I feel I have to disagree.  I agree that optionality is often complexity and 
should be avoided. But, I think the optionality here is an agility feature 
allowing mtls to work across a diversified market of different types of tls 
terminators with varying capability. Lack of appropriate discovery/options 
could serve to make the spec unusable in many cases.  

A complicating factor with tls is that a tls layer failure prevents the AS from 
issuing a correcting directive like an http error or http redirect. 

We have to be sure not to break existing clients so we may in some cases need 
mtls only endpoints. I am not far enough along to know for sure. But I tend to 
agree with Brian on this. 

This may be a sign we need more implementation data (including from tls wg) to 
make the right call. 

Phil

> On Feb 14, 2019, at 8:56 AM, Dominick Baier <dba...@leastprivilege.com> wrote:
> 
> Sorry - this was not meant to be snide at all.
> 
> It was honest feedback that you also need to keep software complexity in mind 
> when creating a spec. Every MAY or OPTIONAL, or do it like this OR that, or 
> send values in arbitrary order adds to complexity. Complexity is the natural 
> enemy of security.
> 
> Cheers 
> ———
> Dominick
> 
>> On 13. February 2019 at 20:39:16, Richard Backman, Annabelle 
>> (richa...@amazon.com) wrote:
>> 
>> The issue is that the proposal violates the standard by changing the 
>> semantics of a parameter it defines. We should be very, very, VERY careful 
>> about telling implementers to violate an existing standard.. This change 
>> might prove incompatible with existing or future implementations of 8414, it 
>> might not, but by violating the standard the proposal creates an opportunity 
>> for incompatibility that didn’t exist before.
>> 
>>  
>> 
>> As far as simplicity is concerned, I find a solution that reuses the 
>> existing data model and naturally supports existing and future extensions to 
>> be far simpler than one that introduces ambiguous semantics to existing 
>> parameters. Generally speaking, data models with properties that mean 
>> different things in different contexts tend to be fragile and require more 
>> complex code to work with. But that’s just my experience as, you know, an 
>> actual developer.
>> 
>>  
>> 
>> Let’s keep the assumptions and snide remarks about others’ backgrounds off 
>> the list, please.
>> 
>>  
>> 
>> -- 
>> 
>> Annabelle Richard Backman
>> 
>> AWS Identity
>> 
>>  
>> 
>>  
>> 
>> From: Dominick Baier <dba...@leastprivilege.com>
>> Date: Wednesday, February 13, 2019 at 4:18 AM
>> To: "Richard Backman, Annabelle" <richa...@amazon.com>, Filip Skokan 
>> <panva...@gmail.com>
>> Cc: Brian Campbell <bcampb...@pingidentity.com>, "Richard Backman, 
>> Annabelle" <richa...@amazon.com>, oauth <oauth@ietf.org>
>> Subject: [UNVERIFIED SENDER] Re: [OAUTH-WG] MTLS token endoint & discovery
>> 
>>  
>> 
>> I am for keeping it simple and not introducing another link to follow.
>> 
>>  
>> 
>> I sometimes wonder how many of the spec authors are actually developers - 
>> these suggestions make software unnecessary complex ;)
>> 
>>  
>> 
>> ———
>> 
>> Dominick
>> 
>>  
>> 
>> On 13. February 2019 at 12:25:13, Filip Skokan (panva...@gmail.com) wrote:
>> 
>> Hello,
>> 
>>  
>> 
>> Additionally, a metadata document that omits token_endpoint in favor of 
>> mtls_endpoints since only mTLS is supported would violate 8414, as 8414 says 
>> token_endpoint “is REQUIRED unless only the implicit grant type is 
>> supported.”
>> 
>> 
>> mtls only AS doesn't get anything out of using mtls_endpoints, its use 
>> should not be recommended for such AS and regular endpoints will be used, 
>> this satisfies the requirement
>> 
>> Here is one example, based on my understanding of the “straw man” format 
>> presented in this thread: RFC8414 defines the value of 
>> token_endpoint_auth_methods_supported as a “JSON array containing a list of 
>> client authentication methods supported by this token endpoint.” If that 
>> array contains “tls_client_auth” and the endpoint specified in 
>> token_endpoint does not support mTLS, then that metadata violates 8414. You 
>> could address this by adding a token_endpoint_auth_methods_supported 
>> parameter to the mtls_endpoints object, and likewise for the other endpoints 
>> and auth methods. If you take that to its logical conclusion, you end up 
>> with a complete metadata document hanging off of mtls_endpoints. It’s that 
>> line of thought that led me to suggest just pointing to an alternate 
>> document.
