JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0 Note the title says "for OAuth2"
Sorry. Couldn't resist. Phil Sent from my phone. On 2013-02-28, at 9:40, John Bradley <ve7...@ve7jtb.com> wrote: > JWT is an assertion( I am probably going to regret using that word). > > It is used in openID connect for id_tokens, it is used in OAuth for Assertion > grant types and authentication of the client to the token endpoint. > http://tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-04 > > JSON Web Token (JWT) Bearer Token Profiles for OAuth 2.0 > > Dosen't define JWT's use for access tokens for the RS. > > Bottom line JWT is for more than access tokens. > > John B. > > On 2013-02-28, at 9:28 AM, Phil Hunt <phil.h...@oracle.com> wrote: > >> Are you saying jwt is not an access token type? >> >> Phil >> >> Sent from my phone. >> >> On 2013-02-28, at 8:58, John Bradley <ve7...@ve7jtb.com> wrote: >> >>> Yes, defining scope in JWT is the wrong place. JWT needs to stick to the >>> security claims needed to process JWT. >>> >>> I also don't know how far you get requiring a specific authorization format >>> for JWT, some AS will wan to use a opaque reference, some might want to use >>> a user claim or role claim, others may use scopes, combining scopes and >>> claims is also possible. >>> >>> Right now it is up to a AS RS pair to agree on how to communicate >>> authorization. I don't want MAC to be more restrictive than bearer when >>> it comes to authorization between AS and RS. >>> >>> Hannes wanted to know why JWT didn't define scope. The simple answer is >>> that it is out of scope for JWT itself. It might be defined in a OAuth >>> access token profile for JWT but it should not be specific to MAC. >>> >>> John B. >>> On 2013-02-28, at 8:44 AM, Brian Campbell <bcampb...@pingidentity.com> >>> wrote: >>> >>>> I think John's point was more that scope is something rather specific to >>>> an OAuth access token and, while JWT is can be used to represent an access >>>> token, it's not the only application of JWT. The 'standard' claims in JWT >>>> are those that are believed (right or wrong) to be widely applicable >>>> across different applications of JWT. One could argue about it but scope >>>> is probably not one of those. >>>> >>>> It would probably make sense to try and build a profile of JWT >>>> specifically for OAuth access tokens (though I suspect there are some >>>> turtles and dragons in there), which might be the appropriate place to >>>> define/register a scope claim. >>>> >>>> >>>> On Thu, Feb 28, 2013 at 9:24 AM, Phil Hunt <phil.h...@oracle.com> wrote: >>>>> Are you advocating TWO systems? That seems like a bad choice. >>>>> >>>>> I would rather fix scope than go to a two system approach. >>>>> >>>>> Phil >>>>> >>>>> Sent from my phone. >>>>> >>>>> On 2013-02-28, at 8:17, John Bradley <ve7...@ve7jtb.com> wrote: >>>>> >>>>> > While scope is one method that a AS could communicate authorization to >>>>> > a RS, it is not the only or perhaps even the most likely one. >>>>> > Using scope requires a relatively tight binding between the RS and AS, >>>>> > UMA uses a different mechanism that describes finer grained operations. >>>>> > The AS may include roles, user, or other more abstract claims that the >>>>> > the client may (god help them) pass on to EXCML for processing. >>>>> > >>>>> > While having a scopes claim is possible, like any other claim it is not >>>>> > part of the JWT core security processing claims, and needs to be >>>>> > defined by extension. >>>>> > >>>>> > John B. >>>>> > On 2013-02-28, at 2:29 AM, Hannes Tschofenig >>>>> > <hannes.tschofe...@gmx.net> wrote: >>>>> > >>>>> >> Hi Mike, >>>>> >> >>>>> >> when I worked on the MAC specification I noticed that the JWT does not >>>>> >> have a claim for the scope. I believe that this would be needed to >>>>> >> allow the resource server to verify whether the scope the >>>>> >> authorization server authorized is indeed what the client is asking >>>>> >> for. >>>>> >> >>>>> >> Ciao >>>>> >> Hannes >>>>> >> >>>>> >> _______________________________________________ >>>>> >> OAuth mailing list >>>>> >> OAuth@ietf.org >>>>> >> https://www.ietf.org/mailman/listinfo/oauth >>>>> > >>>>> > _______________________________________________ >>>>> > OAuth mailing list >>>>> > OAuth@ietf.org >>>>> > https://www.ietf.org/mailman/listinfo/oauth >>>>> _______________________________________________ >>>>> OAuth mailing list >>>>> OAuth@ietf.org >>>>> https://www.ietf.org/mailman/listinfo/oauth >
_______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth