On 08/05/2019 11:57, Neil Madden wrote:
> Why does the RS need to know if the subject is a client vs a user? I suspect 
> the answers to that question are about as problematic as the RS needing to 
> know about the grant type.

I have the exact same question.

Could someone comment on that?

I cannot think of a good reason, unless perhaps for logging / audit.

> I’m not a fan of the client_credentials grant, better off using a real 
> service account in most cases. Hopefully no new grants will be added that 
> repeat that mistake.

What do you mean by service account in this context?

> Not sure I understand the point about JWT assertion grant type. If you use a 
> JWT assertion for client authentication then that’s just the 
> client_credentials grant again with a different token auth method, right?

That was my point, that the JWT assertion grant as the client
credentials grant can be used by a client acting on its own behalf.

> — Neil
>
>> On 8 May 2019, at 08:51, Vladimir Dzhuvinov <vladi...@connect2id.com> wrote:
>>
>> grant_type would be horrible for RS developers to deal with, just to find 
>> out whether "sub" effectively == "client_id".
>>
>> Why?
>> RS developers will need to learn more OAuth stuff - there are better ways to 
>> motivate people than that :)
>> The OAuth grant types are unbounded. If at some point a new grant gets 
>> devised / implemented, RS developers will need to update the code that maps 
>> grant_types to ("sub" effectively == "client_id")
>> We have at least one grant - JWT assertion - where checking the grant type 
>> is not sufficient to determine if "sub" effectively == "client_id"
>> I believe we should aim for a spec where RS developers shouldn't be required 
>> to know more than how to process JWTs.
>>
>> The AS has all the necessary information to indicate whether "sub" 
>> effectively == "client_id". We don't need to push that logic to the RS.
>> Vladimir
>>
>> On 07/05/2019 12:16, Neil Madden wrote:
>>> Ah, that makes sense. Well, we already add a grant_type claim to our 
>>> JWT-based access tokens, so I’m in favour of that solution :-)
>>>
>>>
>>>> On 7 May 2019, at 09:48, Vittorio Bertocci <vitto...@auth0.com> 
>>>> <mailto:vitto...@auth0.com> wrote:
>>>>
>>>> Thanks Neil, one more reason to avoid that.
>>>> TL;DR, 
>>>> The context is the discussion we had pre-IIW about whether sub should be 
>>>> included always or only for tokens issued to ROs. Some exiting 
>>>> implementations rely on that heuristic.
>>>> Turns out that 7519 has language suggesting sub should be there for both 
>>>> tokens issued for the RO and for apps (via client creds, etc).
>>>> We don't want to contradict 7519 but we also want to preserve the ability 
>>>> for a RS to tell whether an AT was issued via RO auth or app auth, hence 
>>>> the discussion. Suggestions ranged from adding a grant_type claim (Vlad 
>>>> made a convincing argument against it), to relying to the client_id==sub 
>>>> heuristic (which i pushed back on) to the introduction of a new claim 
>>>> (name TBD given that sub_type is taken already) that can explicitly 
>>>> declare whether the token has been issued authenticating th RO or via app 
>>>> credentials.
>>>>
>>>> On Tue, May 7, 2019 at 1:37 AM Neil Madden <neil.mad...@forgerock.com 
>>>> <mailto:neil.mad...@forgerock.com> <mailto:neil.mad...@forgerock.com> 
>>>> <mailto:neil.mad...@forgerock.com>> wrote:
>>>> I wasn’t at IIW so I may be missing some context.
>>>>
>>>> There is a potential security issue if the client_id is used as the “sub” 
>>>> for an AT obtained via client_credentials. If the client can register 
>>>> itself with a self-chosen client_id then it may deliberately chose a 
>>>> client_id that matches the user name of a privileged user. An RS that just 
>>>> blindly looks at the “sub” claim may then erroneously let the client 
>>>> perform privileged actions.
>>>>
>>>> Is this the context of the discussion?
>>>>
>>>> Given that there are a lot of RSes in existence, many of which are 
>>>> probably just looking at the “sub” claim to identify the resource owner, I 
>>>> think the onus is on the AS to ensure that no such ambiguity can arise in 
>>>> the first place by ensuring that the space of “sub” values for client 
>>>> credentials is disjoint with the space for genuine users or by disallowing 
>>>> the client_credentials grant altogether.
>>>>
>>>> This issue already arises in token introspection though, so maybe ought to 
>>>> be mentioned in the OAuth security topics draft rather than specific to 
>>>> the JWT AT draft?
>>>>
>>>> — Neil
>>>>
>>>>> On 6 May 2019, at 18:32, Vittorio Bertocci 
>>>>> <Vittorio=40auth0....@dmarc.ietf.org 
>>>>> <mailto:Vittorio=40auth0....@dmarc.ietf.org> 
>>>>> <mailto:Vittorio=40auth0....@dmarc.ietf.org> 
>>>>> <mailto:Vittorio=40auth0....@dmarc.ietf.org>> wrote:
>>>>>
>>>>> Hi all,
>>>>> thanks for your patience during this month long hiatus, and thanks for 
>>>>> the comments.
>>>>> Last week at IIW I had the opportunity to discuss this with many of the 
>>>>> people on the list. Here's a summary of where the discussion landaed on 
>>>>> the subject of the sub (pun intended).
>>>>>
>>>>> - It seems that RFC 7519 has pretty clear language on the use of sub- I 
>>>>> didn't check it back when we started the discussion. I do agree with the 
>>>>> people saying that we shouldn't violate existing specifications, hence it 
>>>>> looks like we do need to have sub also in the case in which we have 
>>>>> app-only tokens carrying claims about the app itself. I understand this 
>>>>> will cause some implementation to break, but unfortunately that's 
>>>>> intrinsic in the process of coming up with a common approach and 
>>>>> standards compliance is probably one of the strongest reasons to tolerate 
>>>>> that.
>>>>> - That said, I am strongly committed to preserve existing functionality. 
>>>>> One of the main reasons that was brought up for including sub only for 
>>>>> user based ATs was to use it as heuristic for telling those tokens apart 
>>>>> from app-only ones. To that end, Karl MCGuinness suggested that we 
>>>>> include grant_type as a return claim, which the RS could use to the same 
>>>>> effect. I find the proposal very clever, and the people at IIW thought so 
>>>>> as well. What you think?
>>>>> Note, John Bradley observed that in some cases this might lead to 
>>>>> ambiguous results if an extension grant is used (say an assertion 
>>>>> profile) but that seems like a relatively fringe occurrence.
>>>>>
>>>>> On Thu, Apr 4, 2019 at 1:11 PM Hans Zandbelt <hans.zandb...@zmartzone.eu 
>>>>> <mailto:hans.zandb...@zmartzone.eu> <mailto:hans.zandb...@zmartzone.eu> 
>>>>> <mailto:hans.zandb...@zmartzone.eu>> wrote:
>>>>> I also meant to say that (of course) the JWT standard doesn't say that 
>>>>> the JWT is supposed to be about the client or about the resource owner, 
>>>>> hence both are valid
>>>>>
>>>>> Hans.
>>>>>
>>>>> On Thu, Apr 4, 2019 at 10:09 PM Mike Jones <michael.jo...@microsoft.com 
>>>>> <mailto:michael.jo...@microsoft.com> <mailto:michael.jo...@microsoft.com> 
>>>>> <mailto:michael.jo...@microsoft.com>> wrote:
>>>>> I get that existing practice is likely to be all over the map, but if 
>>>>> we’re to create a JWT access token standard, it’s reasonable to require 
>>>>> that the claims usage comply with the JWT standards.
>>>>>
>>>>>  
>>>>>
>>>>>                                                                 -- Mike
>>>>>
>>>>>  
>>>>>
>>>>> From: Hans Zandbelt <hans.zandb...@zmartzone.eu 
>>>>> <mailto:hans.zandb...@zmartzone.eu> <mailto:hans.zandb...@zmartzone.eu> 
>>>>> <mailto:hans.zandb...@zmartzone.eu>> 
>>>>> Sent: Thursday, April 4, 2019 12:59 PM
>>>>> To: Mike Jones <michael.jo...@microsoft.com 
>>>>> <mailto:michael.jo...@microsoft.com> <mailto:michael.jo...@microsoft.com> 
>>>>> <mailto:michael.jo...@microsoft.com>>
>>>>> Cc: George Fletcher <gffletch=40aol....@dmarc.ietf.org 
>>>>> <mailto:gffletch=40aol....@dmarc.ietf.org> 
>>>>> <mailto:40aol....@dmarc...ietf.org> <mailto:40aol....@dmarc...ietf.org>>; 
>>>>> Vittorio Bertocci <Vittorio=40auth0....@dmarc.ietf.org 
>>>>> <mailto:Vittorio=40auth0....@dmarc.ietf.org> 
>>>>> <mailto:40auth0....@dmarc.ietf.org> <mailto:40auth0....@dmarc.ietf.org>>; 
>>>>> IETF oauth WG <oauth@ietf.org <mailto:oauth@ietf.org> 
>>>>> <mailto:oauth@ietf.org> <mailto:oauth@ietf.org>>
>>>>> Subject: Re: [OAUTH-WG] draft-bertocci-oauth-access-token-jwt-00
>>>>>
>>>>>  
>>>>>
>>>>> the definition of RFC 7519 is actually "petitio principii" and a lot of 
>>>>> deployments put claims about the Resource Owner in the access token (as a 
>>>>> Resource Server implementer I've suffered a lot from this)
>>>>>
>>>>>  
>>>>>
>>>>> Hans.
>>>>>
>>>>>  
>>>>>
>>>>> On Thu, Apr 4, 2019 at 9:48 PM Mike Jones <michael.jo...@microsoft.com 
>>>>> <mailto:michael.jo...@microsoft.com> <mailto:michael.jo...@microsoft.com> 
>>>>> <mailto:michael.jo...@microsoft.com>> wrote:
>>>>>
>>>>> I agree with George that the subject of a token must be the principal of 
>>>>> that token.  That what the JWT “sub” claim is for.  Indeed, the first 
>>>>> sentence of the “sub” definition at 
>>>>> https://tools.ietf.org/html/rfc7519#section-4.1.2 
>>>>> <https://tools.ietf.org/html/rfc7519#section-4.1.2> 
>>>>> <https://tools.ietf.org/html/rfc7519#section-4.1.2> 
>>>>> <https://tools.ietf.org/html/rfc7519#section-4.1.2> is:
>>>>>
>>>>> The "sub" (subject) claim identifies the principal that is the subject of 
>>>>> the JWT.
>>>>>
>>>>>  
>>>>>
>>>>> If an access token uses “sub”, its usage must comply with the definition 
>>>>> from RFC 7519.
>>>>>
>>>>>  
>>>>>
>>>>>                                                                 -- Mike
>>>>>
>>>>>  
>>>>>
>>>>> From: OAuth <oauth-boun...@ietf.org <mailto:oauth-boun...@ietf.org> 
>>>>> <mailto:oauth-boun...@ietf.org> <mailto:oauth-boun...@ietf.org>> On 
>>>>> Behalf Of George Fletcher
>>>>> Sent: Thursday, April 4, 2019 8:51 AM
>>>>> To: Hans Zandbelt <hans.zandb...@zmartzone.eu 
>>>>> <mailto:hans.zandb...@zmartzone.eu> <mailto:hans.zandb...@zmartzone.eu> 
>>>>> <mailto:hans.zandb...@zmartzone.eu>>
>>>>> Cc: Vittorio Bertocci <Vittorio=40auth0....@dmarc.ietf.org 
>>>>> <mailto:Vittorio=40auth0....@dmarc.ietf.org> 
>>>>> <mailto:40auth0....@dmarc.ietf.org> <mailto:40auth0....@dmarc.ietf.org>>; 
>>>>> IETF oauth WG <oauth@ietf.org <mailto:oauth@ietf.org> 
>>>>> <mailto:oauth@ietf.org> <mailto:oauth@ietf.org>>
>>>>> Subject: Re: [OAUTH-WG] draft-bertocci-oauth-access-token-jwt-00
>>>>>
>>>>>  
>>>>>
>>>>> The more I think about this the more I land in the "No" camp.
>>>>>
>>>>> The subject of a token should be the principal of that token. It 
>>>>> shouldn't matter whether that is a machine, a user, or a device. Trying 
>>>>> to separate out "humans" as a special class will just make things more 
>>>>> complicated. If we need a claim to identify the subject is a "human" then 
>>>>> why not just add that. This doesn't break anything and makes it easy for 
>>>>> people to detect this case in those use cases where it's required.
>>>>>
>>>>> Thanks,
>>>>> George
>>>>>
>>>>> On 4/3/19 4:56 PM, Hans Zandbelt wrote:
>>>>>
>>>>> I will argue that in a way such deployments are already broken e.g. in 
>>>>> the typical use case of onboarding client accounts in the same 
>>>>> directory/OU/namespace as user accounts and we don't need to cater for 
>>>>> that.
>>>>>
>>>>>  
>>>>>
>>>>> Hans.
>>>>>
>>>>>  
>>>>>
>>>>> On Wed, Apr 3, 2019 at 10:48 PM George Fletcher <gffle...@aol.com 
>>>>> <mailto:gffle...@aol.com> <mailto:gffle...@aol.com> 
>>>>> <mailto:gffle...@aol.com>> wrote:
>>>>>
>>>>> I agree that this will break a lot of existing flows... especially those 
>>>>> using any form of the client_credentials flow. In that sense I'm not 
>>>>> completely on board yet :)
>>>>>
>>>>> On 3/26/19 12:56 PM, Hans Zandbelt wrote:
>>>>>
>>>>> great summary! this will hurt quite a few existing m2m deployments but I 
>>>>> do like the rigidness of it all: it is very explicit, cannot 
>>>>> misinterpreted and thus prevents failure (which is really what Dominick 
>>>>> is after); I'm on board
>>>>>
>>>>>  
>>>>>
>>>>> Hans.