>> 
>> 
>> Assuming we go with using the same root auth methods property, what's the 
>> issue? Clients not having mtls capabilities won't care about the additional 
>> method members being present. Clients that do implement mtls by the 
>> specification will know to look for mtls_endpoints and fall back to regular 
>> ones if the specific endpoint or mtls_endpoints root property is not present.
>> 
>>  
>> 
>> I gave `mtls_alternate_metadata` route a thought and don't see how it helps, 
>> given the two above are non-issues (my $.02) another discovery document only 
>> brings more of them since every property can now be different, not just the 
>> endpoints.
>> 
>> 
>> 
>> S pozdravem,
>> Filip Skokan
>> 
>>  
>> 
>>  
>> 
>> On Wed, 13 Feb 2019 at 00:00, Richard Backman, Annabelle 
>> <richa...@amazon..com> wrote:
>> 
>> Here is one example, based on my understanding of the “straw man” format 
>> presented in this thread: RFC8414 defines the value of 
>> token_endpoint_auth_methods_supported as a “JSON array containing a list of 
>> client authentication methods supported by this token endpoint.” If that 
>> array contains “tls_client_auth” and the endpoint specified in 
>> token_endpoint does not support mTLS, then that metadata violates 8414. You 
>> could address this by adding a token_endpoint_auth_methods_supported 
>> parameter to the mtls_endpoints object, and likewise for the other endpoints 
>> and auth methods. If you take that to its logical conclusion, you end up 
>> with a complete metadata document hanging off of mtls_endpoints. It’s that 
>> line of thought that led me to suggest just pointing to an alternate 
>> document.
>> 
>>  
>> 
>> Additionally, a metadata document that omits token_endpoint in favor of 
>> mtls_endpoints since only mTLS is supported would violate 8414, as 8414 says 
>> token_endpoint “is REQUIRED unless only the implicit grant type is 
>> supported.”
>> 
>>  
>> 
>> It is possible to define the mtls_endpoints parameter such that the above 
>> use cases are invalid, but that does make the document more complicated. If 
>> we go the “mtls_alternate_metadata” route, we can skip past all of these 
>> issues, because it brings us back to just parsing the same metadata that we 
>> do today.
>> 
>>  
>> 
>> -- 
>> 
>> Annabelle Richard Backman
>> 
>> AWS Identity
>> 
>>  
>> 
>>  
>> 
>> From: OAuth <oauth-boun...@ietf.org> on behalf of Filip Skokan 
>> <panva...@gmail.com>
>> Date: Tuesday, February 12, 2019 at 1:13 PM
>> To: "Richard Backman, Annabelle" <richanna=40amazon....@dmarc.ietf.org>
>> Cc: Brian Campbell <bcampbell=40pingidentity....@dmarc.ietf.org>, oauth 
>> <oauth@ietf.org>
>> Subject: Re: [OAUTH-WG] MTLS token endoint & discovery
>> 
>>  
>> 
>> Hi Annabelle,
>> 
>>  
>> 
>> can you elaborate what would be the violation / negative impact of usage of 
>> RFC8414?
>> 
>>  
>> 
>> As it already makes use of `signed_metadata` and this language is present ...
>> 
>>  
>> 
>> > Consumers of the metadata MAY ignore the signed metadata if they do not 
>> > support this feature.  If the consumer of the metadata supports signed 
>> > metadata, metadata values conveyed in the signed metadata MUST take 
>> > precedence over the corresponding values conveyed using plain JSON 
>> > elements.
>> 
>>  
>> 
>> ... would mtls_endpoints be any different? Clients are free to ignore this 
>> if they don't support/use mtls, and if they do those values must take 
>> precedence over the root ones. the use of mtls_endpoints would not be 
>> recommended for mtls-only AS but recommended for one with both mtls/regular 
>> authentication methods. token_endpoint remains required for all intents and 
>> purposes. And as for the usable client authentication methods - they should 
>> all be listed, or do you think we should separate the ones for each 
>> hostname/port location? To what end? Is there a risk having the mtls 
>> hostname/port accepting regular requests? Other then secret/key _jwt auth 
>> methods assertion aud claim the endpoint location doesn't play a role in the 
>> authentication process.
