Really excited for this, I'm especially interested in how this might apply
to M2M flows, related to this part here:
https://datatracker.ietf.org/doc/html/rfc7521#section-4.2

It seems very targeted towards mobile / desktop apps, would it work for
servers / command line tools, etc?

OS



On Thu, Jul 20, 2023 at 1:57 PM Tobias Looker <tobias.looker=
40mattr.glo...@dmarc.ietf.org> wrote:

> Hi All,
>
>
>
> Paul and I would like to draw attention to a new draft we have submitted
> titled “OAuth 2.0 Attestation-Based Client Authentication” which will be
> presented at the up and coming IETF 117 meeting during the Friday meeting
> slot. This draft is related to the group of drafts on verifiable
> credentials that will be presented during this meeting slot. Specifically
> this draft is intended to address but not limited to eIDAS 2.0 usage of
> OpenID4VCI which requires wallet applications to be strongly authenticated
> via attestations.
>
>
>
> The current abstract of the draft is as follows:
>
>
>
> “This specification defines a new method of client authentication for
> OAuth 2.0 [RFC6749] by extending the approach defined in [RFC7521]. This
> new method enables client deployments that are traditionally viewed as
> public clients to be able to authenticate with the authorization server
> through an attestation based authentication scheme.”
>
>
>
> Link to the current editors copy =>
> https://datatracker.ietf.org/doc/draft-looker-oauth-attestation-based-client-auth/
>
>
> Link to the specification repository =>
> https://github.com/vcstuff/draft-looker-oauth-attestation-based-client-auth
>
>
>
> Thanks,
>
> [image: MATTR website] <https://mattr.global/>
>
>
>
> *Tobias Looker*
>
> MATTR
>
> +64 273 780 461
> tobias.looker@mattr.global <first.last@mattr.global>
>
> [image: MATTR website] <https://mattr.global/>
>
> [image: MATTR on LinkedIn] <https://www.linkedin.com/company/mattrglobal>
>
> [image: MATTR on Twitter] <https://twitter.com/mattrglobal>
>
> [image: MATTR on Github] <https://github.com/mattrglobal>
>
>
> This communication, including any attachments, is confidential. If you are
> not the intended recipient, you should not read it – please contact me
> immediately, destroy it, and do not copy or use any part of this
> communication or disclose anything about it. Thank you. Please note that
> this communication does not designate an information system for the
> purposes of the Electronic Transactions Act 2002.
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>


-- 


ORIE STEELE
Chief Technology Officer
www.transmute.industries

<https://transmute.industries>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to