Every four years, OpenID Foundation Japan is having an educational meeting called “OpenID Summit Tokyo”. The next one is coming up on January 24, 2020.
This year, it will be at a brand new venue called Shibuya Stream Hall in Shibuya, Tokyo.
The schedule is as follows.
OpenID Summit Tokyo 2020
Jan 24, 2020
@ Shibuya Stream Hall
Time | Grand Hall | Breakout Room |
10:00-10:10 | Opening Remark Masanori Kusunoki, Chair, OpenID Foundation Japan | — |
10:10-10:40 | Keynote 1 Identity 2020, 2025, and 2030 Ian Glazer, Director, Salesforce | — |
10:40-11:10 | Keynote 2 True Human Identity in the Digital Realm Kim Cameron | Talk to Evangelists |
11:10-11:40 | Keynote 3 Enabling large-scale multi-party federations with OpenID Connect Mike Jones | Talk to Evangelists |
11:40-12:30 | Break | — |
12:30-13:00 | Open Banking beyond PSD2 in the EU Torsten Lodderstedt Yes | Device Identity as Yet Untold – Enterprise Security and Device Identity (Kengo Suzuki) |
13:00-13:30 | Financial API Updates | WebAuthn using Cloud-assisted BLE (caBLE) (Yoshihiko Nagoya, Lepidum) |
13:30-14:00 | Updates on OIDF-J KYC WG Naohiro Fujie, Member of the board, OpenID Foundation Japan | Digital-Keep platform that enables secure rights transactions through the establishment of Digital Identity and eKYC/OIDC (Hiroshi Yamamoto, BitKey) |
14:00-14:30 | Updates on the FIDO/eKYC/DID in Korea and the prospects on the future (Bradly Kim, R&D Center/CTO, RaonSecure Co., Ltd.) | Updates on the specs surrounding Native Apps and OpenID Connect (Kazuki Tsuzuki, Yahoo Japan) |
14:30-14:50 | Break | — |
14:50-15:20 | Sponsor Session (1): Identity proofing as the key to the second generation IDaaS – NIST, Supply Chain Security and Orphan ID – (Jun’ichi Egawa, CEO, Exgen Network Inc.) | Authentication Design Patterns using FIDO (WebAuthN) (Toshiki Matsui, KDDI) |
15:20-15:50 | Sponsor Session (2): A deployment case on the unified secure identity management with FIDO and Social Network Identities – Introduction to a cloud identity platform “SELMID” (Kyoka Hanai, Western Japan Business Development Team, CTC Solutions) | Introduction to OpenID Connect Client Initiated Backchannel Authentication Flow (CIBA)– New User Experience and implementation examples (Takehisa Shibata, Takumi Akaboshi, NRI Secure Technologies) |
15:50-16:20 | Updates on the gBizID that utilizes OpenID Connect (Hisafumi Mitsushio, Ministry of Economy, Advisor to CIO, Trade and Industry, Japan)OpenID Connect | Our Identity Experience (Andrew Hindle, Board Member, IDPro; Content Chair, Identiverse) |
16:20-16:50 | Research data management space that NII promotes (Kaz Yamaji, Professor, National Insititute of Informatics) | — |
16:50-17:10 | Break | — |
17:10-17:40 | Closing Keynote: No ID, No DX Nat Sakimura, Chairman, OpenID Foundation | — |
17:40-17:50 | Closing remarks: Masanori Kusunoki, Chairman, OpenID Foundation Japan | — |
To register, go to: https://openid.connpass.com/event/157830/
There are a few side events planned as well.
AB/Connect WG F2F / Workshop
Jan 23 (Thursday) 13:00 – 18:00
@ NRI Otemachi office (just beside the Palace) on the Connect Strategy/Next Steps.
Agenda:
- Strategy session on how to propagate Connect to the enterprise world.
- Plan out OpenID Connect 1.1 that leverages OAuth JAR
- Plan out the OpenID Connect Self-Issued spec. (and DID thing perhaps.)
- Strategy to propagate Connect to R&E
Self-sovereign identity day
Jan 27 (Monday) 10:00 – 17:00
@ Sheraton Grande Ocean Resort (Miyazaki)
eKYC Workshop led by Torsten Lodderstedt and Naohiro Fujie with eKYC discussion group in OIDF-J.
Jan 28 (Tuesday) 15:00 – 18:00
@ NRI Otemachi Office
How to Request the seats in the Side Events
The capacity of the side events are extremely limited, especially for the WG meeting and eKYC Workshop. There is no guarantee for getting you a seat at all: in fact, it should be rather difficult. However, if you are interested to join, please let me know through the following Google Form:
https://forms.gle/2utHiJW9SuS8iAHD8
No guests that are not pre-registered and is assigned a seat will be admitted to the venue.