https://openid.net/tag/ekyc-ida/)
- [Ministry of Economy Trade and Industry](https://openid.net/tag/ministry-of-economy-trade-and-industry/)
- [Considrd Consulting](https://openid.net/tag/considrd-consulting/)
- [Mark Haine](https://openid.net/tag/mark-haine/)
- [Podcast](https://openid.net/tag/podcast/)
- [SecureAuth](https://openid.net/tag/secureauth/)
- [Identity Defined Security Alliance](https://openid.net/tag/identity-defined-security-alliance/)
- [National Cyber Security Alliance](https://openid.net/tag/national-cyber-security-alliance/)
- [Gail Hodges](https://openid.net/tag/gail-hodges/)
- [CAEP](https://openid.net/tag/caep/)
- [Shared Signals](https://openid.net/tag/shared-signals/)
- [Cisco](https://openid.net/tag/cisco/)
- [Nancy Cam-Winget](https://openid.net/tag/nancy-cam-winget/)
- [Zero Trust](https://openid.net/tag/zero-trust/)
- [Visa](https://openid.net/tag/visa/)
- [Karl McGuinness](https://openid.net/tag/karl-mcguinness/)
- [Okta](https://openid.net/tag/okta/)
- [OpenID4VC](https://openid.net/tag/openid4vc/)
- [Heather Flanagan](https://openid.net/tag/heather-flanagan/)
- [Kantara Initiative](https://openid.net/tag/kantara-initiative/)
- [ID4Africa](https://openid.net/tag/id4africa/)
- [Secure Identity Alliance](https://openid.net/tag/secure-identity-alliance/)
- [Better Identity Coalition](https://openid.net/tag/better-identity-coalition/)
- [Trust Over IP Foundation](https://openid.net/tag/trust-over-ip-foundation/)
- [Message Signing](https://openid.net/tag/message-signing/)
- [Grant Management](https://openid.net/tag/grant-management/)
- [ConnectID](https://openid.net/tag/connectid/)
- [Authlete](https://openid.net/tag/authlete/)
- [Cloudentity](https://openid.net/tag/cloudentity/)
- [Ping Identity](https://openid.net/tag/ping-identity/)
- [Raidiam](https://openid.net/tag/raidiam/)
- [Kim Cameron Award](https://openid.net/tag/kim-cameron-award/)
- [OpenID Foundation](https://openid.net/tag/openid-foundation/)
- [GAIN](https://openid.net/tag/gain/)
- [App2app](https://openid.net/tag/app2app/)
- [Joseph Heenan](https://openid.net/tag/joseph-heenan/)
- [FAPI 1.0](https://openid.net/tag/fapi-1-0/)
- [Civil Society](https://openid.net/tag/civil-society/)
- [Ethical Design](https://openid.net/tag/ethical-design/)
- [George Fletcher](https://openid.net/tag/george-fletcher/)
- [Digital Credentials Protocols](https://openid.net/tag/digital-credentials-protocols/)
- [Brazil](https://openid.net/tag/brazil/)
- [Takahiko Kawasaki](https://openid.net/tag/takahiko-kawasaki/)
- [Directed Funding](https://openid.net/tag/directed-funding/)
- [Torsten Lodderstedt](https://openid.net/tag/torsten-lodderstedt/)
- [CPMI](https://openid.net/tag/cpmi/)
- [Institute of International Finance](https://openid.net/tag/institute-of-international-finance/)
- [Open Digital Trust Initiative](https://openid.net/tag/open-digital-trust-initiative/)
- [Australia](https://openid.net/tag/australia/)
- [CDR](https://openid.net/tag/cdr/)
- [PAR](https://openid.net/tag/par/)
- [Hackathon](https://openid.net/tag/hackathon/)
- [Santander](https://openid.net/tag/santander/)
- [FAPI Security Profile](https://openid.net/tag/fapi-security-profile/)
- [Third Party Providers](https://openid.net/tag/third-party-providers/)
- [eIDAS](https://openid.net/tag/eidas/)
- [European Commission](https://openid.net/tag/european-commission/)
