I think it would be confusing for implementers to have to figure out the
difference between this implementation and
https://datatracker.ietf.org/doc/html/draft-yusef-oauth-nested-jwt. This
previous one looks to add the exact same information but seems to have a
more robust encapsulation mechanism.

On Wed, Nov 9, 2022 at 10:51 AM mjje...@cyber.nsa.gov <mjjenki=
40cyber.nsa....@dmarc.ietf.org> wrote:

> Kelley and I have posted a draft to describe what we are trying to
> accomplish within the Fine-Grained Authorization sub-group.
>
> Mike Jenkins
> NSA-CCSS
> ------------------------------
> *From:* internet-dra...@ietf.org <internet-dra...@ietf.org>
> *Sent:* Tuesday, November 8, 2022 7:13 AM
> *To:* Kelley Burgin <kelley.bur...@gmail.com>; Michael Jenkins (GOV) <
> mjje...@cyber.nsa.gov>; Michael Jenkins (GOV) <mjje...@cyber.nsa.gov>
> *Subject:* New Version Notification for
> draft-burgin-jenkins-identity-chaining-00.txt
>
>
> A new version of I-D, draft-burgin-jenkins-identity-chaining-00.txt
> has been successfully submitted by Mike Jenkins and posted to the
> IETF repository.
>
> Name:           draft-burgin-jenkins-identity-chaining
> Revision:       00
> Title:          OAuth Identity Chaining
> Document date:  2022-11-08
> Group:          Individual Submission
> Pages:          7
> URL:
> https://gcc02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Farchive%2Fid%2Fdraft-burgin-jenkins-identity-chaining-00.txt&amp;data=05%7C01%7Cmjjenki%40cyber.nsa.gov%7Cda6b9b2940184949b7ad08dac182bfa2%7Cd61e9a6ffc164f848a3e6eeff33e136b%7C0%7C0%7C638035064561336774%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&amp;sdata=bhueo%2BvPkNBZmY5k7jAurvtu29btVjewGiNEsphI33Q%3D&amp;reserved=0
> Status:
> https://gcc02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-burgin-jenkins-identity-chaining%2F&amp;data=05%7C01%7Cmjjenki%40cyber.nsa.gov%7Cda6b9b2940184949b7ad08dac182bfa2%7Cd61e9a6ffc164f848a3e6eeff33e136b%7C0%7C0%7C638035064561336774%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&amp;sdata=X%2BimOqs3Vwyw9ckZ64dBJ2fvVotkdT5o10IFZ6zjqhY%3D&amp;reserved=0
> Html:
> https://gcc02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Farchive%2Fid%2Fdraft-burgin-jenkins-identity-chaining-00.html&amp;data=05%7C01%7Cmjjenki%40cyber.nsa.gov%7Cda6b9b2940184949b7ad08dac182bfa2%7Cd61e9a6ffc164f848a3e6eeff33e136b%7C0%7C0%7C638035064561336774%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&amp;sdata=tHYIgMY6dYUJp0%2FjD9Fyu7dMdWHZSIUMv9YYzdZOI0g%3D&amp;reserved=0
> Htmlized:
> https://gcc02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Fdraft-burgin-jenkins-identity-chaining&amp;data=05%7C01%7Cmjjenki%40cyber.nsa.gov%7Cda6b9b2940184949b7ad08dac182bfa2%7Cd61e9a6ffc164f848a3e6eeff33e136b%7C0%7C0%7C638035064561336774%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&amp;sdata=nUdyXxQm1Q4K%2FKYF6ROhhU1vmCnCBa5RTSM7U6BMks0%3D&amp;reserved=0
>
>
> Abstract:
>    This specification defines a new OAuth claim that allows a proxying
>    OAuth client to pass identity information for a different OAuth
>    client to an OAuth authorization server during a token request.  The
>    authorization server uses this additional identity information when
>    populating the "client_id" and "cnf" fields of the returned access
>    token instead of the identity information about the proxying client
>    requesting the token.
>
>
>
>
>
> The IETF Secretariat
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to