---
title: "Identity, Unlocked... Explained: Season 2, Ep. 5"
description: "SIOP with Kristina Yasuda"
authors:
  - name: "Vittorio Bertocci"
    url: "https://auth0.com/blog/authors/vittorio-bertocci/"
date: "Mar 22, 2021"
category: "Developers,Campaigns,Identity Unlocked"
tags: ["identity-unlocked", "podcast", "auth0"]
url: "https://auth0.com/blog/identity-unlocked-explained-season-2-ep-5/"
---

# Identity, Unlocked... Explained: Season 2, Ep. 5

In this episode of _Identity. Unlocked_, principal architect at [Auth0](https://auth0.com) and podcast host, Vittorio Bertocci, focuses on the Self-Issued OpenID Provider specification, also known as SIOP. We are joined today by Kristina Yasuda, Identity Standards Architect at Microsoft and longtime advocate of decentralized Identity.

## The Overview

Kristina opens by enunciating what SIOP is about, in a nutshell: the ability for an end user to present claims about themselves to a relying party (RP) without the need to redirect to an external provider. The scenario is further clarified through the enumeration of key use cases where that ability is useful, such as circumstances in which an external identity provider might cease to exist (as it actually happened in the earthquake/tsunami disaster that hit Japan ten years ago), or no longer be willing to provide service (as it might be the case in situations where democratic rule is under threat).

The original OpenID Core specification predicted the need for the SIOP, codifying it in [chapter 7](https://openid.net/specs/openid-connect-core-1_0.html#SelfIssued). However, at the time, the scenario was largely theoretical; hence the specification leaves out a number of important details - it is those gaps that SIOP is meant to fill. 

One of the most fundamental challenges to solve is the discovery problem, that is to say, the ability of an RP to discover and select a self-issued OP to use to authenticate the user in the current transaction. As a discovery mechanism to invoke a Self-Issued OP, the discussion on the podcast covered the usage of a custom schema 'openid://'. Alternative mechanisms to address the limitations of custom schemas are being actively explored in the WG.

The conversation meanders through deeper details, from how the current [SIOP specification draft](https://bitbucket.org/openid/connect/src/master/openid-connect-self-issued-v2-1_0.md) under the OpenID Foundation picks up the mission from a [former attempt under DIF](https://identity.foundation/did-siop/) to encoding approaches for verifiable presentations (embedding in JWTs, [LD proofs](https://w3c-ccg.github.io/ld-proofs/)), how to represent attributes (with a mention of [eKYC](https://openid.net/wg/ekyc-ida/), which we covered in an [earlier episode of the show](https://identityunlocked.auth0.com/public/49/Identity%2C-Unlocked.--bed7fada/ad784008)).

As a final thought, Kristina relays that a lot of the work that took place so far in this space aimed at developing data models- and that it's time to flesh out the transport, the protocol aspect of the scenarios.

In closing: the ideal call to action from all this is to implement the specs and give concrete feedback - and if the episode helped clarify the aim and the scenarios SIOP targets, to help spread that clarity and demystify the topic for others!

## Key Takeaways 

**[3:25]** - What is SIOP?
<iframe width="100%" height="230px" scrolling="no" style="border: none" src="https://identityunlocked.auth0.com/player/d430a348"></iframe> <br /> 

**[7:27]** - Mechanisms to leverage the relationship between OpenID provider and user. 
<iframe width="100%" height="230px" scrolling="no" style="border: none" src="https://identityunlocked.auth0.com/player/c71f9f9b"></iframe> <br />

**[8:52]** - A look at the original Chapter 7 of OpenID Connect. 
<iframe width="100%" height="230px" scrolling="no" style="border: none" src="https://identityunlocked.auth0.com/player/8917d786"></iframe> <br />

**[11:10]** - Planned revisions for Chapter 7 of OpenID Connect. 
<iframe width="100%" height="230px" scrolling="no" style="border: none" src="https://identityunlocked.auth0.com/player/21da8dad"></iframe> <br />

**[13:35]** - On what platform do these DIDs live? 
<iframe width="100%" height="230px" scrolling="no" style="border: none" src="https://identityunlocked.auth0.com/player/9bdabf19"></iframe> <br />

**[20:28]** - What is the current status of SIOP?
<iframe width="100%" height="230px" scrolling="no" style="border: none" src="https://identityunlocked.auth0.com/player/9d50331f"></iframe> <br />

**[25:00]** - Vittorio’s summary of the episode. 
<iframe width="100%" height="230px" scrolling="no" style="border: none" src="https://identityunlocked.auth0.com/player/7b823cd4"></iframe> <br />

**[27:00]** - Kristina’s call to action for listeners. 
<iframe width="100%" height="230px" scrolling="no" style="border: none" src="https://identityunlocked.auth0.com/player/f9f56d8c"></iframe> <br />

### Links/Resources:

OIDF SIOP draft [here](https://bitbucket.org/openid/connect/src/master/openid-connect-self-issued-v2-1_0.md)<br />
Old DIF SIOP draft [here](https://identity.foundation/did-siop/)<br />
LD proofs [here](https://w3c-ccg.github.io/ld-proofs/)<br />

Learn more about [JWK thumbprints](https://connect2id.com/products/nimbus-jose-jwt/examples/jwk-thumbprints)<br />
Learn more about [Kristina Yasuda](https://www.linkedin.com/in/kristina-yasuda-6263b5a2?originalSubdomain=jp) <br />

Connect with Vittorio Bertocci on [Twitter](https://twitter.com/vibronet)<br />
Learn more about [Identity, Unlocked](https://identityunlocked.auth0.com/public/49/Identity%2C-Unlocked.--bed7fada/episodes)<br />
Find out more on [Auth0](https://auth0.com/)<br />
Learn more about the sponsor for this season, the [OpenID Foundation](https://openid.net/foundation/)<br />

## About OpenID Foundation

The OpenID Foundation is a non-profit international standardization organization of individuals and companies committed to enabling, promoting, and protecting OpenID technologies. Formed in June 2007, the foundation serves as a public trust organization representing the open community of developers, vendors, and users. OIDF assists the community by providing needed infrastructure and helps in promoting and supporting the expanded adoption of OpenID. This entails managing intellectual property and brand marks as well as fostering viral growth and global participation in the proliferation of OpenID.

<include src="asides/IdentityUnlocked" />

<include src="asides/AboutAuth0" />