> On 10. Apr 2019, at 19:39, Sascha Preibisch <saschapreibi...@gmail.com> wrote:
> 
> I am late in the game, but not too late I hope.
> 
> I would like to see 'aud' be the requesting client_id. For identifying the 
> the target resource, a 'resource' claim should be introduced. I am also 
> suggesting to not introduce 'typ: at+jwt'. It is simply a jwt and the 
> validation process will show if it is an access_token or not.

"aud = client_id" would mean that, by definition, the JWT must not be presented 
to any other entity than the client. This makes only sense for the ID Token in 
OIDC I think.  OTOH, defining a JWT which can be presented by the client to the 
RS is the whole point of this draft.
Also, the reason why it makes sense to introduce a new type is that an OIDC ID 
Token _could_ be mistaken for an AT (which it isn't).
IMO it might even make sense to encourage the OIDC spec to change to jwt+id or 
something by extending the JWT spec.

I also support the adoption.

> 
> Last but not least, 'aud' (as resource identifier) should not be required. 
> Requiring that, and the requested resource in the the token request, will 
> require existing clients to be updated. Introducing jwt access_token should 
> be transparent to clients.
> 
> Thanks,
> Sascha
> 
> 
> On Wed., Apr. 10, 2019, 06:41 n-sakimura, <n-sakim...@nri.co.jp> wrote:
> +1
> 
> For that matter, explicit typing is good and I am a bit ambivalent on the use 
> of `sub`.
> 
> Also, I need to add the 4th consideration: Although the current privacy 
> consideration is stating about the encryption, it is in relation to the end 
> user exposure. In fact, the by-value access token when involving some PII is 
> by definition leaking information and violating the data minimization 
> principle. This should be clearly delineated. My gut feeling is that it 
> should be encrypted unless it is certain that it does not include sensitive 
> PII as judging whether a claim may form a PII is too hard for an average 
> developer..
> 
> -----Original Message-----
> From: OAuth <oauth-boun...@ietf.org> On Behalf Of Anthony Nadalin
> Sent: Wednesday, April 10, 2019 8:12 PM
> To: Hannes Tschofenig <hannes.tschofe...@arm.com>; oauth@ietf.org
> Subject: Re: [OAUTH-WG] Call for adoption: JWT Usage in OAuth2 Access Tokens
> 
> I support adoption of this draft as a working group document with the 
> following caveats:
> 
> 1. These are not to be used as ID Tokens/authentication tokens 2. The privacy 
> issues must be addressed 3. Needs to be extensible, much like ID-Token, can't 
> be 100% fixed
> 
> 
> -----Original Message-----
> From: OAuth <oauth-boun...@ietf.org> On Behalf Of Hannes Tschofenig
> Sent: Monday, April 8, 2019 10:07 AM
> To: oauth@ietf.org
> Subject: [OAUTH-WG] Call for adoption: JWT Usage in OAuth2 Access Tokens
> 
> Hi all,
> 
> this is the call for adoption of the 'JWT Usage in OAuth2 Access Tokens'  
> document following the positive feedback at the last IETF meeting in Prague.
> 
> Here is the document:
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Ftools.ietf.org%2Fhtml%2Fdraft-bertocci-oauth-access-token-jwt-00&amp;data=02%7C01%7Ctonynad%40microsoft.com%7Ca3d9527e05364fa8578b08d6bc44b170%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C1%7C636903400616347061&amp;sdata=ePmwaD%2FHCRZhRx%2FwZbb3U72%2FhBalPoFPKtQ67QTxIRw%3D&amp;reserved=0
> 
> Please let us know by April 22nd whether you accept / object to the adoption 
> of this document as a starting point for work in the OAuth working group.
> 
> Ciao
> Hannes & Rifaat
> 
> IMPORTANT NOTICE: The contents of this email and any attachments are 
> confidential and may also be privileged. If you are not the intended 
> recipient, please notify the sender immediately and do not disclose the 
> contents to any other person, use it for any purpose, or store or copy the 
> information in any medium. Thank you.
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Foauth&amp;data=02%7C01%7Ctonynad%40microsoft.com%7Ca3d9527e05364fa8578b08d6bc44b170%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C1%7C636903400616357060&amp;sdata=zcxw1IR3kNbuZ9u58OOJDv9pLb7cUCooDtlIUH7tS%2Fw%3D&amp;reserved=0
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


Martin Schanzenbach
Fraunhofer AISEC
Department Service & Application Security
Parkring 4, 85748 Garching near Munich (Germany)
Tel: +49 89 3229986-193
martin.schanzenb...@aisec.fraunhofer.de
GPG: 6665201EA9257CC68FDE77E884335131EA3DABF0

Attachment: signature.asc
Description: Message signed with OpenPGP

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to