Hi Kai,

Some time ago we asked a similar question in this mailing list about a standard 
way to use the WWW-Authenticate header to indicate the requirement of 
'authorization_details' to the client. If I remember correctly, the response 
was that when discussing this option while defining the RFC, it was noted that 
headers do not support JSON structures very well, which is true.

However, an idea that we had is to use JSON schemas to define the authorization 
details type, as suggested in section "11.3. Use of Machine-Readable Type 
Schemas" of RFC 9396. This means that the authorization detail types could be a 
URL (as in the 'Figure 4' example of RFC 9396) where you can publish the JSON 
schema. Knowing the authorization detail type, the client can resolve the URL 
to get the documentation about the JSON structure.

By combining this solution with the Step Up Auth Challenge Protocol, you don't 
need to return a JSON structure in the 'WWW-Authenticate' header. Instead, you 
could include an additional parameter indicating the authorization detail type 
required, which is at the same time the schema that describes the structure of 
the JSON for the authorization request.

As per RFC 9470, "Note that while this specification only defines usage of the 
above auth-params with the insufficient_user_authentication error code, it does 
not preclude future specifications or profiles from defining their usage with 
other error codes." You could extend the specification with custom error codes 
and parameters…

Best regards.


From: geo...@practicalidentity.com <geo...@practicalidentity.com>
Date: Tuesday, 18 March 2025 at 12:17
To: Kai Lehmann <kai.lehmann=401und1...@dmarc.ietf.org>
Cc: oauth@ietf.org <oauth@ietf.org>
Subject: [EXT][OAUTH-WG] Re: Combining Step Up Auth mechanism with RAR
CAUTION: This message is from an EXTERNAL sender – be vigilant, particularly 
with links and attachments. If you suspect it, report it immediately using the 
phishing button.
Hi Kai,

I recently saw a proposal to extend the Step-Up mechanism by returning a body 
with the WWW-Authenticate header. This could work for what you are looking to 
do in returning a RAR authorization_details JSON object that the client can 
then pass to the AS. My only concern with this is whether most clients will 
know to look for a body with a WWW-Authenticate header and whether the browser 
will make the body available to a browser based client.

I agree that Step-Up flows need more options than max_age, scope and acr_values.

Thanks,
George

--
George Fletcher
Practical Identity LLC


On Mar 18, 2025, at 4:59 AM, Kai Lehmann 
<kai.lehmann=401und1...@dmarc.ietf.org> wrote:

Hi,

we are considering usign RAR to have a fine-grained authorization mechanism 
with additional user interactins during the authentication/authorization steps 
based on the authorization requested by the client.

Our main concern is how the client would know when it needs access tokens with 
specific RAR content and when it can simply use standard scope based access 
tokens. We thought about using a similar method as is described in the Step Up 
Auth Challenge Protocol. When requesting a specific resource, a resource server 
could use this protocol to tell the client that it needs an access token with 
specific authorization_details which the client can then obtain before 
requesting the resource again.

Another option would be to use something based on Protected Resource Metadata. 
However, here the Resource Server cannot craft a specific authorization_details 
it needs for a specific resource as it this usually depends on the request data 
which is not available at this point.

Is there something defined to close this gap which we are just not aware of?

Best regards,
kai
_______________________________________________
OAuth mailing list -- oauth@ietf.org
To unsubscribe send an email to oauth-le...@ietf.org
Emails aren't always secure, and they may be intercepted or changed after 
they've been sent. Santander doesn't accept liability if this happens. If you 
think someone may have interfered with this email, please get in touch with the 
sender another way. This message doesn't create or change any contract. 
Santander doesn't accept responsibility for damage caused by any viruses 
contained in this email or its attachments. Emails may be monitored. If you've 
received this email by mistake, please let the sender know at once that it's 
gone to the wrong person and then destroy it without copying, using, or telling 
anyone about its contents.

Santander UK plc. Registered Office: 2 Triton Square, Regent's Place, London, 
NW1 3AN, United Kingdom. Registered Number 2294747. Registered in England and 
Wales. https://www.santander.co.uk. Telephone 0800 389 7000. Calls may be 
recorded or monitored. Authorised by the Prudential Regulation Authority and 
regulated by the Financial Conduct Authority and the Prudential Regulation 
Authority. Our Financial Services Register number is 106054. You can check this 
on the Financial Services Register by visiting the FCA’s website 
https://www.fca.org.uk/register.  Santander and the flame logo are registered 
trademarks.


Ref:[PDB#1-4B]
_______________________________________________
OAuth mailing list -- oauth@ietf.org
To unsubscribe send an email to oauth-le...@ietf.org

Reply via email to