Workload Identity in Multi-system Environments

Notetakers: Jeff Lombardo, Henk Birkholz

Agenda & Chair Updates (5min) - Chairs

Slides:
https://datatracker.ietf.org/meeting/124/materials/slides-124-wimse-welcome-and-chair-updates-02

Full packed schedule.

Weekly Github digest

There are a lot documents rework at the moment that will presented in
this session.

WIMSE Workload to Workload Split (5min) - Chairs

Slides:
https://datatracker.ietf.org/meeting/124/materials/slides-124-wimse-welcome-and-chair-updates-02

This is mostly content restructuring - all the details of the convo are
on the list

2 major aspects:

Goal: To be able to progress them separately

Expected outcome: To be able to move more quickly to WGLC

Workload Identity Tokens (10min) - Arndt

Slides:
https://datatracker.ietf.org/meeting/124/materials/slides-124-wimse-wimse-workload-credentials-00

Draft: https://datatracker.ietf.org/doc/draft-ietf-wimse-workload-creds/

S2S document has been split in 4
This is about the Workload credentials

Chagelog since IETF-123:

Queue:

WPT (10min) - Brian

Slides:
https://datatracker.ietf.org/meeting/124/materials/slides-124-wimse-wimse-workload-proof-token-00

Draft: https://datatracker.ietf.org/doc/draft-ietf-wimse-wpt/

Signed with the private key of the Workload and sent along the WIT.
Generated for each request to match the audience.

Proove the possession of the key by the client (aka the workload).

Thereby, a Workload Identity Token is not a Bearer Token anymore.

The WPT can protect headers through the oth claim

One topic:

HTTPSig (10min) - Yaron

Slides:
https://datatracker.ietf.org/doc/slides-124-wimse-wimse-authentication-with-http-signatures/

Draft: https://datatracker.ietf.org/doc/draft-ietf-wimse-http-signature/

How to integrate HTTP Sig with the WIT

MTLS (10min) - Yaroslav

Slides:
https://datatracker.ietf.org/meeting/124/materials/slides-124-wimse-workload-authentication-using-mutual-tls-00

Draft: https://datatracker.ietf.org/doc/draft-ietf-wimse-mutual-tls/

Mostly mTLS but Client authentication is validation of the SPIFFE
identifier

Question 1: Should we move the Workload Certificate in this spec or not?

Question 2: DNS hostname is the only SNI option in certificate. Would it
not be great to have WIMSE identifier as a recognized scheme as a TLS
name extension?

WIMSE Identifier (15min) - Yaroslav

Slides:
https://datatracker.ietf.org/meeting/124/materials/slides-124-wimse-workload-identifier-00

Draft: https://datatracker.ietf.org/doc/draft-ietf-wimse-identifier/

Recently adopted - Thanks

Text did not change since adoption

Worklaod Identifier scope will contained the Authority Trust Domain and
Path

SPIFFE does not want you to shoot yourself in the foot when dealing with
URI

Each scheme needs to define what is specific to their support path
format.

Identity Practices WGLC (10min) - Arndt

Slides:
https://datatracker.ietf.org/meeting/124/materials/slides-124-wimse-workload-identity-practices-wglc-00

Draft:
https://datatracker.ietf.org/doc/draft-ietf-wimse-workload-identity-practices/

Added a new pattern, the service mesh

Multi-tenant problems:

WIMSE for AI Agent Identity (10min) - Yuan Ni

Slides:
https://datatracker.ietf.org/meeting/124/materials/slides-124-wimse-wimse-applicability-for-ai-agents-02

Draft:
https://datatracker.ietf.org/doc/draft-ni-wimse-ai-agent-identity/

OAuth Delegated Auth (10min) - Ruochen

Slides:
https://datatracker.ietf.org/meeting/124/materials/slides-124-wimse-delegated-authorization-00

Draft:
https://datatracker.ietf.org/doc/draft-li-oauth-delegated-authorization/

AOB

Arndt - key distribution and management

This is out of scope of the Architecture but there is a reference in S2S

There is a de facto standard for WebPKI

AOB

Chair

There are 7 Drafts in, we need to review and ship them

Any Other Business (5min) - Chairs