The "jwks" meta-data parameter may also be required for some of the Proof of Possession flows. Allowing a client to register its public key is important for reducing the number of long term symetric keys that need to be maintained.
On Apr 30, 2014, at 5:15 PM, Brian Campbell <bcampb...@pingidentity.com> wrote: > As Mike and Torsten have said, and for the same reasons, I would also like to > see the "jwks" metadata parameter added. > > > On Sun, Apr 20, 2014 at 4:14 AM, Torsten Lodderstedt > <tors...@lodderstedt.net> wrote: > Hi all, > > I also believe both documents should be merged. > > Nevertheless, here are my comments on the current drafts: > > > * OAuth 2.0 Dynamic Client Registration Core Protocol > http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-16 > > 1.2. Terminology > > " Multiple instances of the same piece of client software MAY use > the same Client ID value at an authorization server, provided that > the Redirection URI values and potentially other values dictated > by authorization server policy are the same for all instances." > > Which entity determines whether the same client id is used for different > instances? Given the current protocol design, I would assume it is at the > discretion of the authz server. Other opinions? > > "Software Statement ... It may also be accepted by some authorization servers > directly as a Client ID value, without prior registration." > > under which circumstances does an authz server accept a software statement as > client_id? How does the client know? I think the idea is valuable but needs > much more text in order to come up with an interoperable protocol design. > > 1.3. Protocol Flow > > Initial Access Token vs. Software Statement: In my opinion, those concepts > are two different ways to authorize client registration. Although there are > the typical differences between tokens and assertions (such as opaque content > vs. defined syntax), I feel software statements could supersede initial > access tokens. > Thoughts? > > 2. Client Metadata > > "redirect_uris ... It is > RECOMMENDED that clients using these flows register this > parameter, and an authorization server SHOULD require ..." > > I consider this a rather weak statement - does this foster interop? Why not > requiring registration of redirect_uris for all clients using web-based grant > types. > > last paragraph: > "If the same client metadata name is present in both > locations, the value in the software statement SHOULD take > precedence." > > why not MUST? > > 3. Software Statement > > Is there a need to require a certain signature method for JWTs used as > software statement (interop)? JWT itself requires "HMAC" and "none", which > both are of no or limited value in this context. RSA is just recommended by > the JWT spec. > > 5.1 > > "If a software statement was used as part of the registration, its > value SHOULD be returned in the response and its value MUST be > returned if the authorization server supports registration management > operations [OAuth.Registration.Management] that would require its > presence in subsequent operations." > > I don't get the connection between software statements and the management > API. In the management API spec, I only found a reference to software > statements in the introduction. Should this text just be removed? > > 5.2 > > error codes - invalid_client_metadata > > I consider this underspecified. How is the client supposed to react if this > error occurs? I would expect the authz server to give more detailed > information regarding error conditions, e.g. notify the client if particular > requested grant types are not supported. Otherwise, the client cannot handle > those error differently. > > > * OAuth 2.0 Dynamic Client Registration Metadata > http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-metadata-00 > > I would suggest to add "jwks" (as defined in > http://openid.net/specs/openid-connect-registration-1_0.html#ClientMetadata) > in order to support native clients. > > regards, > Torsten. > > Am 04.04.2014 11:13, schrieb Hannes Tschofenig: >> Hi all, >> >> This is a Last Call for comments on the dynamic client registration >> documents: >> >> * OAuth 2.0 Dynamic Client Registration Core Protocol >> http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-16 >> >> * OAuth 2.0 Dynamic Client Registration Metadata >> http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-metadata-00 >> >> Since we have to do the last call for these two documents together we >> are setting the call for **3 weeks**. >> >> Please have your comments in no later than April 25th. >> >> Ciao >> Hannes & Derek >> >> >> >> _______________________________________________ >> OAuth mailing list >> OAuth@ietf.org >> https://www.ietf.org/mailman/listinfo/oauth > > > _______________________________________________ > OAuth mailing list > OAuth@ietf.org > https://www.ietf.org/mailman/listinfo/oauth > > > > > -- > > Brian Campbell > [Enter Title] > @ bcampb...@pingidentity.com > +1 720.317.2061 > Connect with us… > > > _______________________________________________ > OAuth mailing list > OAuth@ietf.org > https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth