Hi Hervé,

I assume you want to allow the TPP to send the PSU to the bank’s app on the 
same device?

In that case, why don’t you just make the bank’s authorization endpoint URL the 
universal link? If the universal link is defined on the smartphone (since the 
bank’s app is installed), the redirect will open the app. If the app is not 
installed, well, it will open the authorization endpoint in the browser. A very 
robust and simple approach.

There is an excellent article about this topic by Joseph Hernan on openid.net 
https://openid.net/2019/10/21/guest-blog-implementing-app-to-app-authorisation-in-oauth2-openid-connect/.

best regards,
Torsten.

> Am 18.11.2019 um 16:24 schrieb Robache Hervé <herve.roba...@stet.eu>:
> 
> 
> Dear all
>  
> We are considering using RFC8628 for a specific use case that is related to 
> the version 2 of Payment Service Directive in Europe (PSD2).
>  
> The purpose of the work is to provide a decoupled authentication flow for a 
> payment Service User (PSU) aiming to grant access to a Third Party Provider 
> (TPP) for his/her data hosted by a Bank.
> The sequence should be as followed:
> -          Nominal flow (as specified by the RFC)
> o   The TPP asks the PSU about the Bank identity
> o   The TPP posts a Device Access Token Request to the Bank
> o   The Bank sends back a Device Access Token response to the TPP
> o   The TPP starts to poll the bank for gaining the access token
> -          Derived flow
> o   The “verification_uri_complete” will not be displayed to the PSU but used 
> as an [app link]/[universal link] on a smartphone in order to launch the 
> bank’s app.
> o   The bank’s app authenticates the PSU and asks for consent confirmation
> -          Back to the nominal flow
> o   The TPP gets its access token
>  
> Two questions have raised during the work
> -          As RFC8628 is supposed to work on separate devices, can the usage 
> be extrapolated to separate apps on the same device (i.e. the PSU’s 
> smartphone)?
> -          One issue of the derived flow is that, after authentication, the 
> PSU is still facing the bank’s app
> o   We would like to go back to the TPP’s app as fluently as possible. The 
> use of another [app link]/[universal link]could do the job is provided by the 
> TPP. We consider adding this uri as an additional parameter to the 
> “verification_uri_complete”.
> o   Is this compliant with RFC8628?
>  
> Thanks in advance for your answers.
>  
> Hervé Robache
> 
> 
> Ce message et toutes les pièces jointes sont établis à l'intention exclusive 
> de ses destinataires et sont confidentiels.
> Si vous recevez ce message par erreur ou s'il ne vous est pas destiné, merci 
> de le détruire ainsi que toute copie de votre système et d'en avertir 
> immédiatement l'expéditeur.
> Toute lecture non autorisée, toute utilisation de ce message qui n'est pas 
> conforme à sa destination, toute diffusion ou toute publication, totale ou 
> partielle, est interdite.
> L'Internet ne permettant pas d'assurer l'intégrité de ce message électronique 
> susceptible d'altération, STET décline toute responsabilité au titre de ce 
> message dans l'hypothèse où il aurait été modifié, déformé ou falsifié.
> N'imprimez ce message que si nécessaire, pensez à l'environnement.
> 
> This message and any attachments is intended solely for the intended 
> addressees and is confidential.
> If you receive this message in error, or are not the intended recipient(s), 
> please delete it and any copies from your systems and immediately notify the 
> sender.
> Any unauthorized view, use that does not comply with its purpose, 
> dissemination or disclosure, either whole or partial, is prohibited.
> Since the internet cannot guarantee the integrity of this message which may 
> not be reliable, STET shall not be liable for the message if modified, 
> changed or falsified.
> Do not print this message unless it is necessary, please consider the 
> environment.
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to