>> 
>> 
>> 
>> Best,
>> Filip
>> 
>>  
>> 
>>  
>> 
>> On Tue, 12 Feb 2019 at 20:47, Richard Backman, Annabelle 
>> <richanna=40amazon....@dmarc.ietf.org> wrote:
>> 
>> I’m not opposed to introducing a metadata change, if the scenario is 
>> relevant and other approaches can’t adequately address it – and I’ll readily 
>> grant that we probably don’t want to depend on consistency of browser 
>> behavior at the intersection of client certificates and 
>> Access-Control-Allow-Credentials. But care needs to be taken in designing 
>> that metadata to avoid violating or otherwise negatively impacting usage of 
>> RFC8414.
>> 
>>  
>> 
>> Along those lines, instead of adding an “mtls_endpoints” metadata parameter, 
>> we could add an “mtls_alternate_metadata” parameter whose value is the URL 
>> of an alternate metadata document intended for clients using mTLS. An 
>> mTLS-optional AS could have two different metadata documents for mTLS and 
>> non-mTLS clients, reducing the mTLS-optional scenario to the mTLS-only 
>> scenario. This sidesteps the challenges of aligning the “either/or” 
>> semantics of mTLS-optional with some of the rigid parameter definitions in 
>> RFC8414 (see: token_endpoint, token_endpoint_auth_methods_supported).
>> 
>>  
>> 
>> -- 
>> 
>> Annabelle Richard Backman
>> 
>> AWS Identity
>> 
>>  
>> 
>>  
>> 
>> From: OAuth <oauth-boun...@ietf.org> on behalf of Brian Campbell 
>> <bcampbell=40pingidentity....@dmarc.ietf.org>
>> Date: Tuesday, February 12, 2019 at 10:58 AM
>> To: Dominick Baier <dba...@leastprivilege.com>
>> Cc: oauth <oauth@ietf.org>
>> Subject: Re: [OAUTH-WG] MTLS token endoint & discovery
>> 
>>  
>> 
>> Thanks for the input, Dominick.
>> 
>>  
>> 
>> I'd said previously that I was having trouble adequately gauging whether or 
>> not there's sufficient consensus to go ahead with the update. I was even 
>> thinking of asking the chairs about a consensus call during the office hours 
>> meeting yesterday. But it got canceled. And looking again back over the 
>> discussion, I don't believe a consensus call is necessary. There's been a 
>> lot of general discussion over the last several weeks during which several 
>> folks have stated support for the proposal while there's been only one voice 
>> of direct dissent. That seems like rough enough consensus and, as such, I 
>> plan to make the change in the next revision of the document (which should 
>> be done soon). Chairs, please let me know, if you believe the situation 
>> warrants a different course of action.
>> 
>>  
>> 
>>  
>> 
>>  
>> 
>> On Mon, Feb 11, 2019 at 11:01 PM Dominick Baier <dba...@leastprivilege.com> 
>> wrote:
>> 
>> IMHO that’s a reasonable and pragmatic option.
>> 
>>  
>> 
>> Thanks
>> 
>> ———
>> 
>> Dominick
>> 
>>  
>> 
>> On 11. February 2019 at 13:26:37, Brian Campbell 
>> (bcampb...@pingidentity.com) wrote:
>> 
>> It's been pointed out that the potential issue is not isolated to the just 
>> token endpoint but that revocation, introspection, etc. could be impacted as 
>> well. So,  at this point, the proposal on the table is to add a new optional 
>> AS metadata parameter named 'mtls_endpoints' that's value we be a JSON 
>> object which itself contains endpoints that, when present, a client doing 
>> MTLS would use rather than the regular endpoints.  A straw-man example might 
>> look like this
>> 
>> {
>>   "issuer":"https://server.example.com";,
>>   "authorization_endpoint":"https://server.example.com/authz";,
>>   "token_endpoint":"https://server.example.com/token";,
>>   "token_endpoint_auth_methods_supported":[  
>> "client_secret_basic","tls_client_auth", "none"],
>>   "userinfo_endpoint":"https://server.example.com/userinfo";,
>>   "revocation_endpoint":"https://server.example.com/revo";,
>>   "jwks_uri":"https://server.example.com/jwks.json";,
>>   "mtls_endpoints":{
>>     "token_endpoint":"https://mtls.example.com/token";,
>>     "userinfo_endpoint":"https://mtls.example.com/userinfo";,
>>     "revocation_endpoint":"https://mtls.example.com/revo";
>>   }
>> }
>> 
>>  
>> 
>> A client doing MTLS would look for and give precedence to an endpoint under 
>> "mtls_endpoints" while falling back to use the normal endpoint from the top 
>> level of metadata when/if its not in "mtls_endpoints".
