Yeah, both PKCE and Client Credential provide sender-constrained code...
lots of choices

Sent from my iPhone

> On Jun 7, 2020, at 21:26, Neil Madden <neil.mad...@forgerock.com> wrote:
> 
> 
> Answers inline: 
> 
>>> On 7 Jun 2020, at 13:07, Nov Matake <mat...@gmail.com> wrote:
>>> 
>> So, you mean…
>> 
>> If a frontend client want to use
>> * sender-constrained code, bearer access token and sender-constrained 
>> refresh token, use DynReg.
> 
> I’m not really sure what a sender-constrained code would be, but I suspect 
> the right answer here is PKCE + DPoP. PKCE basically is PoP for auth codes. 
> 
>> * sender-constrained code, sender-constrained access token and 
>> sender-constrained refresh token, use DynReg + DPoP.
> 
> PKCE + DPoP
> 
>> * bearer code, sender-constrained access token and sender-constrained 
>> refresh token, use DPoP only.
> 
> Sure, but you should always use PKCE, so PKCE + DPoP. 
> 
>> * bearer code, bearer access token and bearer refresh token, use neither.
>> 
>> is my understanding correct??
> 
> Just use PKCE + DPoP. (Or a different PoP mechanism, eg mTLS cert-bound 
> tokens, or etc). 
> 
>> 
>>> 2020/06/07 20:49、Neil Madden <neil.mad...@forgerock.com>のメール:
>>> 
>>> There are multiple issues with using dynamic client registration for this. 
>>> If a user uninstalls and later reinstalls an app then they can end up with 
>>> multiple registrations for the same client, which makes it harder for them 
>>> to manage access. Additionally, client registrations typically don’t expire 
>>> so the AS doesn’t know when it can remove unused clients.
>>> 
>>> Besides, this ship already sailed with mTLS cert-bound refresh tokens. 
>>> 
>>> Neil
>>> 
>>>>> On 7 Jun 2020, at 12:34, Nov Matake <mat...@gmail.com> wrote:
>>>>> 
>>>> Confidential clients can also use DPoP.
>>>> 
>>>>> 2020/06/07 20:25、Torsten Lodderstedt <tors...@lodderstedt.net>のメール:
>>>>> 
>>>>> If the client would register for every transaction.
>>>>> 
>>>>> And don’t forget, DPoP also supports sender constrained access to 
>>>>> resource servers, which dyn registration does not.
>>>>> 
>>>>>>> Am 07.06.2020 um 13:04 schrieb Nov Matake <mat...@gmail.com>:
>>>>>>> 
>>>>>> Since each client instance has at least one key, those are same level 
>>>>>> of state management.
>>>>>> 
>>>>>>> 2020/06/07 16:24、Torsten Lodderstedt <tors...@lodderstedt.net>のメール:
>>>>>>> 
>>>>>>> There are similarities in this particular use case but I would argue 
>>>>>>> DPoP is more light weight than dynamic client registration, less state 
>>>>>>> management in particular.
>>>>>>> 
>>>>>>>>> Am 07.06.2020 um 05:41 schrieb Nov Matake <mat...@gmail.com>:
>>>>>>>>> 
>>>>>>>> DPoP-bound refresh token seems feature duplication with dynamic 
>>>>>>>> client registration.
>>>>>>>> 
>>>>>>>>> 2020/06/07 7:57、Francis Pouatcha 
>>>>>>>>> <fpo=40adorsys...@dmarc..ietf.org>のメール:
>>>>>>>>> 
>>>>>>>>>> 
>>>>>>>>>> > Am 05.06.2020 um 22:17 schrieb George Fletcher 
>>>>>>>>>> > <gffletch=40aol....@dmarc..ietf.org>:
>>>>>>>>>> > 
>>>>>>>>>> > Secondly, I do think we need a way to allow for the refresh_token 
>>>>>>>>>> > to be bound while leaving the access_tokens as bearer tokens. This 
>>>>>>>>>> > adds useful security without impacting existing RS deployments.
>>>>>>>>>> 
>>>>>>>>>> +1 that’s a very useful 
>>>>>>>>>> feature_______________________________________________
>>>>>>>>> AFAIK a refresh_token is always bound. What am I missing here?
>>>>>>>>> -- 
>>>>>>>>> Francis Pouatcha
>>>>>>>>> Co-Founder and Technical Lead at adorys
>>>>>>>>> https://adorsys-platform.de/solutions/
>>>>>>>>> _______________________________________________
>>>>>>>>> OAuth mailing list
>>>>>>>>> OAuth@ietf.org
>>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>>> 
>>>>>> 
>>>> 
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>> 
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to