I have to admit I can’t read the slides, and the flows aren’t quite 
self-explanatory. However, just based on the headline I can’t quite figure out 
how to make a client “in the wild” (= the mobile app) a trusted IdP for a 
backend. This would basically allow anyone reverse-engineering the app (and 
it’s keypair) to generate arbitrary ID tokens.

However, I probably get something wrong ☺

- Dominik

Von: Nov Matake <mat...@gmail.com>
Gesendet: Samstag, 13. März 2021 05:00
An: SOMMER, DOMINIK <dominik.som...@milesandmore.com>
Cc: oauth@ietf.org
Betreff: Re: [OAUTH-WG] Authorization handover from mobile app to website

You can make your app an OIDC self-issued IdP for your website.

One of my clients are using the mechanism for Native App SSO, where an OIDC 
self-issued IdP embedded in the Native App is acting as IdP for the backend IdP 
server.

Unfortunately I have no english document now, but this slide describes the 
mechanism.
https://speakerdeck.com/rtechkouhou/openid-connect-self-issued-idpwoying-yong-sitasingle-sign-onfalseshi-zhuang
iPadから送信


2021/03/13 3:24、SOMMER, DOMINIK 
<dominik.som...@milesandmore.com<mailto:dominik.som...@milesandmore.com>>のメール:

Hi all,

we have recently launched a mobile app that uses our website’s login and 
authorization code flow to authenticate and authorize user access (following 
RFC8252).

However, not all of our website features are natively ported to the app itself. 
Some are only available on the website in logged-in state. That’s why we 
implemented an authorization handover mechanism based on one-time login codes: 
This allows the app (in logged-in state) to open a web view and hand over 
authentication & authorization, effectively logging the user in on the website. 
This achieves a seamless experience for the user without compromising on 
security.

We came up with this mechanism after researching for prior practice, but we 
couldn’t find anything applicable for this scenario.

Hence, three questions to the list:
1. Did we miss anything in our research? Is there a common best practice 
available?
2. If the answer to 1. is “No”, would the working group appreciate an RFC draft 
describing the solution we came up with? (We’d be eager for comments to make it 
even more secure ☺ )
3. If the answer to 2. is “Yes”, can someone point me to documentation on the 
procedure, if such exist?

Thanks for your support and
best regards,
Dominik

Sitz der Gesellschaft / Corporate Headquarters: Miles & More GmbH, Frankfurt am 
Main, Registereintragung / Registration: Amtsgericht Frankfurt am Main HRB 
116409
Geschaeftsfuehrung / Management Board: Sebastian Riedle, Dr. Oliver Schmitt


Sitz der Gesellschaft / Corporate Headquarters: Miles & More GmbH, Frankfurt am 
Main, Registereintragung / Registration: Amtsgericht Frankfurt am Main HRB 
116409
Geschaeftsfuehrung / Management Board: Sebastian Riedle, Dr. Oliver Schmitt


_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to