>>>>>
>>>>>  
>>>>>
>>>>> On Tue, Mar 26, 2019 at 5:49 PM Vittorio Bertocci 
>>>>> <Vittorio=40auth0....@dmarc.ietf.org 
>>>>> <mailto:Vittorio=40auth0....@dmarc.ietf.org> 
>>>>> <mailto:40auth0....@dmarc.ietf.org> <mailto:40auth0....@dmarc.ietf.org>> 
>>>>> wrote:
>>>>>
>>>>> thank you Steinar and everyone else for the comments on this!
>>>>>
>>>>> To summarize the situation so far: Dominick, Steinar, Rob, David, Nov, 
>>>>> Bertrand recommend using sub only for users. Martin would like to have 
>>>>> the sub for app only flows as well. Hans is neutral.
>>>>>
>>>>> That does sound like the sub as user has more consensus, tho before 
>>>>> changing it I'd wait for the people currently at IETF104 to have more 
>>>>> time to comment as well.
>>>>>
>>>>> Clarification. If the goal is to be able to apply the logic "if there's a 
>>>>> sub, it's a user flow", we have to explicitly disallow (MUST NOT) the use 
>>>>> of sub when that's not the case. Are all OK with it?
>>>>>
>>>>>  
>>>>>
>>>>> Dave, the suggestion of having explicit typing for app only vs user only 
>>>>> is interesting! For the purpose of putting together an interoperable 
>>>>> profile, tho, I would suggest we table it for v1 in the interest of 
>>>>> getting to something easy to adopt (hence with small delta vs existing 
>>>>> implementations) faster.     
>>>>>
>>>>>  
>>>>>
>>>>> On Tue, Mar 26, 2019 at 1:40 AM Steinar Noem <stei...@udelt.no 
>>>>> <mailto:stei...@udelt.no> <mailto:stei...@udelt.no> 
>>>>> <mailto:stei...@udelt.no>> wrote:
>>>>>
>>>>> Hi Vittorio, we  (the national federation-gateway for the health services 
>>>>> in norway - "HelseID")  think his is a really valuable initiative!
>>>>>
>>>>> We also agree with Dominick concerning definition of the "sub" claim.
>>>>>
>>>>>  
>>>>>
>>>>> <mvh>Steinar</mvh>
>>>>>
>>>>>  
>>>>>
>>>>> tir. 26. mar. 2019 kl. 07:25 skrev Dominick Baier 
>>>>> <dba...@leastprivilege.com <mailto:dba...@leastprivilege.com> 
>>>>> <mailto:dba...@leastprivilege.com> <mailto:dba...@leastprivilege.com>>:
>>>>>
>>>>> >From an access token consumer (aka API) developer point of view, I 
>>>>> >prefer this logic
>>>>>
>>>>>  
>>>>>
>>>>> "If sub is present - client acts on behalf of a user, if not - not."
>>>>>
>>>>>  
>>>>>
>>>>> Anything more complicated has a potential of going wrong.
>>>>>
>>>>>  
>>>>>
>>>>> On 26. March 2019 at 01:34:53, Nov Matake (mat...@gmail.com 
>>>>> <mailto:mat...@gmail.com> <mailto:mat...@gmail.com> 
>>>>> <mailto:mat...@gmail.com>) wrote:
>>>>>
>>>>> Hi Vittorio,
>>>>>
>>>>>  
>>>>>
>>>>> Yeah, I’m concerning user & client ids collision.
>>>>>
>>>>> I haven’t seen such implementations, but user-select username as sub, or 
>>>>> incremental integer as sub & client_id will be easily collide.
>>>>>
>>>>>  
>>>>>
>>>>> If you can enforce collision resistant IDs between user & client 
>>>>> instances, it’ll works fine. I feel its overkill though.
>>>>>
>>>>>  
>>>>>
>>>>> Sent from my iPhone
>>>>>
>>>>>
>>>>> On Mar 26, 2019, at 8:51, Vittorio Bertocci <vitto...@auth0.com 
>>>>> <mailto:vitto...@auth0.com> <mailto:vitto...@auth0.com> 
>>>>> <mailto:vitto...@auth0.com>> wrote:
>>>>>
>>>>> Hey Nov, Dominick, Hans-
>>>>>
>>>>> thanks for the comments. That was an area I was expecting to cause more 
>>>>> discussion, and I am glad we are having this opportunity to clarify.
