The JWT bearer spec is used in Connect for authenticating clients with asymmetric credentials.
I don't know at the moment how many server implementations support that as it is not MTI. I know it is on the Ping roadmap but not currently in shipping product. John B. On Apr 25, 2014, at 9:25 AM, Hannes Tschofenig <hannes.tschofe...@gmx.net> wrote: > Hi Sergey, > > no, your comment wasn't off-topic and I agree that more widespread > support of the JWT spec will also have a positive impact on the JWT > bearer implementation / deployment status. > > draft-ietf-oauth-jwt-bearer spec requires the JWT to be used in a > specific way. It does, however, make sense to indicate the JWT > implementation situation in the write-up. > > Ciao > Hannes > > > > On 04/25/2014 11:44 AM, Sergey Beryozkin wrote: >> >> On 25/04/14 10:24, Hannes Tschofenig wrote: >>> The implementation and deployment status of JWT is certainly good. >>> For this write-up it would, however, be interesting to know what the >>> implementation status of the JWT bearer assertion spec is. >> >> Was I off-topic ? Sorry about it, I thought it would be encouraging for >> experts to see the general status, the wider JWT is supported the more >> likely the count of JWT Bearer assertion adopters will go up >> >> Cheers, Sergey >> >>> >>> On 04/25/2014 10:50 AM, Sergey Beryozkin wrote: >>>> On 24/04/14 23:41, Mike Jones wrote: >>>>> I am aware of these implementations: >>>>> Microsoft Azure Active Directory: >>>>> http://azure.microsoft.com/en-us/services/active-directory/ >>>>> Google Service Account: >>>>> https://developers.google.com/accounts/docs/OAuth2ServiceAccount >>>>> >>>>> I believe that Ping Identity and Salesforce also have implementations, >>>>> but I'll let Brian and Chuck authoritatively speak to those. >>>> >>>> Here is some info about open source projects: >>>> >>>> Apache Oltu has a good support for working with JWT, believe Spring >>>> Security has it (I haven't tried) and JBoss KeyCloak team works with >>>> JWT, work for supporting JWT Bearer is in progress in Apache CXF (a >>>> month or so away). >>>> >>>> There will be a pretty good coverage for it... >>>> >>>> Sergey >>>> >>>>> >>>>> -- Mike >>>>> >>>>> -----Original Message----- >>>>> From: OAuth [mailto:oauth-boun...@ietf.org] On Behalf Of Hannes >>>>> Tschofenig >>>>> Sent: Wednesday, April 23, 2014 1:40 AM >>>>> To: oauth@ietf.org >>>>> Subject: [OAUTH-WG] draft-ietf-oauth-jwt-bearer Shepherd Write-up >>>>> >>>>> Hi all, >>>>> >>>>> I am working on the shepherd writeup for the JWT bearer document. The >>>>> shepherd write-ups for the assertion draft and the SAML bearer >>>>> document have been completed a while ago already, see >>>>> http://www.ietf.org/mail-archive/web/oauth/current/msg12410.html >>>>> >>>>> A few requests: >>>>> >>>>> - To the document authors: Please confirm that any and all appropriate >>>>> IPR disclosures required for full conformance with the provisions of >>>>> BCP >>>>> 78 and BCP 79 have already been filed. >>>>> >>>>> - To all: Are you aware of implementations of this specification? If >>>>> so, I would like to reference them in my write-up. >>>>> >>>>> - To all: Please also go through the text to make sure that I >>>>> correctly reflect the history and the status of this document. >>>>> >>>>> Here is the most recent version of the write-up: >>>>> https://raw.githubusercontent.com/hannestschofenig/tschofenig-ids/master/shepherd-writeups/Writeup_OAuth_JWT-Assertion-Profile.txt >>>>> >>>>> >>>>> >>>>> >>>>> (The copy-and-paste of the full version is below.) >>>>> >>>>> Ciao >>>>> Hannes >>>>> >>>>> PS: Note that I have send a mail about a pending issue to the list. In >>>>> response to my question I will update the write-up accordingly. >>>>> >>>>> ---- >>>>> >>>>> Writeup for "JSON Web Token (JWT) Profile for OAuth 2.0 Client >>>>> Authentication and Authorization Grants" >>>>> <draft-ietf-oauth-saml2-bearer-08> >>>>> >>>>> (1) What type of RFC is being requested (BCP, Proposed Standard, >>>>> Internet Standard, Informational, Experimental, or Historic)? Why is >>>>> this the proper type of RFC? Is this type of RFC indicated in the >>>>> title page header? >>>>> >>>>> The RFC type is 'Standards Track' and the type is indicated in the >>>>> title page. This document defines an instantiation for the OAuth >>>>> assertion framework using JSON Web