OpenID Connect specifications published as ISO standards

OIDC servers and real‑world implementations

  • Several implementations are discussed: Keycloak, Apereo CAS, ORY Hydra, Zitadel, Authentik, Gluu, Dex; commercial/self-hosted options like FusionAuth, ADFS; hosted providers such as Okta/Auth0, Google, Microsoft, GitHub, Amazon.
  • Keycloak is widely used but described as a “mixed bag”: powerful and extensible, good for complex policy/certification-heavy environments, but with rough edges.
    • Pain points: inconsistent REST API, weak docs, tricky multi-tenancy, complicated flow customization UI, fragile email templates, non‑trivial branding, storage model making zero‑downtime upgrades hard.
    • Some see it as risky for very small teams without in‑house expertise; others say smaller teams can operate it fine if use cases are simple and someone understands OAuth/OIDC reasonably well.
  • CAS is used as an OIDC provider but supports only a single issuer per deployment; defaults to a rarely supported “nested” claims format.

OAuth, OpenID, and OpenID Connect

  • Multiple comments clarify: OAuth 2.0 is a framework for delegated access; OIDC is a profile on top of it that adds identity and authentication; older OpenID 1/2 (URL-based identity) are largely unrelated and mostly obsolete.
  • Debate over the common slogan “OAuth = authorization, OIDC = authentication”:
    • Some argue it’s useful shorthand.
    • Others say it’s misleading: OAuth 2.0 doesn’t standardize actual authorization models; OIDC is more like a standardized way to attach identity to OAuth flows.

Security, complexity, and evolving standards

  • OAuth 2.0 is criticized as too flexible and historically under-secure (implicit flow, password grant).
  • Newer guidance: OAuth 2.1 drafts, security best current practices, and FAPI 2.0 aim to narrow options and encode safer profiles (authorization code + PKCE, sender‑constrained tokens, PAR, etc.).
  • GNAP (now an RFC) is presented as a modernized successor for certain use cases, but adoption is unclear.

ISO standardization and paywall worries

  • Many object to ISO’s paywalled model, calling it harmful to progress and “law-like” documents that should be free.
  • Others note: in this case OIDC specs remain freely available; the ISO stamp mainly helps in jurisdictions or procurement processes that require ISO-recognized standards.
  • Some fear a PDF‑like scenario where a free vendor spec later becomes paywalled as an ISO-only version.

Identity philosophy and usability

  • Discussion contrasts original OpenID’s decentralized URL identity with OIDC’s more provider-centric model.
  • Some argue “identity provisioning” by large providers is conceptually flawed and fragile (account bans, domain lapses); prefer models closer to attestations or WebAuthn.
  • Others value having a widely adopted, interoperable standard even if it trades off some decentralization.