>>>>>
>>>>> The current language in the draft traces the etymology of sub to OpenID 
>>>>> Connect core, hence Dominick observation is on point. However in the 
>>>>> description I express something in line with 7519, which was in fact my 
>>>>> intent.
>>>>>
>>>>>  
>>>>>
>>>>> The idea was to provide an identifier of the calling subject that is 
>>>>> guaranteed to be present in all cases- this would allow an SDK developer 
>>>>> to use the same code for things like lookups and membership checks 
>>>>> regardless of the nature of the caller (user in a delegated case, app in 
>>>>> app-only grants). The information to discriminate between user and app 
>>>>> callers is always available in the token (say, the caller is a user if 
>>>>> sub!=client_id, where client_id is always guaranteed to be present as 
>>>>> well) hence there's no loss in expressive power, should that difference 
>>>>> be relevant for the resource server.
>>>>>
>>>>>  
>>>>>
>>>>> Dominick, Hans- I probably missed the security issue you guys are 
>>>>> thinking of in this case. Of course, if this would introduce a risk I 
>>>>> completely agree it should be changed- I'd just like to understand better 
>>>>> the problem. Could you expand it in a scenario/use case to clarify the 
>>>>> risk?
>>>>>
>>>>> Nov- playing this back: is the concern that a user and a client might 
>>>>> have the same identifier within an IDP? When using collision resistant 
>>>>> IDs, as it is usually the case, that seems to be a remote possibility- 
>>>>> did you stumble in such scenario in production?
>>>>>
>>>>>  
>>>>>
>>>>> Thanks
>>>>>
>>>>> V. 
>>>>>
>>>>>  
>>>>>
>>>>>  
>>>>>
>>>>> On Mon, Mar 25, 2019 at 7:44 AM Hans Zandbelt <hans.zandb...@zmartzone.eu 
>>>>> <mailto:hans.zandb...@zmartzone.eu> <mailto:hans.zandb...@zmartzone.eu> 
>>>>> <mailto:hans.zandb...@zmartzone.eu>> wrote:
>>>>>
>>>>> I believe there are plenty of OAuth 2.0 only use cases out there... but 
>>>>> nevertheless I agree with the potential confusion and thus security 
>>>>> problems arising from that (though one may argue the semantics are the 
>>>>> same).
>>>>>
>>>>>  
>>>>>
>>>>> Hans.
>>>>>
>>>>>  
>>>>>
>>>>> On Mon, Mar 25, 2019 at 3:39 PM Dominick Baier <dba...@leastprivilege.com 
>>>>> <mailto:dba...@leastprivilege.com> <mailto:dba...@leastprivilege.com> 
>>>>> <mailto:dba...@leastprivilege.com>> wrote:
>>>>>
>>>>> Yes I know - and I think in hindsight it was a mistake to use the same 
>>>>> claim type for multiple semantics.
>>>>>
>>>>>  
>>>>>
>>>>> All the “this is OIDC not OAuth” arguments are making things more 
>>>>> complicated than they need to be - in my experience almost no-one (that I 
>>>>> know) does OIDC only - nor OAuth only. They always combine it.
>>>>>
>>>>>  
>>>>>
>>>>> In reality this leads to potential security problems - this spec has the 
>>>>> potential to rectify the situation.
>>>>>
>>>>>  
>>>>>
>>>>> Dominick
>>>>>
>>>>> On 25. March 2019 at 14:58:56, Hans Zandbelt (hans.zandb...@zmartzone.eu 
>>>>> <mailto:hans.zandb...@zmartzone.eu> <mailto:hans.zandb...@zmartzone.eu> 
>>>>> <mailto:hans.zandb...@zmartzone.eu>) wrote:
>>>>>
>>>>> Without agreeing or disagreeing: OIDC does not apply here since it is not 
>>>>> OAuth and an access token is not an id_token.
>>>>>
>>>>> The JWT spec says in https://tools.ietf.org/html/rfc7519#section-4.1.2 
>>>>> <https://tools.ietf.org/html/rfc7519#section-4.1.2> 
>>>>> <https://tools.ietf.org/html/rfc7519#section-4.1.2> 
>>>>> <https://tools.ietf.org/html/rfc7519#section-4.1.2>:
>>>>>
>>>>>  
>>>>>
>>>>> "The "sub" (subject) claim identifies the principal that is the
>>>>>
>>>>>    subject of the JWT.  The claims in a JWT are normally statements
>>>>>
>>>>>    about the subject.  The subject value MUST either be scoped to be
>>>>>
>>>>>    locally unique in the context of the issuer or be globally unique.