Tokens. >>>>> >>>>> (2) The IESG approval announcement includes a Document Announcement >>>>> Write-Up. Please provide such a Document Announcement Write-Up. Recent >>>>> examples can be found in the "Action" announcements for approved >>>>> documents. The approval announcement contains the following sections: >>>>> >>>>> Technical Summary: >>>>> >>>>> This specification defines the use of a JSON Web Token (JWT) >>>>> Bearer >>>>> Token as a means for requesting an OAuth 2.0 access token as >>>>> well as >>>>> for use as a means of client authentication. >>>>> >>>>> Working Group Summary: >>>>> >>>>> Was there anything in WG process that is worth noting? For example, >>>>> was there controversy about particular points or were there decisions >>>>> where the consensus was particularly rough? >>>>> >>>>> This document belongs to the OAuth assertion document bundle >>>>> consisting of the abstract OAuth assertion framework, and the SAML >>>>> assertion profile. Due to the use of the JSON-based encoding of the >>>>> assertion it also relies on the work in the JOSE working group (such >>>>> as JWE/JWS) indirectly through the use of the JWT. This document has >>>>> intentionally been kept in sync with the SAML-based version. >>>>> >>>>> Document Quality: >>>>> >>>>> This document has gone through many iterations and has received >>>>> substantial feedback. >>>>> >>>>> [[Add implementation list here.]] >>>>> >>>>> Personnel: >>>>> >>>>> The document shepherd is Hannes Tschofenig and the responsible area >>>>> director is Kathleen Moriarty. >>>>> >>>>> (3) Briefly describe the review of this document that was performed by >>>>> the Document Shepherd. If this version of the document is not ready >>>>> for publication, please explain why the document is being forwarded to >>>>> the IESG. >>>>> >>>>> The draft authors believe that this document is ready for publication. >>>>> The document has had received review comments from working group >>>>> members, and from the OAuth working group chairs. These review >>>>> comments have been taken into account. >>>>> >>>>> (4) Does the document Shepherd have any concerns about the depth or >>>>> breadth of the reviews that have been performed? >>>>> >>>>> This document has gotten feedback from the working group and given the >>>>> focused use cases it has received adequate review. >>>>> >>>>> (5) Do portions of the document need review from a particular or from >>>>> broader perspective, e.g., security, operational complexity, AAA, DNS, >>>>> DHCP, XML, or internationalization? If so, describe the review that >>>>> took place. >>>>> >>>>> Since the OAuth working group develops security protocols any feedback >>>>> from the security community is always appreciated. >>>>> >>>>> (6) Describe any specific concerns or issues that the Document >>>>> Shepherd has with this document that the Responsible Area Director >>>>> and/or the IESG should be aware of? For example, perhaps he or she is >>>>> uncomfortable with certain parts of the document, or has concerns >>>>> whether there really is a need for it. In any event, if the WG has >>>>> discussed those issues and has indicated that it still wishes to >>>>> advance the document, detail those concerns here. >>>>> >>>>> The shepherd has no concerns with this document. >>>>> >>>>> (7) Has each author confirmed that any and all appropriate IPR >>>>> disclosures required for full conformance with the provisions of BCP >>>>> 78 and BCP 79 have already been filed. If not, explain why? >>>>> >>>>> [[Confirmation from the authors required.]] >>>>> >>>>> (8) Has an IPR disclosure been filed that references this document? If >>>>> so, summarize any WG discussion and conclusion regarding the IPR >>>>> disclosures. >>>>> >>>>> No IPR disclosures have been filed on this document. However, two IPRs >>>>> have been filed for the JWT specification this document relies on, see >>>>> http://datatracker.ietf.org/ipr/search/?option=document_search&id=draft-ietf-oauth-json-web-token >>>>> >>>>> >>>>> >>>>> >>>>> (9) How solid is the WG consensus behind this document? Does it >>>>> represent the strong concurrence of a few individuals, with others >>>>> being silent, or does the WG as a whole understand and agree with it? >>>>> >>>>> The working group has consensus to publish this document. >>>>> >>>>> (10) Has anyone threatened an appeal or