> oauth-requ...@ietf.org şunları yazdı (5 Ara 2022 13:39):
> 
> Send OAuth mailing list submissions to
>       oauth@ietf.org <mailto:oauth@ietf.org>
> 
> To subscribe or unsubscribe via the World Wide Web, visit
>       https://www.ietf.org/mailman/listinfo/oauth
> or, via email, send a message with subject or body 'help' to
>       oauth-requ...@ietf.org <mailto:oauth-requ...@ietf.org>
> 
> You can reach the person managing the list at
>       oauth-ow...@ietf.org <mailto:oauth-ow...@ietf.org>
> 
> When replying, please edit your Subject line so it is more specific
> than "Re: Contents of OAuth digest..."
> Today's Topics:
> 
>   1. Re: draft-ietf-oauth-selective-disclosure-jwt (Hannes Tschofenig)
> 
> Kimden: Hannes Tschofenig <hannes.tschofe...@arm.com 
> <mailto:hannes.tschofe...@arm.com>>
> Konu: Ynt: [OAUTH-WG] draft-ietf-oauth-selective-disclosure-jwt
> Tarih: 5 Aralık 2022 13:39:48 GMT+3
> Kime: Brian Campbell <bcampb...@pingidentity.com 
> <mailto:bcampb...@pingidentity.com>>
> Bilgi: oauth <oauth@ietf.org <mailto:oauth@ietf.org>>
> 
> 
> Thanks for the response, Brian. 
>  
> A few remarks below.
>  
> From: Brian Campbell <bcampb...@pingidentity.com 
> <mailto:bcampb...@pingidentity.com>> 
> Sent: Tuesday, November 29, 2022 11:21 PM
> To: Hannes Tschofenig <hannes.tschofe...@arm.com 
> <mailto:hannes.tschofe...@arm.com>>
> Cc: oauth <oauth@ietf.org <mailto:oauth@ietf.org>>
> Subject: Re: [OAUTH-WG] draft-ietf-oauth-selective-disclosure-jwt
>  
> Hi Hannes, 
>  
> Though I am yet to officially have my name on the document as a co-author, 
> you did mention me directly :) And so I'll attempt to answer or respond to 
> your questions/statements below.
>  
>  
> On Mon, Nov 28, 2022 at 7:24 AM Hannes Tschofenig <hannes.tschofe...@arm.com 
> <mailto:hannes.tschofe...@arm.com>> wrote:
> Hi Daniel, Hi Kristina, Hi Brian,
> Hi all,
>  
> Reading through draft-ietf-oauth-selective-disclosure-jwt I was wondering why 
> the document defines new terminology for roles that already exist in OAuth.
> For example:
>  
> Issuer  =  AS
> Holder = Client
> Verifier = RS
>  
> I assume that was done intentionally. What was the rational was.
>  
> JWT itself <https://datatracker.ietf.org/doc/rfc7519/> is a product of this 
> WG (as I'm sure you remember).. While JWT had important applications in 
> OAuth, it was developed as a more general purpose token format and has seen 
> widespread usage both in OAuth and beyond. Similarly, SD-JWT is meant to be a 
> general purpose selective disclosure mechanism for JWT, which can have 
> applications in OAuth but is certainly not constrained to OAuth. As such, the 
> terminology in the draft aims to be generally applicable/meaningful. This is 
> similar/consistent with JWT/RFC7519, which also does not use terms like AS, 
> RS, or client.
>  
>  
> [Hannes] I think the draft should provide that background. 
>  
>  
> You write:
>  
> “
> One of the common use cases of a signed JWT is representing a user's identity.
> “
>  
> In classical OAuth this use case should not be common. We bragged about the 
> fact that you could to delegated authorization without having to rely on 
> identity information. I think it would help to expand this statement a bit 
> and explain what the use case is. 
>  
> A signed JWT representing a user's identity is, in fact, exceedingly common. 
> Even in classical OAuth the access tokens almost always convey something 
> about an identity - the resource owner in OAuth parlance. The sub in 
> introspection https://www.rfc-editor.org/rfc/rfc7662#section-2.2 and the JWT 
> AT profilehttps://datatracker.ietf.org/doc/html/rfc9068#section-2.2 show this 
> in specs, for example. Of course the AT format and content aren't defined by 
> OAuth itself and are left up to the implementation/deployment so those 
> optional specs don't tell the whole story. But every single deployment I've 
> seen has some identity info in the AT for delegation.
>  
>  
> [Hannes] This paragraph would be a good addition to the draft providing a bit 
> of background.
>  
> You write:
> “ As long as the signed JWT is one-time use, it typically only contains those 
> claims the user has consented to disclose to a specific Verifier. However, 
> there is an increasing number of use cases where a signed JWT is created once 
> and then used a number of times by the user (the "Holder" of the JWT). In 
> such cases, the signed JWT needs to contain the superset of all claims the 
> user of the signed JWT might want to disclose to Verifiers at some point. The 
> ability to selectively disclose a subset of these claims depending on the 
> Verifier becomes crucial to ensure minimum disclosure and prevent Verifiers 
> from obtaining claims irrelevant for the transaction at hand.
> “
>  
> Using the same access token with multiple resource servers is not good 
> security practice not only from a privacy point of view but also from a 
> security point of view.
>  
> From reading the introduction I get the impression that you create your own 
> problem that is subsequently solved in the document. Since I believe you are 
> too clever to do this, I believe the document needs to provide more text to 
> explain how this use case emerged. You mention “verifiable credential” as the 
> “use case” but it is a technology rather than a use case.  
>  
> I've reread the introduction (which, in full disclosure, I did not write) and 
> honestly feel like it does a pretty decent job of describing the emerging 
> problem space and what the draft aims to provide. We certainly don't want to 
> leave you or any reader with the impression that the document invents a 
> not-real problem only to subsequently solve it. But I'm not getting that 
> impression from reading it. And I am honestly not sure how to better avoid 
> giving that impression (other than writing this email, I guess). 
>  
>  
> [Hannes] The obvious solution to only disclose information relevant for a 
> recipient is to provide that information. Now, you introduce a new 
> requirement, namely that you want to obtain the token once and then share it 
> with many recipients.
>  
> It would be good to motivate this new requirement since the solution comes 
> with a certain cost.
>  
>  
> Ciao
> Hannes
>  
> IMPORTANT NOTICE: The contents of this email and any attachments are 
> confidential and may also be privileged. If you are not the intended 
> recipient, please notify the sender immediately and do not disclose the 
> contents to any other person, use it for any purpose, or store or copy the 
> information in any medium. Thank you. 
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org <mailto:OAuth@ietf.org>
> https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to