>>>>>
>>>>>    The processing of this claim is generally application specific"
>>>>>
>>>>>  
>>>>>
>>>>> which kind of spells "client" in case of the client credentials grant but 
>>>>> I also do worry about Resource Servers thinking/acting only in terms of 
>>>>> users
>>>>>
>>>>>  
>>>>>
>>>>> Hans.
>>>>>
>>>>>  
>>>>>
>>>>> On Mon, Mar 25, 2019 at 2:41 PM Dominick Baier <dba...@leastprivilege.com 
>>>>> <mailto:dba...@leastprivilege.com> <mailto:dba...@leastprivilege.com> 
>>>>> <mailto:dba...@leastprivilege.com>> wrote:
>>>>>
>>>>> IMHO the sub claim should always refer to the user - and nothing else.
>>>>>
>>>>>  
>>>>>
>>>>> OIDC says:
>>>>>
>>>>>  
>>>>>
>>>>> "Subject - Identifier for the End-User at the Issuer."
>>>>>
>>>>>  
>>>>>
>>>>> client_id should be used to identify clients.
>>>>>
>>>>>  
>>>>>
>>>>> cheers
>>>>>
>>>>> Dominick
>>>>>
>>>>>  
>>>>>
>>>>> On 25.. March 2019 at 05:13:03, Nov Matake (mat...@gmail.com 
>>>>> <mailto:mat...@gmail.com> <mailto:mat...@gmail.com> 
>>>>> <mailto:mat...@gmail.com>) wrote:
>>>>>
>>>>> Hi Vittorio,
>>>>>
>>>>>  
>>>>>
>>>>> Thanks for the good starting point of standardizing JWT-ized AT.
>>>>>
>>>>>  
>>>>>
>>>>> One feedback.
>>>>>
>>>>> The “sub” claim can include 2 types of identifier, end-user and client, 
>>>>> in this spec.
>>>>>
>>>>> It requires those 2 types of identifiers to be unique each other in the 
>>>>> IdP context.
>>>>>
>>>>>  
>>>>>
>>>>> I prefer omitting “sub” claim in 2-legged context, so that no such 
>>>>> constraint needed.
>>>>>
>>>>>  
>>>>>
>>>>> thanks
>>>>>
>>>>>  
>>>>>
>>>>> nov
>>>>>
>>>>>  
>>>>>
>>>>> On Mar 25, 2019, at 8:29, Vittorio Bertocci 
>>>>> <vittorio.bertocci=40auth0....@dmarc.ietf.org 
>>>>> <mailto:vittorio.bertocci=40auth0....@dmarc.ietf.org> 
>>>>> <mailto:vittorio.bertocci=40auth0....@dmarc.ietf.org> 
>>>>> <mailto:vittorio.bertocci=40auth0....@dmarc.ietf.org>> wrote:
>>>>>
>>>>>  
>>>>>
>>>>> Dear all,
>>>>>
>>>>> I just submitted a draft describing a JWT profile for OAuth 2.0 access 
>>>>> tokens. You can find it in 
>>>>> https://datatracker.ietf.org/doc/draft-bertocci-oauth-access-token-jwt/ 
>>>>> <https://datatracker.ietf.org/doc/draft-bertocci-oauth-access-token-jwt/> 
>>>>> <https://datatracker.ietf.org/doc/draft-bertocci-oauth-access-token-jwt/> 
>>>>> <https://datatracker.ietf.org/doc/draft-bertocci-oauth-access-token-jwt/>.
>>>>>
>>>>> I have a slot to discuss this tomorrow at IETF 104 (I'll be presenting 
>>>>> remotely). I look forward for your comments!
>>>>>
>>>>>  
>>>>>
>>>>> Here's just a bit of backstory, in case you are interested in how this 
>>>>> doc came to be. The trajectory it followed is somewhat unusual.
>>>>>
>>>>> Despite OAuth2 not requiring any specific format for ATs, through the 
>>>>> years I have come across multiple proprietary solution using JWT for 
>>>>> their access token. The intent and scenarios addressed by those solutions 
>>>>> are mostly the same across vendors, but the syntax and interpretations in 
>>>>> the implementations are different enough to prevent developers from 
>>>>> reusing code and skills when moving from product to product.
>>>>> I asked several individuals from key products and services to share with 
>>>>> me concrete examples of their JWT access tokens (THANK YOU Dominick Baier 
>>>>> (IdentityServer), Brian Campbell (PingIdentity), Daniel Dobalian 
>>>>> (Microsoft), Karl Guinness (Okta) for the tokens and explanations!).
>>>>> I studied and compared all those instances, identifying commonalities and 
>>>>> differences. 
