Does it? That's not what I read from the nested jwt draft. If you could
point out where it requires either of those to be true I think it would
help the draft authors consider your additional use case.

On Fri, Nov 11, 2022 at 11:01 AM Dr. Kelley W Burgin <kbur...@mitre.org>
wrote:

> Thanks Atul.
>
>
>
> Warren,
>
>
>
> We see the following two benefits of our solution over embedded tokens:
>
>
>
> 1. Iterated calls (say PR1 needs to access PR2 needs to access … needs to
> access PR5, all in different trust domains) do not result in a large final
> token as they would with embedded tokens
>
> 2. Our solution puts the burden of adding additional logic in the AS
> instead of the PRs as embedded tokens would do.
>
>
>
> Kelley
>
>
>
> *From: *Atul Tulshibagwale <a...@sgnl.ai>
> *Date: *Friday, November 11, 2022 at 9:54 AM
> *To: *Warren Parad <wparad=40rhosys...@dmarc.ietf.org>, "Dr. Kelley W
> Burgin" <kbur...@mitre.org>
> *Cc: *"mjje...@cyber.nsa.gov" <mjjenki=40cyber.nsa....@dmarc.ietf.org>, "
> oauth@ietf.org" <oauth@ietf.org>
> *Subject: *[EXT] Re: [OAUTH-WG] Fw: New Version Notification for
> draft-burgin-jenkins-identity-chaining-00.txt
>
>
>
> +Dr. Kelley W Burgin <kbur...@mitre.org>
>
> Hi, Kelley would like to respond, so I'm copying him here (he only has the
> digest of the day)
>
>
>
> On Wed, Nov 9, 2022 at 11:08 AM Warren Parad <wparad=
> 40rhosys...@dmarc.ietf.org> wrote:
>
> I think it would be confusing for implementers to have to figure out the
> difference between this implementation and
> https://datatracker.ietf.org/doc/html/draft-yusef-oauth-nested-jwt. This
> previous one looks to add the exact same information but seems to have a
> more robust encapsulation mechanism.
>
>
>
> On Wed, Nov 9, 2022 at 10:51 AM mjje...@cyber.nsa.gov <mjjenki=
> 40cyber.nsa....@dmarc.ietf.org> wrote:
>
> Kelley and I have posted a draft to describe what we are trying to
> accomplish within the Fine-Grained Authorization sub-group.
>
>
>
> Mike Jenkins
>
> NSA-CCSS
> ------------------------------
>
> *From:* internet-dra...@ietf.org <internet-dra...@ietf.org>
> *Sent:* Tuesday, November 8, 2022 7:13 AM
> *To:* Kelley Burgin <kelley.bur...@gmail.com>; Michael Jenkins (GOV) <
> mjje...@cyber.nsa.gov>; Michael Jenkins (GOV) <mjje...@cyber.nsa.gov>
> *Subject:* New Version Notification for
> draft-burgin-jenkins-identity-chaining-00.txt
>
>
>
>
> A new version of I-D, draft-burgin-jenkins-identity-chaining-00.txt
> has been successfully submitted by Mike Jenkins and posted to the
> IETF repository.
>
> Name:           draft-burgin-jenkins-identity-chaining
> Revision:       00
> Title:          OAuth Identity Chaining
> Document date:  2022-11-08
> Group:          Individual Submission
> Pages:          7
> URL:
> https://gcc02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Farchive%2Fid%2Fdraft-burgin-jenkins-identity-chaining-00.txt&amp;data=05%7C01%7Cmjjenki%40cyber.nsa.gov%7Cda6b9b2940184949b7ad08dac182bfa2%7Cd61e9a6ffc164f848a3e6eeff33e136b%7C0%7C0%7C638035064561336774%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&amp;sdata=bhueo%2BvPkNBZmY5k7jAurvtu29btVjewGiNEsphI33Q%3D&amp;reserved=0
> Status:
> https://gcc02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-burgin-jenkins-identity-chaining%2F&amp;data=05%7C01%7Cmjjenki%40cyber.nsa.gov%7Cda6b9b2940184949b7ad08dac182bfa2%7Cd61e9a6ffc164f848a3e6eeff33e136b%7C0%7C0%7C638035064561336774%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&amp;sdata=X%2BimOqs3Vwyw9ckZ64dBJ2fvVotkdT5o10IFZ6zjqhY%3D&amp;reserved=0
> Html:
> https://gcc02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Farchive%2Fid%2Fdraft-burgin-jenkins-identity-chaining-00.html&amp;data=05%7C01%7Cmjjenki%40cyber.nsa.gov%7Cda6b9b2940184949b7ad08dac182bfa2%7Cd61e9a6ffc164f848a3e6eeff33e136b%7C0%7C0%7C638035064561336774%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&amp;sdata=tHYIgMY6dYUJp0%2FjD9Fyu7dMdWHZSIUMv9YYzdZOI0g%3D&amp;reserved=0
> Htmlized:
> https://gcc02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Fdraft-burgin-jenkins-identity-chaining&amp;data=05%7C01%7Cmjjenki%40cyber.nsa.gov%7Cda6b9b2940184949b7ad08dac182bfa2%7Cd61e9a6ffc164f848a3e6eeff33e136b%7C0%7C0%7C638035064561336774%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&amp;sdata=nUdyXxQm1Q4K%2FKYF6ROhhU1vmCnCBa5RTSM7U6BMks0%3D&amp;reserved=0
>
>
> Abstract:
>    This specification defines a new OAuth claim that allows a proxying
>    OAuth client to pass identity information for a different OAuth
>    client to an OAuth authorization server during a token request.  The
>    authorization server uses this additional identity information when
>    populating the "client_id" and "cnf" fields of the returned access
>    token instead of the identity information about the proxying client
>    requesting the token.
>
>
>
>
>
> The IETF Secretariat
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to