>> 
>> 
>> The idea being that "regular" clients (those not doing MTLS) will use the 
>> regular endpoints. And only the host/port of the endpoints listed in 
>> mtls_endpoints will be set up to request TLS client certificates during 
>> handshake. Thus any potential impact of the CertificateRequest message being 
>> sent in the TLS handshake can be avoided for all the other regular clients 
>> that are not going to do MTLS - including and most importantly in-browser 
>> javascript clients where there can be less than desirable UI presented to 
>> the end-user.
>> 
>>  
>> 
>> I'm struggling, however, to adequately gauge whether or not there's 
>> sufficient consensus to go ahead with the update. There's been some support 
>> for it voiced. As well as talk of other approaches that could be 
>> alternatives or additional measures. And also some vocal opposition to it. 
>> 
>>  
>> 
>>  
>> 
>> On Sat, Feb 9, 2019 at 3:09 AM Dominick Baier <dba...@leastprivilege.com> 
>> wrote:
>> 
>> We are currently implementing MTLS in IdentityServer.
>> 
>>  
>> 
>> Our approach will be that we’ll offer a separate token endpoint that 
>> supports client certs. Are you planning on adding an official endpoint name 
>> for discovery? Right now we are using “mtls_token_endpoint”.
>> 
>>  
>> 
>> Thanks
>> 
>> ———
>> 
>> Dominick
>> 
>>  
>> 
>> On 7. February 2019 at 22:36:55, Brian Campbell 
>> (bcampbell=40pingidentity....@dmarc.ietf.org) wrote:
>> 
>> Ah yes, that makes sense. Thanks for clarifying. And it is indeed a good 
>> reminder that even a seemingly innocuous change that should be backwards 
>> compatible can break things unexpectedly..
>> 
>>  
>> 
>>  
>> 
>>  
>> 
>>  
>> 
>>  
>> 
>> On Thu, Feb 7, 2019 at 8:57 AM Richard Backman, Annabelle 
>> <richa...@amazon.com> wrote:
>> 
>> The case I’m referencing didn’t specifically involve AS metadata. We had 
>> clients in the wild that assumed that all the properties in the JSON object 
>> returned from our userinfo endpoint were scalar strings. This broke when we 
>> introduced a new property whose value was a JSON object. It was a good 
>> reminder that even a seemingly innocuous change that should be backwards 
>> compatible can force more work on clients than we expect.
>> 
>>  
>> 
>> -- 
>> 
>> Annabelle Richard Backman
>> 
>> AWS Identity
>> 
>>  
>> 
>>  
>> 
>> From: Brian Campbell <bcampb...@pingidentity..com>
>> Date: Wednesday, February 6, 2019 at 11:30 AM
>> To: "Richard Backman, Annabelle" <richanna=40amazon....@dmarc.ietf.org>
>> Cc: "Richard Backman, Annabelle" <richa...@amazon.com>, oauth 
>> <oa...@ietf..org>
>> Subject: Re: [OAUTH-WG] [UNVERIFIED SENDER] Re: MTLS and in-browser clients 
>> using the token endpoint
>> 
>>  
>> 
>> And I'm honestly really struggling to see what could have gone wrong with or 
>> how token_endpoint_auth_methods broke something with the user info endpoint. 
>> If you have the time and/or it'd be informative to this here little 
>> discussion, please explain that one a bit more.
