Aaron Parecki's Avatar

Aaron Parecki

@aaronpk.com

#OAuth #IndieWeb

1,921
Followers
132
Following
257
Posts
02.03.2023
Joined
Posts Following

Latest posts by Aaron Parecki @aaronpk.com

I'm setting up a temporary laptop for my next trip and it's shocking how much faster the cross-device passkey flow is compared to looking up and hand typing my long 1Password passwords

05.03.2026 19:26 ๐Ÿ‘ 7 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

Oh crazy, I didn't realize that. Yeah they should really add that.

02.03.2026 19:11 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0

Sorry why wouldn't they be able to do client authentication with CIMDs? There's a description of how to do that in the spec.

02.03.2026 19:04 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Caw

Inspired by some #indieweb folks creating /caw pages on their websites, I made one of my own! Here you can listen to the most recent crow recorded from my house:

aaronparecki.com/caw/

13.02.2026 22:30 ๐Ÿ‘ 2 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

Apparently I missed the introduction of the 4.4mm TRRRS audio jack 10 years ago and just now discovered it. What a cool idea.

26.01.2026 19:35 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

I'd be happy to talk, what we need right now is to demonstrate that the people who run websites you'd be logging in to also want to improve their UX with FedCM. Feel free to send people my way

15.01.2026 02:49 ๐Ÿ‘ 3 ๐Ÿ” 0 ๐Ÿ’ฌ 2 ๐Ÿ“Œ 0

Oh crap I just realized the "it" he was referring to was probably the food, not his critical thinking.

13.01.2026 05:08 ๐Ÿ‘ 7 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

"I'll just check my critical thinking and nuke it in the microwave" has to be my favorite quote from this Business Insider video on Trader Joe's white-labeled food

12.01.2026 20:59 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0

Me looking at my todo list on a Sunday night after having done at least a couple things today, yet somehow it looks more like a list of what I did *not* do today.

11.01.2026 19:21 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

oh no, due to a series of misclicks, I just accidentally archived the most recent 100 emails in my inbox.

if nothing else, reviewing my "all mail" folder is doing a good job of making me question how important emails in my inbox actually are.

16.12.2025 19:42 ๐Ÿ‘ 4 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
GitHub - aaronpk/Meetable: an event listing website an event listing website. Contribute to aaronpk/Meetable development by creating an account on GitHub.

Not that this is a 1:1 replacement, but it is one of the reasons I built Meetable.org, so communities can create their own calendars on their own domains.

03.12.2025 01:05 ๐Ÿ‘ 9 ๐Ÿ” 2 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Preview
Client Registration and Enterprise Management in the November 2025 MCP Authorization Spec The new MCP authorization spec is here! Today marks the one-year anniversary of the Model Context Protocol, and with it, the launch of the new 2025-11-25 specification. Iโ€™ve been helping out with the ...

๐Ÿ” Enterprise-Managed Authorization extension (aka Cross App Access) - eliminate the OAuth redirect and get tokens for an MCP server by requesting them from the enterprise IdP

Read more about what these mean for you in my full post
๐Ÿ‘‰ aaronparecki.com/2025/11/25/1...

25.11.2025 23:14 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 1

The new MCP spec just dropped! ๐ŸŽ‰

There's too many new things to get into everything, but there are two big changes I am most excited about ๐Ÿ‘€

๐Ÿ“ Client ID Metadata Documents (CIMD) - a simpler way to manage client registrations, clients describe themselves with a URL they control

25.11.2025 23:14 ๐Ÿ‘ 3 ๐Ÿ” 5 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0

I don't know anything about the protocol but if they support the same OAuth spec as ATProto and same user ID discovery it would work

15.10.2025 18:36 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

even with all the emoji? lol

12.10.2025 22:47 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

๐Ÿ‘๐Ÿ‘

11.10.2025 23:08 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

The dots that Solid OIDC connected were to specifically use the RFC7591 vocabulary in a JSON doc at the client ID URL, whereas IndieAuth originally parsed the metadata from HTML, and OpenID Federation nests the metadata inside an "Entity Statement" JSON wrapper.

