I think that's the wrong perspective. If you intend the issuer to be the 
subject, you need to declare it.

I wouldn't worry that it duplicates issuer. The fields have different meaning.

Phil

@independentid
www.independentid.com
phil.h...@oracle.com

On 2014-03-11, at 1:43 PM, Antonio Sanso <asa...@adobe.com> wrote:

> agree, but in some cases the subject is not only same as the issuer but 
> simply it doesn’t matter.
> 
> In my example below all it matters is that the assertion signed by app1 is 
> valid…. 
> 
> Continue in my probably not relevant “Google example” if I set the prn same 
> as the issuer it would not work (keeping only the issuer without any subject 
> gives me back a correct access token instead).
> 
> Again this is not relevant spec wise. AFIU there is consensus in the working 
> group to keep the subject mandatory. Would it make sense at least to add a 
> little not that in some situations the issuer and the subject are the same?
> This might clarify at least something to people that do wonder...
> 
> regards
> 
> antonio
> 
> On Mar 11, 2014, at 8:12 PM, John Bradley <ve7...@ve7jtb.com> wrote:
> 
>> The specification is intended to allow the interoperation of standard 
>> libraries.  
>> 
>> In some cases the subject and the iss may be the same, however the 
>> underlying OAuth library may be a general one and always require a subject 
>> for security processing.
>> 
>> It is possible that all libraries could have a special rule for when sub is 
>> not present and use the value of iss as sub.  This will save some bytes in 
>> the JWT but it is probably not worth creating an extra code path in 
>> libraries for the size optimization. 
>> 
>> I don't think your saying there is no subject just that it is redundant with 
>> iss in some cases.
>> 
>> John B.
>> 
>> On Mar 11, 2014, at 2:11 PM, Antonio Sanso <asa...@adobe.com> wrote:
>> 
>>> Ok this is my use case:
>>> 
>>> - I  am John Doe and going to AS to register my app named app1
>>> - I then either upload my public key or download a private key
>>> - at this point I am ready to build my assertion, the issuer claim is going 
>>> to be app1 and should suffice.
>>> 
>>> is the subject really needed in this use case? 
>>> 
>>> regards
>>> 
>>> antonio
>>> 
>>> 
>>> On Mar 11, 2014, at 4:25 PM, John Bradley <ve7...@ve7jtb.com> wrote:
>>> 
>>>> The missing scheme especially on JWT issued by google is something I 
>>>> understand they are working on but need to be careful about breaking 
>>>> existing code, so will possibly need new endpoints that are spec 
>>>> compliant. 
>>>> 
>>>> While in this google case the subject and the issuer happen to be the same 
>>>> they may well not be even in the self signed case.   In WG discussions 
>>>> being consistent in providing the subject was considered to be better for 
>>>> interoperability than optimizing for the case where sub or issuer could be 
>>>> dropped.  
>>>> 
>>>> John B.
>>>> 
>>>> On Mar 11, 2014, at 12:05 PM, Hannes Tschofenig 
>>>> <hannes.tschofe...@gmx.net> wrote:
>>>> 
>>>>> Maintaining both information in the JWT is IMHO valuable since it gives
>>>>> you some information about the security properties. Needless to say that
>>>>> there is a substantial difference between a self-created JWT and a JWT
>>>>> from a third party the relying party has some confidence in.
>>>>> 
>>>>> Why Google has an old implementation and whether they are planning to
>>>>> update their code remains to be seen.
>>>>> 
>>>>> More importantly, however, is why you argue that the subject claim has
>>>>> to be optional.
>>>>> 
>>>>> Ciao
>>>>> Hannes
>>>>> 
>>>>> Ps: I also noticed in the examples that all URIs have their URI scheme
>>>>> missing. While that might be OK I am not entirely sure...
>>>>> 
>>>>> On 03/11/2014 04:08 PM, Antonio Sanso wrote:
>>>>>> 
>>>>>> On Mar 11, 2014, at 3:53 PM, Hannes Tschofenig 
>>>>>> <hannes.tschofe...@gmx.net> wrote:
>>>>>> 