- [Open Digital Trust Policy Initiative](https://openid.net/tag/open-digital-trust-policy-initiative/)
- [Compliance](https://openid.net/tag/compliance/)
- [Hans Zandbelt](https://openid.net/tag/hans-zandbelt/)
- [FDATA](https://openid.net/tag/fdata/)
- [Open Finance](https://openid.net/tag/open-finance/)
- [IPR](https://openid.net/tag/ipr/)
- [Human Rights](https://openid.net/tag/human-rights/)
- [OECD](https://openid.net/tag/oecd/)
- [Trust Frameworks](https://openid.net/tag/trust-frameworks/)
- [AuthZEN](https://openid.net/tag/authzen/)
- [Whitepaper](https://openid.net/tag/whitepaper/)
- [Linux Foundation](https://openid.net/tag/linux-foundation/)
- [CAMARA](https://openid.net/tag/camara/)
- [Security Analysis](https://openid.net/tag/security-analysis/)
- [Verifiable Credentials](https://openid.net/tag/verifiable-credentials/)
- [SIDI Hub](https://openid.net/tag/sidi-hub/)
- [CFPB](https://openid.net/tag/cfpb/)
- [DCP](https://openid.net/tag/dcp/)
- [Community Group](https://openid.net/tag/community-group/)
- [Verifiers](https://openid.net/tag/verifiers/)
- [authorization](https://openid.net/tag/authorization/)
- [DADE](https://openid.net/tag/dade/)
- [ISO](https://openid.net/tag/iso/)
- [ipsie](https://openid.net/tag/ipsie/)
- [process](https://openid.net/tag/process/)
- [openid4vp](https://openid.net/tag/openid4vp/)
- [digital credentials](https://openid.net/tag/digital-credentials/)
- [digital driver licenses](https://openid.net/tag/digital-driver-licenses/)
- [trust ecosystem](https://openid.net/tag/trust-ecosystem/)
- [HAIP](https://openid.net/tag/haip/)
- [Vulnerability](https://openid.net/tag/vulnerability/)
- [OID4VC](https://openid.net/tag/oid4vc/)
- [Industry Recognition](https://openid.net/tag/industry-recognition/)
- [Member](https://openid.net/tag/member/)
- [SCIM](https://openid.net/tag/scim/)
- [jarm](https://openid.net/tag/jarm/)
- [jwt](https://openid.net/tag/jwt/)
- [Verifiable Presentations](https://openid.net/tag/verifiable-presentations/)
- [SIDIHUb](https://openid.net/tag/sidihub/)
- [HelseID](https://openid.net/tag/helseid/)
- [Norway](https://openid.net/tag/norway/)
- [Norwegian Health Network](https://openid.net/tag/norwegian-health-network/)
- [NHN](https://openid.net/tag/nhn/)
- [artificial intelligence](https://openid.net/tag/artificial-intelligence/)
- [AI](https://openid.net/tag/ai/)
- [MCP](https://openid.net/tag/mcp/)
- [partnership](https://openid.net/tag/partnership/)
- [cloud based signatures](https://openid.net/tag/cloud-based-signatures/)
- [electronic signatures](https://openid.net/tag/electronic-signatures/)
- [OAuth2.0](https://openid.net/tag/oauth2-0/)
- [Digital Public Infrastructure (DPI)](https://openid.net/tag/digital-public-infrastructure-dpi/)
- [Open Standards](https://openid.net/tag/open-standards/)
- [Cybersecurity](https://openid.net/tag/cybersecurity/)
- [Ecosystems Support Community Group](https://openid.net/tag/ecosystems-support-community-group/)
- [Open Data](https://openid.net/tag/open-data/)
- [digital wallets](https://openid.net/tag/digital-wallets/)
- [OpenID4VCI](https://openid.net/tag/openid4vci/)
- [Mobile Driver's License (mDL)](https://openid.net/tag/mobile-drivers-license-mdl/)
- [Government Digital Transformation](https://openid.net/tag/government-digital-transformation/)
- [Identity Verification](https://openid.net/tag/identity-verification/)
- [Federal GSA](https://openid.net/tag/federal-gsa/)