>> 
>>  
>> 
>> On Wed, Feb 6, 2019 at 12:15 PM Brian Campbell <bcampb...@pingidentity.com> 
>> wrote:
>> 
>> "far" should have said "fair" in the previous message
>> 
>>  
>> 
>>  
>> 
>>  
>> 
>>  
>> 
>>  
>> 
>> On Tue, Feb 5, 2019 at 4:35 PM Brian Campbell <bcampb...@pingidentity.com> 
>> wrote:
>> 
>> It may well be due to my own intellectual shortcomings but these 
>> issues/questions/confusion-points are not resonating for me as being 
>> problematic.
>> 
>>  
>> 
>> The more general stance of "this isn't needed or worth it in this document" 
>> (I think that's far?) is being heard though.
>> 
>>  
>> 
>>  
>> 
>>  
>> 
>> On Tue, Feb 5, 2019 at 1:42 PM Richard Backman, Annabelle 
>> <richanna=40amazon....@dmarc.ietf.org> wrote:
>> 
>> (TL;DR: punt AS metadata to a separate draft)
>> 
>> AS points #1-3 are all questions I would have as an implementer:
>> 
>> Section 2 of RFC8414 says token_endpoint “is REQUIRED unless only the 
>> implicit grant type is supported.” So what does the mTLS-only AS put here?
>> The claims for these other endpoints are OPTIONAL, potentially leading to 
>> inconsistency depending on how #1 gets decided.
>> The example usage of the token_endpoint_auth_methods property given earlier 
>> is incompatible with RFC8414, since some of its contents are only valid for 
>> the non-mTLS endpoints, and others are only valid for the mTLS endpoints. 
>> Hence this question.
>> This introduces a new metadata property that could impact how other specs 
>> should extend AS metadata. That needs to be addressed.
>>  
>> 
>> I could go on for client points but you already get the point. Though I’ll 
>> share that #3 is real and once forced me to roll back an update to the Login 
>> with Amazon userinfo endpoint…good times. 😃
>> 
>>  
>> 
>> I don’t necessarily think an AS metadata property is wrong per se, but 
>> understand that you’re bolting a layer of flexibility onto a standard that 
>> wasn’t designed for that, and I don’t think the metadata proposal as it’s 
>> been discussed here sufficiently deals with the fallout from that. In my 
>> view this is a complex enough issue and it’s for a nuanced enough use case 
>> (as far as I can tell from discussion? Please correct me if I’m wrong) that 
>> we should punt it to a separate draft (e.g., “Authorization Server Metadata 
>> Extensions for mTLS Hybrids”) and get mTLS out the door.
>> 
>>  
>> 
>> -- 
>> 
>> Annabelle Richard Backman
>> 
>> AWS Identity
>> 
>>  
>> 
>>  
>> 
>> From: OAuth <oauth-boun...@ietf.org> on behalf of Brian Campbell 
>> <bcampbell=40pingidentity....@dmarc.ietf.org>
>> Date: Monday, February 4, 2019 at 5:28 AM
>> To: "Richard Backman, Annabelle" <richanna=40amazon....@dmarc.ietf.org>
>> Cc: oauth <oauth@ietf.org>
>> Subject: Re: [OAUTH-WG] [UNVERIFIED SENDER] Re: MTLS and in-browser clients 
>> using the token endpoint
>> 
>>  
>> 
>> Those points of confusion strike me as somewhat hypothetical or hyperbolic. 
>> But your general point is taken and your position of being anti additional 
>> metadata on this issue is noted.
>> 
>>  
>> 
>> All of which leaves me a bit uncertain about how to proceed. There seem to 
>> be a range of opinions on this point and gauging consensus is proving 
>> elusive for me. That's confounded by my own opinion on it being somewhat 
>> fluid.
>> 
>>  
>> 
>> And I'd really like to post an update to this draft about a month or two ago.
>> 
>>  
>> 
>>  
>> 
>>  
>> 
>>  
>> 
>>  
>> 
>>  
>> 
>> On Fri, Feb 1, 2019 at 5:03 PM Richard Backman, Annabelle 
>> <richanna=40amazon....@dmarc.ietf.org> wrote:
>> 
>> Confusion from the AS’s perspective:
>> 
>> If I only support mTLS, do I need to include both token_endpoint_uri and 
>> mtls_endpoints? Should I omit token_endpoint_uri? Or set it to the empty 
>> string?
>> What if I only support mTLS for the token endpoint, but not revocation or 
>> user info?
>> How do I specify authentication methods for the mTLS token endpoint? Does 
>> token_endpoint_auth_methods apply to both the mTLS and non-mTLS endpoints?
>> I’m using the OAuth 2.0 Device Flow. Do I include a mTLS-enabled 
>> device_authorization_endpoint under mtls_endpoints?
>>  
>> 
>> Confusion from the client’s perspective:
>> 
>> As far as I know, I’m a public client, and don’t know anything about mTLS, 
>> but the IT admins installed client certs in their users’ browsers and the AS 
>> expects to use that to authenticate me. 
>> My AS metadata parser crashed because the mTLS-only AS omitted 
>> token_endpoint_uri.
>> My AS metadata parser crashed because it didn’t expect to encounter a JSON 
>> object as a parameter value.
>> The mTLS-only AS didn’t provide a value for mtls_endpoints, what do I do?
>> I don’t know what that “m” means, but they told me to use HTTPS, so I should 
>> use the one with “tls” in its name, right?
>>  
>> 
>> Yes, you can write normative text that answers most of these. But you’ll 
>> have to clearly cover a lot of similar-but-slightly-different scenarios and 
>> be very explicit. And implementers will still get it wrong. The metadata 
>> change introduces opportunities for confusion and failure that do not exist 
>> now, and forces them on everyone who supports mTLS. In contrast, the 307 
>> redirect is only required when an AS wants to support both, and is 
>> unambiguous in its behavior and meaning.
>> 
>>  
>> 
>> -- 
>> 
>> Annabelle Richard Backman
>> 
>> AWS Identity
>> 
>>  
>> 
>>  
>> 
>> From: Brian Campbell <bcampbell=40pingidentity....@dmarc.ietf.org>
>> Date: Friday, February 1, 2019 at 3:17 PM
>> To: "Richard Backman, Annabelle" <richa...@amazon.com>
>> Cc: George Fletcher <gffle...@aol.com>, oauth <oauth@ietf.org>
>> Subject: [UNVERIFIED SENDER] Re: [OAUTH-WG] MTLS and in-browser clients 
>> using the token endpoint
>> 
>>  
>> 
>> It doesn't seem like that confusing or large of a change to me - if the 
>> client is doing MTLS and the given endpoint is present in `mtls_endpoints`, 
>> then it uses that one.  Otherwise it uses the regular endpoint. It gives an 
>> AS a lot of flexibility in deployment options. I personally think getting a 
>> 307 approach deployed and working would be more complicated and error prone. 
>> 
>>  
>> 
>> It is a minority use case at the moment but there are forces in play, like 
>> the push for increased security in general and to have javascript clients 
>> use the code flow, that suggest it won't be terribly unusual to see an AS 
>> that wants to support MTLS clients and javascript/spa clients at the same 
>> time.
>> 
>>  
>> 
>> I've personally wavered back and forth in this thread on whether or not to 
>> add the new metadata (or something like it). With my reasoning each way 
>> kinda explained somewhere back in the 40 or so messages that make up this 
>> thread.  But it seems like the rough consensus of the group here is in favor 
>> of it.
>> 
>>  
>> 
>>  
>> 
>>  
>> 
>>  
>> 
>> On Fri, Feb 1, 2019 at 3:18 PM Richard Backman, Annabelle 
>> <richanna=40amazon....@dmarc.ietf.org> wrote:
>> 
>> This strikes me as a very prominent and confusing change to support what 
>> seems to be a minority use case. I’m getting a headache just thinking about 
>> the text needed to clarify when the AS should provide `mtls_endpoints` and 
>> when the client should use that versus using `token_endpoint.` Why is the 
>> 307 status code insufficient to cover the case where a single AS supports 
>> both mTLS and non-mTLS?
>> 
>>  
>> 
>> -- 
>> 
>> Annabelle Richard Backman
>> 
>> AWS Identity
>> 
>>  
>> 
>>  
>> 
>> From: OAuth <oauth-boun...@ietf.org> on behalf of Brian Campbell 
>> <bcampbell=40pingidentity....@dmarc.ietf.org>
>> Date: Friday, February 1, 2019 at 1:31 PM
>> To: George Fletcher <gffletch=40aol....@dmarc.ietf.org>
>> Cc: oauth <oauth@ietf.org>
>> Subject: Re: [OAUTH-WG] MTLS and in-browser clients using the token endpoint
>> 
>>  
>> 
>> Yes, that would work. 
