Hi all, I asked for feedback regarding the removal of the client assertion credentials earlier this month, see http://www.ietf.org/mail-archive/web/oauth/current/msg05261.html
Unfortunately, the feedback did not lead to any new insight other than there are three groups of people: 1) Those who want the functionality removed from the draft 2) Those who want it to be included. 3) Those who want something different in the document (namely a stronger version). These three groups are equally large (based on the feedback). I have attached the text from version -11 of the draft. So, my suggestion to the group therefore is for those who are interested in this functionality in one way or the other to provide text that the group can agree with in time before we submit the document to the IESG (1). If that does not happen the client assertion credential will have to be developed as a separate document (if there is enough energy and interest in the group). A note regarding (1): Currently, the security consideration section is missing since otherwise the document is ready for a working group last call (in my view). So, once that is there and agreed I will start a working group last call. Ciao Hannes ----- 3.2. Client Assertion Credentials The client assertion credentials are used in cases where a password (clear-text shared symmetric secret) is unsuitable or does not provide sufficient security for client authentication. In such cases it is common to use other mechanisms such as HMAC or digital signatures that do not require sending clear-text secrets. The client assertion credentials provide an extensible mechanism to use an assertion format supported by the authorization server for authentication the client. Using assertions requires the client to obtain an assertion (such as a SAML [OASIS.saml-core-2.0-os] assertion) from an assertion issuer or to self-issue an assertion. The assertion format, the process by which the assertion is obtained, and the method of validating the assertion are defined by the assertion issuer and the authorization server, and are beyond the scope of this specification. When using a client assertion, the client includes the following parameters: client_assertion_type REQUIRED. The format of the assertion as defined by the authorization server. The value MUST be an absolute URI. client_assertion REQUIRED. The client assertion. For example, the client sends the following access token request using a SAML 2.0 assertion to authenticate itself (line breaks are for display purposes only): POST /token HTTP/1.1 Host: server.example.com Content-Type: application/x-www-form-urlencoded grant_type=authorization_code&code=i1WsRn1uB1& client_assertion=PHNhbWxwOl[...omitted for brevity...]ZT4%3D& client_assertion_type= urn%3Aoasis%3Anames%sAtc%3ASAML%3A2.0%3Aassertion& redirect_uri=https%3A%2F%2Fclient%2Eexample%2Ecom%2Fcb When obtaining an access token using a client assertion together with an authorization code (as described in Section 5.1.1), a mechanism is needed to map between the value of "client_id" parameter used to obtain the authorization code, and the client assertion. Such mechanism is beyond the out of scope for this specification, but MUST be specified for any client assertion type used in combination with an authorization code. The authorization server MUST reject access token requests using client assertion credentials that do not contain HMAC or signed values that: o State the assertion was specifically issued to be consumed by the receiving endpoint (typically via an audience or recipient value containing the receiving endpoint's identifier). o Identify the entity that issued the assertion (typically via an issuer value). o Identify when the assertion expires as an absolute time (typically via an expiration value containing a UTC date/time value). The authorization server MUST reject expired assertions. _______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth