Does it? That's not what I read from the nested jwt draft. If you could point out where it requires either of those to be true I think it would help the draft authors consider your additional use case.
On Fri, Nov 11, 2022 at 11:01 AM Dr. Kelley W Burgin <kbur...@mitre.org> wrote: > Thanks Atul. > > > > Warren, > > > > We see the following two benefits of our solution over embedded tokens: > > > > 1. Iterated calls (say PR1 needs to access PR2 needs to access … needs to > access PR5, all in different trust domains) do not result in a large final > token as they would with embedded tokens > > 2. Our solution puts the burden of adding additional logic in the AS > instead of the PRs as embedded tokens would do. > > > > Kelley > > > > *From: *Atul Tulshibagwale <a...@sgnl.ai> > *Date: *Friday, November 11, 2022 at 9:54 AM > *To: *Warren Parad <wparad=40rhosys...@dmarc.ietf.org>, "Dr. Kelley W > Burgin" <kbur...@mitre.org> > *Cc: *"mjje...@cyber.nsa.gov" <mjjenki=40cyber.nsa....@dmarc.ietf.org>, " > oauth@ietf.org" <oauth@ietf.org> > *Subject: *[EXT] Re: [OAUTH-WG] Fw: New Version Notification for > draft-burgin-jenkins-identity-chaining-00.txt > > > > +Dr. Kelley W Burgin <kbur...@mitre.org> > > Hi, Kelley would like to respond, so I'm copying him here (he only has the > digest of the day) > > > > On Wed, Nov 9, 2022 at 11:08 AM Warren Parad <wparad= > 40rhosys...@dmarc.ietf.org> wrote: > > I think it would be confusing for implementers to have to figure out the > difference between this implementation and > https://datatracker.ietf.org/doc/html/draft-yusef-oauth-nested-jwt. This > previous one looks to add the exact same information but seems to have a > more robust encapsulation mechanism. > > > > On Wed, Nov 9, 2022 at 10:51 AM mjje...@cyber.nsa.gov <mjjenki= > 40cyber.nsa....@dmarc.ietf.org> wrote: > > Kelley and I have posted a draft to describe what we are trying to > accomplish within the Fine-Grained Authorization sub-group. > > > > Mike Jenkins > > NSA-CCSS > ------------------------------ > > *From:* internet-dra...@ietf.org <internet-dra...@ietf.org> > *Sent:* Tuesday, November 8, 2022 7:13 AM > *To:* Kelley Burgin <kelley.bur...@gmail.com>; Michael Jenkins (GOV) < > mjje...@cyber.nsa.gov>; Michael Jenkins (GOV) <mjje...@cyber.nsa.gov> > *Subject:* New Version Notification for > draft-burgin-jenkins-identity-chaining-00.txt > > > > > A new version of I-D, draft-burgin-jenkins-identity-chaining-00.txt > has been successfully submitted by Mike Jenkins and posted to the > IETF repository. > > Name: draft-burgin-jenkins-identity-chaining > Revision: 00 > Title: OAuth Identity Chaining > Document date: 2022-11-08 > Group: Individual Submission > Pages: 7 > URL: > https://gcc02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Farchive%2Fid%2Fdraft-burgin-jenkins-identity-chaining-00.txt&data=05%7C01%7Cmjjenki%40cyber.nsa.gov%7Cda6b9b2940184949b7ad08dac182bfa2%7Cd61e9a6ffc164f848a3e6eeff33e136b%7C0%7C0%7C638035064561336774%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=bhueo%2BvPkNBZmY5k7jAurvtu29btVjewGiNEsphI33Q%3D&reserved=0 > Status: > https://gcc02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-burgin-jenkins-identity-chaining%2F&data=05%7C01%7Cmjjenki%40cyber.nsa.gov%7Cda6b9b2940184949b7ad08dac182bfa2%7Cd61e9a6ffc164f848a3e6eeff33e136b%7C0%7C0%7C638035064561336774%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=X%2BimOqs3Vwyw9ckZ64dBJ2fvVotkdT5o10IFZ6zjqhY%3D&reserved=0 > Html: > https://gcc02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Farchive%2Fid%2Fdraft-burgin-jenkins-identity-chaining-00.html&data=05%7C01%7Cmjjenki%40cyber.nsa.gov%7Cda6b9b2940184949b7ad08dac182bfa2%7Cd61e9a6ffc164f848a3e6eeff33e136b%7C0%7C0%7C638035064561336774%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=tHYIgMY6dYUJp0%2FjD9Fyu7dMdWHZSIUMv9YYzdZOI0g%3D&reserved=0 > Htmlized: > https://gcc02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Fdraft-burgin-jenkins-identity-chaining&data=05%7C01%7Cmjjenki%40cyber.nsa.gov%7Cda6b9b2940184949b7ad08dac182bfa2%7Cd61e9a6ffc164f848a3e6eeff33e136b%7C0%7C0%7C638035064561336774%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=nUdyXxQm1Q4K%2FKYF6ROhhU1vmCnCBa5RTSM7U6BMks0%3D&reserved=0 > > > Abstract: > This specification defines a new OAuth claim that allows a proxying > OAuth client to pass identity information for a different OAuth > client to an OAuth authorization server during a token request. The > authorization server uses this additional identity information when > populating the "client_id" and "cnf" fields of the returned access > token instead of the identity information about the proxying client > requesting the token. > > > > > > The IETF Secretariat > > _______________________________________________ > OAuth mailing list > OAuth@ietf.org > https://www.ietf.org/mailman/listinfo/oauth > > _______________________________________________ > OAuth mailing list > OAuth@ietf.org > https://www.ietf.org/mailman/listinfo/oauth > >
_______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth