Hi Scott,

please find my comments below.

Il 27/07/2022 23:48, Hollenbeck, Scott ha scritto:
OAuth 2.0 includes the ability to authorize a class of clients known as
"confidential clients" in a machine-to-machine manner using the "Client
Credentials Grant". The grant is described here:

https://datatracker.ietf.org/doc/html/rfc6749#section-4.4

A description of confidential and public clients can be found here:

https://datatracker.ietf.org/doc/html/rfc6749#section-2.1

Note that this requires some sort of prior arrangement between the client and,
in our case, an RDAP server, such that the client can be authenticated by an
Authorization Server without explicitly identifying, authenticating, and
authorizing the specific human users who might be using the client. For
example, the client might have a password that's been assigned by the RDAP
server operator. The federated authentication draft doesn't currently include
anything to support this type of grant. Should it? Is there an RDAP use case
for which this would be useful?

Think it should be addressed, though I'm not sure this is the right document.

The authentication flows explored so far fit well the use cases where a human occasionally submits a request. The case of authenticated software agents submitting a lot of requests routinely doesn't find a practical solution in this draft. I would like to remind everyone that EU Parliament and EU Council has recently reached an agreement on core elements of the e-Evidence proposal. Therefore, I guess that soon we will have to figure out how to provide regular authenticated access to registration data to categories of users legitimated for their purposes such as authorities and cybercrime agencies.

That being said, I see two big drawbacks in using the Client Credential flow, at least as is:

- Client Credential flow is for trusted clients. Clients need to be registered by the OP before submitting a request for an access token. But, RDAP clients are generally untrusted and I don't consider scalable a solution where several RDAP clients are required to register by many OPs including the local ones. In the approach described in this draft, the trusted client is the RDAP server.

- Roles and access grants are generally assigned to users not to clients. In addition, think there would be a potential risk of providing access to illegitimate users via legitimate clients.

The Resource Owner Password Credential Flow would have fiited better but it has been rightly deprecated by OAuth. I'm afraid that a usage of CC Flow in a manner similar to the ROPC flow wouldn't be welcome by security experts.

I would suggest to explore another approach where a third-party authority interconnects clients and servers that are mutually authenticated.


Best,

Mario




Scott

_______________________________________________
regext mailing list
regext@ietf.org
https://www.ietf.org/mailman/listinfo/regext

--
Dr. Mario Loffredo
Technological Unit “Digital Innovation”
Institute of Informatics and Telematics (IIT)
National Research Council (CNR)
via G. Moruzzi 1, I-56124 PISA, Italy
Phone: +39.0503153497
Web: http://www.iit.cnr.it/mario.loffredo

_______________________________________________
regext mailing list
regext@ietf.org
https://www.ietf.org/mailman/listinfo/regext

Reply via email to