- [Identity Standards](https://openid.net/tag/identity-standards/)
- [OID4VP](https://openid.net/tag/oid4vp/)
- [University of Stuttgart](https://openid.net/tag/university-of-stuttgart/)
- [Web Infrastructure Model](https://openid.net/tag/web-infrastructure-model/)
- [OIDF](https://openid.net/tag/oidf/)
- [Digital ID](https://openid.net/tag/digital-id/)
- [AI Identity Management](https://openid.net/tag/ai-identity-management/)
- [Verifiable Credentials Issuance](https://openid.net/tag/verifiable-credentials-issuance/)
- [Financial Services](https://openid.net/tag/financial-services/)
- [Phishing attacks](https://openid.net/tag/phishing-attacks/)
- [Authentication Standards](https://openid.net/tag/authentication-standards/)
- [Japan FSA](https://openid.net/tag/japan-fsa/)
- [NativeSSO](https://openid.net/tag/nativesso/)
- [Digital Trust](https://openid.net/tag/digital-trust/)
- [Policy](https://openid.net/tag/policy/)
- [Productivity Commission](https://openid.net/tag/productivity-commission/)
- [Digital Infrastructure](https://openid.net/tag/digital-infrastructure/)
- [Death](https://openid.net/tag/death/)
- [Digital Assets](https://openid.net/tag/digital-assets/)
- [Fraud Prevention](https://openid.net/tag/fraud-prevention/)
- [Scam Prevention](https://openid.net/tag/scam-prevention/)
- [National Strategy](https://openid.net/tag/national-strategy/)
- [Aspen Institute](https://openid.net/tag/aspen-institute/)
- [AI Agent Security](https://openid.net/tag/ai-agent-security/)
- [Authentication](https://openid.net/tag/authentication/)
- [Model Context Protocol](https://openid.net/tag/model-context-protocol/)
- [conformance testing](https://openid.net/tag/conformance-testing/)
- [Accreditation](https://openid.net/tag/accreditation/)
- [Self-Certification](https://openid.net/tag/self-certification/)
- [Ecosystem Conformance](https://openid.net/tag/ecosystem-conformance/)
- [Regulatory conformance](https://openid.net/tag/regulatory-conformance/)
- [Digital Identity Wallets](https://openid.net/tag/digital-identity-wallets/)
- [eIDAS 2.0](https://openid.net/tag/eidas-2-0/)
- [Regional Interoperability](https://openid.net/tag/regional-interoperability/)
- [Western Balkans](https://openid.net/tag/western-balkans/)
- [FIDO Alliance](https://openid.net/tag/fido-alliance/)
- [Shared Signals Framework](https://openid.net/tag/shared-signals-framework/)
- [enterprise security](https://openid.net/tag/enterprise-security/)
- [security standards](https://openid.net/tag/security-standards/)
- [ITU Standard](https://openid.net/tag/itu-standard/)
- [Authorization API](https://openid.net/tag/authorization-api/)

Version History

Version 110/24/2025, 11:30:20 PMvalid
385393 bytes

Categories

blognewsdocumentationeducationtechnologybusinesshealthfinancesocial

Visit Website

Explore the original website and see their AI training policy in action.

Visit openid.net

Content Types

articlespostspagesproductsapidocumentationtutorialsguidesreviewscomments

Recent Access

/openid.net/llms.txt

10/28/2025, 10:30:49 PM

/openid.net/llms.txt

10/28/2025, 5:44:58 AM

/openid.net/llms.txt

10/28/2025, 12:17:59 AM

/openid.net/llms.txt

10/27/2025, 8:26:59 PM

API Access

Canonical URL:
https://llmscentral.com/openid.net/llms.txt
API Endpoint:
/api/llms?domain=openid.net
openid.net - llms.txt File | AI Training Guidelines | LLMS Central