>>>>>>> Thanks for clarifying.
>>>>>>> 
>>>>>>> I took a quick look at the Google API and it seems that in their use
>>>>>>> case the client creates the JWT and consequently the subject and the
>>>>>>> issue would actually be the same. I suspect that this is the reason why
>>>>>>> they omitted the subject.
>>>>>> 
>>>>>> agreed that is why in my mail I said the subject might overlap with the 
>>>>>> issuer.
>>>>>> The subject in the google case is still called with its obsolete name 
>>>>>> (prn) and it is actually listed as ‘additional claims’ hence not 
>>>>>> mandatory.
>>>>>> 
>>>>>> regards
>>>>>> 
>>>>>> antonio
>>>>>> 
>>>>>>> 
>>>>>>> Could you explain why you would like to omit the subject claim in the 
>>>>>>> JWT?
>>>>>>> 
>>>>>>> Ciao
>>>>>>> Hannes
>>>>>>> 
>>>>>>> PS: Your feedback on the  draft-ietf-oauth-jwt-bearer-07 spec is timely
>>>>>>> since we are about to finish all three assertion specs.
>>>>>>> 
>>>>>>> 
>>>>>>> On 03/11/2014 03:56 PM, Antonio Sanso wrote:
>>>>>>>> hi Hannes,
>>>>>>>> 
>>>>>>>> I am aware of the 2 documents,
>>>>>>>> 
>>>>>>>> I might be wrong but 
>>>>>>>> http://tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-07 is also 
>>>>>>>> about Authorization Grant Processing (this is the part I do use in my 
>>>>>>>> implementation ) and not only Client Authentication Processing.
>>>>>>>> 
>>>>>>>> Just my 0.02 $ but this seems to be a place where different 
>>>>>>>> implementer have the same issue :)
>>>>>>>> 
>>>>>>>> regards
>>>>>>>> 
>>>>>>>> antonio
>>>>>>>> 
>>>>>>>> On Mar 11, 2014, at 3:36 PM, Hannes Tschofenig 
>>>>>>>> <hannes.tschofe...@gmx.net> wrote:
>>>>>>>> 
>>>>>>>>> Hi Manfred, Hi Antonio,
>>>>>>>>> 
>>>>>>>>> Note that there are two documents that talk about the JWT and you guys
>>>>>>>>> might be looking at the wrong document.
>>>>>>>>> 
>>>>>>>>> The main JWT document (see
>>>>>>>>> http://tools.ietf.org/html/draft-ietf-oauth-json-web-token-18) defines
>>>>>>>>> the subject claim as optional (see Section 4.1.2).
>>>>>>>>> 
>>>>>>>>> The JWT bearer assertion document (see
>>>>>>>>> http://tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-07) does indeed
>>>>>>>>> define it as mandatory but that's intentional since the purpose of the
>>>>>>>>> spec is to authenticate the client (or the resource owner for an
>>>>>>>>> authorization grant).
>>>>>>>>> 
>>>>>>>>> The assertion documents are used for interworking with "legacy" 
>>>>>>>>> identity
>>>>>>>>> infrastructure (such as SAML federations).
>>>>>>>>> 
>>>>>>>>> So, are you sure you are indeed looking at the right document?
>>>>>>>>> 
>>>>>>>>> Ciao
>>>>>>>>> Hannes
>>>>>>>>> 
>>>>>>>>> 
>>>>>>>>> On 03/11/2014 03:13 PM, Antonio Sanso wrote:
>>>>>>>>>> hi *,
>>>>>>>>>> 
>>>>>>>>>> JSON Web Token (JWT) Profile section 3 [0] explicitely says 
>>>>>>>>>> 
>>>>>>>>>> The JWT MUST contain a "sub" (subject) claim 
>>>>>>>>>> 
>>>>>>>>>> 
>>>>>>>>>> Now IMHO there are cases where having the sub is either not needed or
>>>>>>>>>> redundant (since it might overlap with the issuer).\
>>>>>>>>>> 
>>>>>>>>>> As far as I can see “even Google” currently violates this spec [1] ( 
>>>>>>>>>> I
>>>>>>>>>> know that this doesn’t matter, just wanted to bring a real use case
>>>>>>>>>> scenario).
>>>>>>>>>> 
>>>>>>>>>> WDYT might the “sub” be optional in some situation?
>>>>>>>>>> 
>>>>>>>>>> regards
>>>>>>>>>> 
>>>>>>>>>> antonio 
>>>>>>>>>> 
>>>>>>>>>> [0] 
>>>>>>>>>> http://tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-07#section-3
>>>>>>>>>> [1] https://developers.google.com/accounts/docs/OAuth2ServiceAccount
>>>>>>>>>> 
>>>>>>>>>> 
>>>>>>>>>> _______________________________________________
>>>>>>>>>> OAuth mailing list
>>>>>>>>>> OAuth@ietf.org
>>>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>>>>> 
>>>>>>>>> 
>>>>>>>> 
>>>>>>> 
>>>>>> 
>>>>> 
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>> 
>>> 
>> 
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to