Get OpenID Connect id_token by the authentication request with prompt=none
and verifying the sub to be the same with what you expected seem to suffice
your needs. Am I missing something?
On Wed, Apr 20, 2016 at 05:05 Fregly, Andrew <afre...@verisign.com> wrote:

> Thanks for your response John. I also got a good response from Brian
> Campbell and appreciate that. I will respond separately to Brian’s response
> as I think it would keep things clearer to do that.
>
> The problem we have for using OpenID Connect is that it combines the role
> of Authentication Service with the role of Authorization Service. Perhaps
> the following description of what we want to do will clarify why this won’t
> work for us:
>
> The basic problem statement is that we need to have a client application
> authorized by a Service Provider based on proof that a user is currently a
> member of some organization. This assumes the organization has previously
> established some level of authorized access with the Service Provider.
>
> Here is an example: Suppose I am a member of SomeOrg Inc. Suppose SomeOrg
> Inc. is doing research that requires it to gather data over the Internet
> from a number of data providers. The data providers require authentication
> and proof of organizational membership in order to authorize various levels
> of access to their data. The data providers do not consider having an
> account with them or a Public Identity Provider to be suitable for proving
> that I am still a member of SomeOrg at time of authentication. They would
> have no way of knowing whether or not my relationship with SomeOrg still
> exists at that time. The data providers would therefore like the Client
> software to authenticate me against SomeOrgs Identity Provider. This would
> be good proof that I am still a member of SomeOrg at the time I
> authenticate. This authentication would enable the data providers
> Authorization Server to grant me access appropriate to a member of
> SomeOrg.  Note that as a prerequisite to all of this, SomeOrg will have
> used an out-of-band process to set up a trust relationship for SomeOrg's
> Identity Provider with the data provider’s Authorization Service, and will
> have negotiated authorization claims to be granted to SomeOrgs members.
>
> What I am having difficulty with is in knitting together an approach based
> on the he OpenID Connect specifications, SAML specifications, and OAuth
> RFCs and drafts in a way that supports the above use case end-to-end. The
> OAuth RFCs and drafts almost get me there. What seems to be missing is a
> way of telling an Identity Provider the URL for the Authorization Service
> (the required Audience claim in an authentication assertion as defined in
> RFCs 7251, 7252 and 7253), and then a requirement that the Identity
> Providers put the supplied Audience Identifier into Authentication Tokens.
> Perhaps a little further back-and-forth with Brian will resolve this.
>
> I can go into deeper detail if needed. If this is off-topic for the OAuth
> working group, let me know.
>
> Thanks,
> Andrew Fregly
> Verisign Inc.
>
>
> From: John Bradley <ve7...@ve7jtb.com>
> Date: Tuesday, April 19, 2016 at 2:06 PM
> To: Andrew Fregly <afre...@verisign.com>
> Cc: "oauth@ietf.org" <oauth@ietf.org>
> Subject: Re: [OAUTH-WG] Building on the protocol in the draft “OAuth 2.0
> Token Exchange: An STS for the REST of Us” to include Authentication Tokens
>
> Looking at OpenID Connect and it’s trust model for producing id_tokens
> that assert identity may help you.
> http://openid.net/wg/connect/
>
> Unfortunately I can’t quite make out what you are trying to do.
>
> It sort of sounds like you want an id_token from a idP and then have the
> client exchange that assertion for another token?
>
> John B.
>
> On Apr 19, 2016, at 1:18 PM, Fregly, Andrew <afre...@verisign.com> wrote:
>
> I have a use case where a client application needs to authenticate with a
> dynamically determined Identity Provider that is separate from the
> Authorization Service that will be used issue an access token to the
> client. The use case also requires that as part of authorization, the
> client provides to the Authorization Service an authentication token signed
> by an Identity Provider that the Authorization Service has a trust
> relationship with. The trust relationship is verifiable based on the
> Authorization Service having recorded the public keys or certificates of
> trusted Identity Providers in a trust store, this allowing the
> Authorization Service to verify an Identity Provider’s signature on an
> authentication token.
>
> In looking at the various OAuth RFCs, particularly RFCs 7521, 7522, and
> 7523, I see that they get me close in terms of supporting the use case.
> What is missing is a means for solving the following problem. These RFCs
> require that the Identity Provider put an Audience claim in the
> authentication token. The problem with this is that I do not see in the
> RFCs how the Identity Provider can be told who the Audience is to put into
> the authentication token. This leads me to the title of this message. The
> draft “OAuth 2.0 Token Exchange: An STS for the REST of Us” defines a
> mechanism for identifying the Audience for an STS to put into a token it
> generates. That would solve my problem except that the draft limits the
> type of STS to being Authorization Servers. What is needed is this same
> capability for interacting with an Identity Provider. This would enable
> RFCs 7521, 7522 and 7523 to be useful in situation where the Identity
> Provider needs to be told the identity of the Authorization Service.
>
> I am new to interacting with the IETF. I also am not an expert on the RFCs
> or prior history of the OAuth group relative to this topic, so please point
> me to any existing solution if this is a solved problem. Otherwise, I would
> like to get feedback on my suggestion.
>
> Thanks You,
>
> Andrew Fregly
> Verisign Inc.
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to