>>>>> I put together a presentation summarizing my findings and suggesting a 
>>>>> rough interoperable profile (slides: 
>>>>> https://sec.uni-stuttgart.de/_media/events/osw2019/slides/bertocci_-_a_jwt_profile_for_ats.pptx
>>>>>  
>>>>> <https://sec.uni-stuttgart.de/_media/events/osw2019/slides/bertocci_-_a_jwt_profile_for_ats.pptx>
>>>>>  
>>>>> <https://sec..uni-stuttgart.de/_media/events/osw2019/slides/bertocci_-_a_jwt_profile_for_ats.pptx>
>>>>>  
>>>>> <https://sec..uni-stuttgart.de/_media/events/osw2019/slides/bertocci_-_a_jwt_profile_for_ats.pptx>
>>>>>  ) - got early feedback from Filip Skokan on it. Thx Filip!
>>>>> The presentation was followed up by 1.5 hours of unconference discussion, 
>>>>> which was incredibly valuable to get tight-loop feedback and incorporate 
>>>>> new ideas. John Bradley, Brian Campbell Vladimir Dzhuvinov, Torsten 
>>>>> Lodderstedt, Nat Sakimura, Hannes Tschofenig were all there and 
>>>>> contributed generously to the discussion. Thank you!!!
>>>>> Note: if you were at OSW2019, participated in the discussion and didn't 
>>>>> get credited in the draft, my apologies: please send me a note and I'll 
>>>>> make things right at the next update.
>>>>> On my flight back I did my best to incorporate all the ideas and feedback 
>>>>> in a draft, which will be discussed at IETF104 tomorrow. Rifaat, Hannes 
>>>>> and above all Brian were all super helpful in negotiating the mysterious 
>>>>> syntax of the RFC format and submission process.
>>>>> I was blown away by the availability, involvement and willingness to 
>>>>> invest time to get things right that everyone demonstrated in the 
>>>>> process. This is an amazing community. 
>>>>>
>>>>> V.
>>>>>
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org <mailto:OAuth@ietf.org> <mailto:OAuth@ietf.org> 
>>>>> <mailto:OAuth@ietf.org>
>>>>> https://www.ietf.org/mailman/listinfo/oauth 
>>>>> <https://www.ietf.org/mailman/listinfo/oauth> 
>>>>> <https://www.ietf.org/mailman/listinfo/oauth> 
>>>>> <https://www.ietf.org/mailman/listinfo/oauth>
>>>>>  
>>>>>
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org <mailto:OAuth@ietf.org> <mailto:OAuth@ietf.org> 
>>>>> <mailto:OAuth@ietf.org>
>>>>> https://www.ietf.org/mailman/listinfo/oauth 
>>>>> <https://www.ietf.org/mailman/listinfo/oauth> 
>>>>> <https://www.ietf.org/mailman/listinfo/oauth> 
>>>>> <https://www.ietf.org/mailman/listinfo/oauth>
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org <mailto:OAuth@ietf.org> <mailto:OAuth@ietf.org> 
>>>>> <mailto:OAuth@ietf.org>
>>>>> https://www.ietf.org/mailman/listinfo/oauth 
>>>>> <https://www.ietf.org/mailman/listinfo/oauth> 
>>>>> <https://www.ietf.org/mailman/listinfo/oauth> 
>>>>> <https://www.ietf.org/mailman/listinfo/oauth>
>>>>>
>>>>>  
>>>>>
>>>>> --
>>>>>
>>>>> hans.zandb...@zmartzone.eu <mailto:hans.zandb...@zmartzone.eu> 
>>>>> <mailto:hans.zandb...@zmartzone.eu> <mailto:hans.zandb...@zmartzone.eu>
>>>>> ZmartZone IAM - www.zmartzone.eu <http://www.zmartzone.eu/> 
>>>>> <http://www.zmartzone.eu/> <http://www.zmartzone.eu/>
>>>>>
>>>>>  
>>>>>
>>>>> --
>>>>>
>>>>> hans.zandb...@zmartzone.eu <mailto:hans.zandb...@zmartzone.eu> 
>>>>> <mailto:hans.zandb...@zmartzone.eu> <mailto:hans.zandb...@zmartzone.eu>
>>>>> ZmartZone IAM - www.zmartzone.eu <http://www.zmartzone.eu/> 
>>>>> <http://www.zmartzone.eu/> <http://www.zmartzone.eu/>