otherwise indicated extreme >>>>> discontent? If so, please summarise the areas of conflict in separate >>>>> email messages to the Responsible Area Director. (It should be in a >>>>> separate email because this questionnaire is publicly available.) >>>>> >>>>> No appeal or extreme discontent has been raised. >>>>> >>>>> (11) Identify any ID nits the Document Shepherd has found in this >>>>> document. (See http://www.ietf.org/tools/idnits/ and the >>>>> Internet-Drafts Checklist). Boilerplate checks are not enough; this >>>>> check needs to be thorough. >>>>> >>>>> The shepherd has checked the nits. >>>>> >>>>> (12) Describe how the document meets any required formal review >>>>> criteria, such as the MIB Doctor, media type, and URI type reviews. >>>>> >>>>> There is no such review necessary. >>>>> >>>>> (13) Have all references within this document been identified as >>>>> either normative or informative? >>>>> >>>>> Yes. >>>>> >>>>> (14) Are there normative references to documents that are not ready >>>>> for advancement or are otherwise in an unclear state? If such >>>>> normative references exist, what is the plan for their completion? >>>>> >>>>> Yes. >>>>> >>>>> (15) Are there downward normative references references (see RFC 3967)? >>>>> If so, list these downward references to support the Area Director in >>>>> the Last Call procedure. >>>>> >>>>> RFC 6755 defines the urn:ietf:params:oauth URN and is an Informational >>>>> RFC. A downref is required. >>>>> >>>>> However, this document depends on the completion of the abstract OAuth >>>>> assertion framework and on the JWT specification. >>>>> There are the following dependencies: >>>>> >>>>> (16) Will publication of this document change the status of any >>>>> existing RFCs? Are those RFCs listed on the title page header, listed >>>>> in the abstract, and discussed in the introduction? If the RFCs are >>>>> not listed in the Abstract and Introduction, explain why, and point to >>>>> the part of the document where the relationship of this document to >>>>> the other RFCs is discussed. If this information is not in the >>>>> document, explain why the WG considers it unnecessary. >>>>> >>>>> The publication of this document does not change the status of other >>>>> RFCs. >>>>> >>>>> (17) Describe the Document Shepherd's review of the IANA >>>>> considerations section, especially with regard to its consistency with >>>>> the body of the document. Confirm that all protocol extensions that >>>>> the document makes are associated with the appropriate reservations in >>>>> IANA registries. >>>>> Confirm that any referenced IANA registries have been clearly >>>>> identified. Confirm that newly created IANA registries include a >>>>> detailed specification of the initial contents for the registry, that >>>>> allocations procedures for future registrations are defined, and a >>>>> reasonable name for the new registry has been suggested (see RFC 5226). >>>>> >>>>> The document registers two sub-namespaces to the urn:ietf:params:oauth >>>>> URN established with RFC 6755. >>>>> >>>>> (18) List any new IANA registries that require Expert Review for >>>>> future allocations. Provide any public guidance that the IESG would >>>>> find useful in selecting the IANA Experts for these new registries. >>>>> >>>>> The document only adds entries to existing registries and does not >>>>> define any new registries. >>>>> >>>>> (19) Describe reviews and automated checks performed by the Document >>>>> Shepherd to validate sections of the document written in a formal >>>>> language, such as XML code, BNF rules, MIB definitions, etc. >>>>> >>>>> There are only snippets of message exchanges and JWT assertion >>>>> structures, which are based on JSON, used in the examples. There is no >>>>> pseudo code contained in the document that requires validation. >>>>> >>>>> >>>>> >>>>> _______________________________________________ >>>>> OAuth mailing list >>>>> OAuth@ietf.org >>>>> https://www.ietf.org/mailman/listinfo/oauth >>>>> >>>> >>>> _______________________________________________ >>>> OAuth mailing list >>>> OAuth@ietf.org >>>> https://www.ietf.org/mailman/listinfo/oauth >>> >> > > _______________________________________________ > OAuth mailing list > OAuth@ietf.org > https://www.ietf.org/mailman/listinfo/oauth _______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth