I was about to write about the same thing.  See 
http://openid.net/specs/openid-connect-messages-1_0.html#id_token for the 
definition of "acr" (Authentication Context Class Reference) as used by OpenID 
Connect.

It's not clear to me that this should move into the JWT spec itself, as I'd 
rather we get more industry experience with it first.  Most of the JWT 
definitions are intentionally very general, whereas the "acr" definition is 
intentionally much more specific, especially as it defines the values "1", "2", 
"3", and "4" as mappings to ISO29115 levels, plus the value "0" with the 
OpenID-specific meaning.

                                                                Cheers,
                                                                -- Mike

From: John Bradley [mailto:ve7...@ve7jtb.com]
Sent: Tuesday, May 15, 2012 9:54 AM
To: Lewis Adam-CAL022
Cc: Mike Jones; oauth@ietf.org
Subject: Re: [OAUTH-WG] JSON Web Token (JWT) Specification Draft -10

We added on in openID Connect.

acr : Though that is intended as a class reference for things like FICAM LoA 2 
etc.   You could make class references that only defined the primary 
authenticator.

The question  is if there is enough consensus to put it in the JWT spec rather 
than in things profiling JWT.  I am OK with putting it in JWT if there is a 
demand.

John B.
On 2012-05-15, at 10:54 AM, Lewis Adam-CAL022 wrote:


Hi,

Apologies if the OAuth list is not the right place to ask this question, but 
I'm trying to understand why JWT doesn't have an "Authentication Context" like 
reserved claim name (such as present in SAML).  Knowing the primary 
authentication method used to obtain the JWT seems just as fundamental as 
knowing the issuer, principal, etc.

I realize it's easy enough to add your own, but from an inter-op perspective, 
it just seems really valuable to be able to assert the primary authentication 
method.

Tx!
adam

From: oauth-boun...@ietf.org<mailto:oauth-boun...@ietf.org> 
[mailto:oauth-boun...@ietf.org]<mailto:[mailto:oauth-boun...@ietf.org]> On 
Behalf Of Mike Jones
Sent: Saturday, May 12, 2012 7:19 PM
To: oauth@ietf.org<mailto:oauth@ietf.org>
Subject: [OAUTH-WG] JSON Web Token (JWT) Specification Draft -10

Draft -10<http://self-issued.info/docs/draft-jones-json-web-token-10.html> of 
the JSON Web Token 
(JWT)<http://self-issued.info/docs/draft-jones-json-web-token.html> 
specification has been published.  It uses the -02 versions of the JOSE 
specifications and contains parallel editorial changes to those applied to the 
JOSE specs.  Changes were:

  *   Clarified the relationship between typ header parameter values, typ claim 
values, and MIME types.
  *   Clarified that JWTs with duplicate Header Parameter Names or Duplicate 
Claim names MUST be rejected.
  *   Required implementation of AES-128-KW and AES-256-KW when the 
implementation provides encryption capabilities.
  *   Registered "JWT" typ header parameter value.
  *   Generalized language to refer to Message Authentication Codes (MACs) 
rather than Hash-based Message Authentication Codes (HMACs) unless in a context 
specific to HMAC algorithms.
  *   Reformatted to give each claim definition and header parameter its own 
section heading.

The specification is available at:
*         http://tools.ietf.org/html/draft-jones-json-web-token-10

An HTML formatted version is available at:
*         http://self-issued.info/docs/draft-jones-json-web-token-10.html

                                                            -- Mike

_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to