The JWT was done by the OAuth WG.

Some wanted it to be core to OAuth and others wanted it to be entirely
optional so that people would not feel obligated to use it for access
tokens.

JWT is used in a number of OAuth specs now and provides consistency for
some common elements like issuer , audience, and expiery.

Yes we could have started from JWS and redefined those elements but would
then need another IANA registry.

Perhaps I am not understanding what you are getting at.

John B.


On Thu, Nov 1, 2018, 4:04 AM Jim Schaad <i...@augustcellars.com wrote:

> Ok – I’ll ask the questions explicitly.
>
>
>
> What additional features do you get from the claims that are already
> defined for a JWT.
>
>
>
> How do these features relate to the original problem statement of needing
> encryption and origination?
>
>
>
> Why are these not features that should be in the base OAuth design and
> thus part of the OAuth registry?
>
>
>
> Jim
>
>
>
>
>
> *From:* Mike Jones <michael.jo...@microsoft.com>
> *Sent:* Wednesday, October 31, 2018 9:18 AM
> *To:* Jim Schaad <i...@augustcellars.com>;
> draft-ietf-oauth-jws...@ietf.org
> *Cc:* 'oauth' <oauth@ietf.org>
> *Subject:* RE: [OAUTH-WG] Mail regarding draft-ietf-oauth-jwsreq
>
>
>
> JWT defines a number of standard claims that are used in this application,
> including "iss" (issuer), "aud" (audience), etc.  Making the requests a JWT
> allows code reuse, rather than having an application-specific signed
> request representation that has many of the semantics and fields of a JWT
> anyway.
>
>
>
> It's also worth noting that this practice has been a standard since 2014.
> OpenID Connect Core standardized the OAuth signed request format in
> https://openid.net/specs/openid-connect-core-1_0.html#JWTRequests.  The
> draft-ietf-oauth-jwsreq
> <https://tools.ietf.org/html/draft-ietf-oauth-jwsreq-17> spec is the
> OAuth-only version of this already standard and deployed practice.
> (There's other precedents for OAuth subsetting standard OpenID Connect
> functionality.  For instance, RFC 8414
> <https://tools.ietf.org/html/rfc8414> is the OAuth-specific subset of the
> metadata format defined by OpenID Connect Discovery
> <https://openid.net/specs/openid-connect-discovery-1_0.html>.)
>
>
>
>                                                        -- Mike
>
>
>
> -----Original Message-----
> From: OAuth <oauth-boun...@ietf.org> On Behalf Of Jim Schaad
> Sent: Wednesday, October 31, 2018 8:33 AM
> To: draft-ietf-oauth-jws...@ietf.org
> Cc: 'oauth' <oauth@ietf.org>
> Subject: [OAUTH-WG] Mail regarding draft-ietf-oauth-jwsreq
>
>
>
> As part of looking at the issues of using CWTs for this purpose I did some
> more reading of the document.  I am having a problem with the understanding
> the reasons for using JWT as opposed to just saying that you are going to
> use JWS and JWE.  There is nothing in this section that I can see that
> points to a reason to be using JWTs as the carrier.  What am I missing?
>
>
>
> Jim
>
>
>
>
>
> _______________________________________________
>
> OAuth mailing list
>
> OAuth@ietf.org
>
> https://www.ietf.org/mailman/listinfo/oauth
>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to