11.10.2025 22:59 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0

I mean it was a big mix of things really. Most recently the JSON document idea came from there, but "client IDs as URLs" has been part of IndieAuth since 2015 web.archive.org/web/20150315... and OpenID Federation since 2016 openid.net/specs/openid...

11.10.2025 22:55 ๐Ÿ‘ 2 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0

Yeah I definitely went hard mode by writing everything from scratch (except the JWT signing). Partly because I wanted to see what it actually takes to implement a library, partly because I can't stand the current state of most language's package management ๐Ÿ˜…

11.10.2025 21:05 ๐Ÿ‘ 4 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
Adding Support for BlueSky to IndieLogin.com Today I just launched support for BlueSky as a new authentication option in IndieLogin.com!

I just finished adding BlueSky support to IndieLogin.com! Now you can log in to websites like indieweb.org with your BlueSky handle!

11.10.2025 17:51 ๐Ÿ‘ 85 ๐Ÿ” 19 ๐Ÿ’ฌ 5 ๐Ÿ“Œ 2
Preview
CIMD - OAuth Client ID Metadata Documents Learn about Client ID Metadata Documents (CIMD) - a new OAuth approach that lets clients identify themselves using URLs instead of preregistration. Presented by Stytch.

The folks at Stytch put together a really nice explainer website about it too! cimd.dev

11.10.2025 16:27 ๐Ÿ‘ 15 ๐Ÿ” 3 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 1

This could replace Dynamic Client Registration in MCP, dramatically simplifying management of clients, as well as enabling servers to limit access to specific clients if they want.

11.10.2025 16:27 ๐Ÿ‘ 8 ๐Ÿ” 1 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0

The recent surge in interest in MCP has further demonstrated the need for this to be a standardized mechanism, and was the main driver in the latest round of discussion for the document!

11.10.2025 16:27 ๐Ÿ‘ 6 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 1

The mechanism of clients identifying themselves as a URL has been in use in IndieAuth for over a decade, and more recently has been adopted by BlueSky for their OAuth API.

11.10.2025 16:27 ๐Ÿ‘ 14 ๐Ÿ” 2 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0

Clients identify themselves with their own URL, and host their metadata (name, logo, redirect URL) in a JSON document at that URL. They then use that URL as the client_id to introduce themselves to an authorization server for the first time.

11.10.2025 16:27 ๐Ÿ‘ 10 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0

The IETF OAuth Working Group has adopted the Client ID Metadata Document specification!

> This specification defines a mechanism through which an OAuth client can identify itself to authorization servers, without prior dynamic client registration or other existing registration.

11.10.2025 16:26 ๐Ÿ‘ 53 ๐Ÿ” 5 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 1

Yes, I helped them with it. They also use the client-id-url technique that came from IndieAuth

02.10.2025 14:14 ๐Ÿ‘ 6 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0

Thanks to everyone for your contributions and feedback so far!

And thanks to my co-authors Karl McGuinness and Brian Campbell!

20.09.2025 14:20 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

While it will still be a while before it is an RFC, this is an important step in the standards process, as this is the first time the document is "official"! This signifies that the working group agrees that the problem is worth solving, and agrees on the general direction of the spec.

20.09.2025 14:20 ๐Ÿ‘ 3 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Preview
Identity Assertion Authorization Grant This specification provides a mechanism for an application to use an identity assertion to obtain an access token for a third-party API by coordinating through a common enterprise identity provider us...

The IETF OAuth Working Group has adopted the Identity Assertion Authorization Grant specification!

datatracker.ietf.org/doc/draft-ie...

This is the basis of Cross App Access (XAA), providing IT admins better visibility and control by configuring the app-to-app connections in their enterprise IdP.

20.09.2025 14:19 ๐Ÿ‘ 6 ๐Ÿ” 4 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0