One example is when used as a signed request to the authorization server, as is done in http://tools.ietf.org/html/draft-sakimura-oauth-requrl-05.
-- Mike -----Original Message----- From: Hannes Tschofenig [mailto:hannes.tschofe...@gmx.net] Sent: Monday, July 14, 2014 10:45 AM To: Mike Jones; Brian Campbell; John Bradley Cc: oauth@ietf.org Subject: Re: [OAUTH-WG] Dynamic Client Registration: jwks / jwks_uri Hi Mike, sticking with working group document is fine. However, the first example does not make sense to me. [maybe my brain is a bit empty at the moment] When is a JWT signed by the client and then sent to the Authorization Server other than in the Assertion draft that I mention in the second example? Ciao Hannes On 07/14/2014 06:16 PM, Mike Jones wrote: > I'd rather that we stayed with working group drafts in the examples. > So I would counter-propose the following text: > > "The public key(s) referenced by "jwks_uri" (or contained in the > "jwks") can be used in a variety of use cases. For example, the > signature of a JWT [I-D.ietf-json-web-token] signed by the client can > be verified by the authorization server using these keys. Another > example is that the authorization server can use the indicated public > keys to verify a request to the token endpoint that utilizes the JWT > assertion profile as described in Section 4.2 of > [I-D.ietf-oauth-assertions]." > > -- Mike > > -----Original Message----- From: OAuth [mailto:oauth-boun...@ietf.org] > On Behalf Of Hannes Tschofenig Sent: > Monday, July 14, 2014 2:42 AM To: Brian Campbell; John Bradley Cc: > oauth@ietf.org Subject: Re: [OAUTH-WG] Dynamic Client Registration: > jwks / jwks_uri > > What about the following text: > > jwks_uri > > .... <previous text in Section 2 of > http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-18> ..... > > "The public key(s) referenced by jwks_uri (or contained in the jwks) > can be used in a variety of use cases. For example, the AS can use the > indicated public key to verify a request to the token endpoint that > utilizes the JWT assertion profile as described in Section 4.2 of > [I-D.ietf-oauth-assertions]. Another use case is for the AS to use the > public key of a client to encrypt a symmetric proof-of-possession key > sent to the client, as described in Section 4.2 of > [I-D.bradley-oauth-pop-key-distribution]." > > > Ciao Hannes > > > > > > > > On 07/08/2014 09:43 PM, Brian Campbell wrote: >> +1 to John's #3. The others could maybe be described in somewhat >> abstract terms as examples of those "higher level protocols that use >> signing or encryption." >> >> On Tue, Jul 8, 2014 at 12:33 PM, John Bradley <ve7...@ve7jtb.com> >> wrote: >>> In Connect these public keys are used to: 1 verify the signature of >>> request objects (Signed Requests), something not in OAuth yet, and >>> part of what the description calls higher level protocols. 2 encrypt >>> the responses from the user_info endpoint or id_token (also not part >>> of OAuth directly at this point) >>> >>> 3 validate requests to the token endpoint authenticated by the JWT >>> assertion profile I think this is legitimate OAuth use. >>> >>> Whew for the PoP specs: 4 used to encrypt the symmetric proof key in >>> a JWK sent to the client >>> http://tools.ietf.org/html/draft-bradley-oauth-pop-key-distribution- >>> 0 >>> >>> 1#page-7 >>> 5 used to provide a PoP key for the client to the AS as part of >>> registration rather than passing the JWK on each request to the >>> token endpoint. >>> >>> So the keys in the JWK can be used a number of ways by the AS. >>> >>> I think we could reference 3 and 4 as examples to be safe. >>> >>> John B. >>> >>> >>> On Jul 8, 2014, at 3:04 PM, Mike Jones <michael.jo...@microsoft.com> >>> wrote: >>> >>>> Was there specific language that had been discussed to be added for >>>> this? If not, could someone please create some? >>>> >>>> Thanks, -- Mike >>>> >>>> -----Original Message----- From: OAuth >>>> [mailto:oauth-boun...@ietf.org] On Behalf Of Hannes Tschofenig >>>> Sent: Tuesday, July 08, 2014 5:09 AM To: oauth@ietf.org >>>> Subject: [OAUTH-WG] Dynamic Client Registration: jwks / jwks_uri >>>> >>>> Hi all, >>>> >>>> in my earlier review I had noted that the semantic of the fields is >>>> underspecified, i.e., it is not clear what these fields are used >>>> for. >>>> >>>> In private conversations I was told that an informal reference to a >>>> potential use case will be added. I don't see such reference with >>>> version -18. >>>> >>>> Ciao Hannes >>>> >>>> _______________________________________________ OAuth mailing list >>>> OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth >>> >>> _______________________________________________ OAuth mailing list >>> OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth >> >> _______________________________________________ OAuth mailing list >> OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth >> > _______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth