For signing authentication requests you include the keyid in the JWT, and the 
AS looks in the JWKS to find the correct key if there is more than one.

I don't think that is a problem

What we probably need to do is pass a keyid in the request if there is more 
than one signing key registered for the client.

John B.

> On Mar 5, 2015, at 12:34 PM, Hannes Tschofenig <hannes.tschofe...@gmx.net> 
> wrote:
> 
> Hi John,
> 
> 
> On 03/05/2015 10:27 AM, John Bradley wrote:
>> inline
>>> On Mar 5, 2015, at 9:59 AM, Hannes Tschofenig <hannes.tschofe...@gmx.net> 
>>> wrote:
>>> 
>>> Hi all,
>>> 
>>> I refreshed the PoP key distribution document. No changes to the
>>> content of the document.
>>> 
>>> The document contains two questions, namely
>>> 
>>> QUESTION: A benefit of asymmetric cryptography is to allow clients to
>>>  request a PoP token for use with multiple resource servers.  The
>>>  downside of that approach is linkability since different resource
>>>  servers will be able to link individual requests to the same client.
>>>  (The same is true if the a single public key is linked with PoP
>>>  tokens used with different resource servers.)  Nevertheless, to
>>>  support the functionality the audience parameter could carry an array
>>>  of values.  Is this desirable?
>>> 
>>> 
>>> Hannes: My view is that we do not want to introduce likability into
>>> OAuth via the use of these keys. As such, different keys for different
>>> origins.
>>> 
>>> 
>> John:  Having an array increases complexity and decreases privacy by 
>> allowing RS to link.
>> 
>> Audiance should be a single value.  That requires separate keys for 
>> symmetric, or asymmetric keys provisioned by the AS.
>> 
>> For asymmetric keys provisioned by the client it would be up to the client 
>> to decide if using the same key for multiple RS makes sense.  
>> 
>> It might be that there is a single key provisioned by a MSM in the tpm that 
>> they want to use for all the connections as that is the most secure, and are 
>> not concerned with correlation as all the RS are internal to a single 
>> enterprise.
>> 
> 
> OK.
> 
>> 
>> 
>>> QUESTION: Should we register the token_type and alg parameters for use
>>> with the dynamic client registration protocol?
>>> 
>>> Hannes: I believe we should register these two parameters into the
>>> dynamic client registration protocol since that allows us to configure
>>> the values for the client rather than exchanging them with every message.
>>> 
>> John:  Yes I had assumed that that was a no brainer.
>> The other question on registering is if we should allow the client to 
>> preregister a public key as well.
>> In some situations the client may want to always use the same key and making 
>> them push it each time is a waste of bandwidth.
> The dynamic client registration already supports the feature of
> uploading a public key to the authorization server and hence the missing
> feature to support that case is to allow the client to refer to that key
> somehow. I assume that the public key uploaded by the dynamic client
> registration protocol is referenced using a URI. The question is just
> what that URI would be.
> 
> Unfortunately, the Dynamic Client Registration spec is silent about how
> to reference the public key uploaded via the jwks parameter. Did we just
> found a bug in the spec?
> 
> Ciao
> Hannes
> 
> 
>> 
>> John B.
>>> Feedback appreciated before the submission deadline.
>>> 
>>> Ciao
>>> Hannes
>>> 
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to