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org <mailto:OAuth@ietf.org> <mailto:OAuth@ietf.org> 
>>>>> <mailto:OAuth@ietf.org>
>>>>> https://www.ietf.org/mailman/listinfo/oauth 
>>>>> <https://www.ietf.org/mailman/listinfo/oauth> 
>>>>> <https://www.ietf.org/mailman/listinfo/oauth> 
>>>>> <https://www.ietf.org/mailman/listinfo/oauth>
>>>>>
>>>>>  
>>>>>
>>>>> --
>>>>>
>>>>> Vennlig hilsen
>>>>>
>>>>>  
>>>>>
>>>>> Steinar Noem
>>>>>
>>>>> Partner Udelt AS
>>>>>
>>>>> Systemutvikler
>>>>>
>>>>>  
>>>>>
>>>>> | stei...@udelt.no <mailto:stei...@udelt.no> <mailto:stei...@udelt..no> 
>>>>> <mailto:stei...@udelt..no> | h...@udelt.no <mailto:h...@udelt.no> 
>>>>> <mailto:h...@udelt.no> <mailto:h...@udelt.no>  | +47 955 21 620 | 
>>>>> www.udelt.no <http://www.udelt.no/> <http://www.udelt.no/> 
>>>>> <http://www.udelt.no/> | 
>>>>>
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org <mailto:OAuth@ietf.org> <mailto:OAuth@ietf.org> 
>>>>> <mailto:OAuth@ietf.org>
>>>>> https://www.ietf.org/mailman/listinfo/oauth 
>>>>> <https://www.ietf.org/mailman/listinfo/oauth> 
>>>>> <https://www.ietf.org/mailman/listinfo/oauth> 
>>>>> <https://www.ietf.org/mailman/listinfo/oauth>
>>>>>
>>>>>  
>>>>>
>>>>> --
>>>>>
>>>>> hans.zandb...@zmartzone.eu <mailto:hans.zandb...@zmartzone.eu> 
>>>>> <mailto:hans.zandb...@zmartzone.eu> <mailto:hans.zandb...@zmartzone.eu>
>>>>> ZmartZone IAM - www.zmartzone.eu <http://www.zmartzone.eu/> 
>>>>> <http://www.zmartzone.eu/> <http://www.zmartzone.eu/>
>>>>>  
>>>>>
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org <mailto:OAuth@ietf.org> <mailto:OAuth@ietf.org> 
>>>>> <mailto:OAuth@ietf.org>
>>>>> https://www.ietf.org/mailman/listinfo/oauth 
>>>>> <https://www.ietf.org/mailman/listinfo/oauth> 
>>>>> <https://www.ietf.org/mailman/listinfo/oauth> 
>>>>> <https://www.ietf.org/mailman/listinfo/oauth>
>>>>>  
>>>>>
>>>>>
>>>>>
>>>>>  
>>>>>
>>>>> --
>>>>>
>>>>> hans.zandb...@zmartzone.eu <mailto:hans.zandb...@zmartzone.eu> 
>>>>> <mailto:hans.zandb...@zmartzone.eu> <mailto:hans.zandb...@zmartzone.eu>
>>>>> ZmartZone IAM - www.zmartzone.eu <http://www.zmartzone.eu/> 
>>>>> <http://www.zmartzone.eu/> <http://www.zmartzone.eu/>
>>>>>  
>>>>>
>>>>>
>>>>>
>>>>>  
>>>>>
>>>>> --
>>>>>
>>>>> hans.zandb...@zmartzone.eu <mailto:hans.zandb...@zmartzone.eu> 
>>>>> <mailto:hans.zandb...@zmartzone.eu> <mailto:hans.zandb...@zmartzone.eu>
>>>>> ZmartZone IAM - www.zmartzone.eu <http://www.zmartzone.eu/> 
>>>>> <http://www.zmartzone.eu/> <http://www.zmartzone.eu/>
>>>>>
>>>>> -- 
>>>>> hans.zandb...@zmartzone.eu <mailto:hans.zandb...@zmartzone.eu> 
>>>>> <mailto:hans.zandb...@zmartzone.eu> <mailto:hans.zandb...@zmartzone.eu>
>>>>> ZmartZone IAM - www.zmartzone.eu <http://www.zmartzone.eu/> 
>>>>> <http://www.zmartzone.eu/> <http://www.zmartzone.eu/>
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org <mailto:OAuth@ietf.org> <mailto:OAuth@ietf.org> 
>>>>> <mailto:OAuth@ietf.org>
>>>>> https://www.ietf.org/mailman/listinfo/oauth 
>>>>> <https://www.ietf.org/mailman/listinfo/oauth> 
>>>>> <https://www.ietf.org/mailman/listinfo/oauth> 
>>>>> <https://www.ietf.org/mailman/listinfo/oauth>
>>>
>>>
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>>> https://www.ietf <https://www.ietf/>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>
-- 
Vladimir Dzhuvinov


_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to