For what it's worth, we deployed such a system in 2011 using signed JWTs, symmetric keys and supporting key rotation via the kid JWT header field. The body of the JWT includes 'iss', 'exp', 'uid' (for the user), 'access_token' (AS specific opaque blob), and 'validation_url' (where to validate the AS specific opaque blob).

The issuing AS would generate this JWT and sign it. The RS, then validates the signature. If necessary, the RS then also validates the opaque token with the issuing AS.

Of course, using encrypted JWTs may be a better solution these days:)

Thanks,
George

On 3/13/16 4:44 PM, Mike Schwartz wrote:
I like the idea of an encrypted JWT... I guess if there are multiple AS's, how would you know which key to use? Cycle through each key? Are you suggesting maybe use a non-encrypted JWT that contains an encrypted JWT as a value? Something like

{"iss": "https://example.com";,
 "token": "fjbfgy5Fdx8ybx0.."
}

Are there any OAuth2 profiles to standardize this approach?

- Mike


--------------------------

Michael Schwartz
Gluu
Founder / CEO
m...@gluu.org

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth


_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to