>> 
>>  
>> 
>> On Fri, Feb 1, 2019 at 2:28 PM George Fletcher 
>> <gffletch=40aol....@dmarc.ietf.org> wrote:
>> 
>> What if the AS wants to ONLY support MTLS connections. Does it not specify 
>> the optional "mtls_endpoints" and just use the normal metadata values?
>> 
>> On 1/15/19 8:48 AM, Brian Campbell wrote:
>> 
>> It would definitely be optional, apologies if that wasn't made clear. It'd 
>> be something to the effect of optional for the AS to include and clients 
>> doing MTLS would use it when present in AS metadata.
>> 
>>  
>> 
>> On Tue, Jan 15, 2019 at 2:04 AM Dave Tonge <dave.to...@momentumft.co.uk> 
>> wrote:
>> 
>> I'm in favour of the `mtls_endpoints` metadata parameter - although it 
>> should be optional.
>> 
>> 
>> CONFIDENTIALITY NOTICE: This email may contain confidential and privileged 
>> material for the sole use of the intended recipient(s). Any review, use, 
>> distribution or disclosure by others is strictly prohibited..  If you have 
>> received this communication in error, please notify the sender immediately 
>> by e-mail and delete the message and any file attachments from your 
>> computer. Thank you.
>> 
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf..org/mailman/listinfo/oauth
>>  
>> 
>> 
>> CONFIDENTIALITY NOTICE: This email may contain confidential and privileged 
>> material for the sole use of the intended recipient(s). Any review, use, 
>> distribution or disclosure by others is strictly prohibited..  If you have 
>> received this communication in error, please notify the sender immediately 
>> by e-mail and delete the message and any file attachments from your 
>> computer. Thank you.
>> 
>> 
>> CONFIDENTIALITY NOTICE: This email may contain confidential and privileged 
>> material for the sole use of the intended recipient(s). Any review, use, 
>> distribution or disclosure by others is strictly prohibited..  If you have 
>> received this communication in error, please notify the sender immediately 
>> by e-mail and delete the message and any file attachments from your 
>> computer. Thank you.
>> 
>> 
>> CONFIDENTIALITY NOTICE: This email may contain confidential and privileged 
>> material for the sole use of the intended recipient(s). Any review, use, 
>> distribution or disclosure by others is strictly prohibited..  If you have 
>> received this communication in error, please notify the sender immediately 
>> by e-mail and delete the message and any file attachments from your 
>> computer. Thank you.
>> 
>> 
>> CONFIDENTIALITY NOTICE: This email may contain confidential and privileged 
>> material for the sole use of the intended recipient(s). Any review, use, 
>> distribution or disclosure by others is strictly prohibited.  If you have 
>> received this communication in error, please notify the sender immediately 
>> by e-mail and delete the message and any file attachments from your 
>> computer. Thank you.
>> 
>> 
>> CONFIDENTIALITY NOTICE: This email may contain confidential and privileged 
>> material for the sole use of the intended recipient(s). Any review, use, 
>> distribution or disclosure by others is strictly prohibited..  If you have 
>> received this communication in error, please notify the sender immediately 
>> by e-mail and delete the message and any file attachments from your 
>> computer. Thank you. _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>> 
>> 
>> CONFIDENTIALITY NOTICE: This email may contain confidential and privileged 
>> material for the sole use of the intended recipient(s). Any review, use, 
>> distribution or disclosure by others is strictly prohibited.  If you have 
>> received this communication in error, please notify the sender immediately 
>> by e-mail and delete the message and any file attachments from your 
>> computer. Thank you.
>> 
>> 
>> CONFIDENTIALITY NOTICE: This email may contain confidential and privileged 
>> material for the sole use of the intended recipient(s). Any review, use, 
>> distribution or disclosure by others is strictly prohibited..  If you have 
>> received this communication in error, please notify the sender immediately 
>> by e-mail and delete the message and any file attachments from your 
>> computer. Thank you.
>> 
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>> 
>> _______________________________________________ 
>> OAuth mailing list 
>> OAuth@ietf.org 
>> https://www.ietf.org/mailman/listinfo/oauth
>> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to