Am 26.10.22 um 15:48 schrieb Mario Loffredo:

[ML] Before going into detail with technical aspects, think we should address some privacy implications connected with the following sentence:

RDAP server SHOULD merge the scopes requested by the client with the
   scopes needed for authorization purposes when building an
   authorization request to OP.

Since the authorization requests would come from the RDAP server (acting as a registered OpendID client), the request for consent would be for processing claims by the RDAP server. Hence, only the RDAP server should be authorized to process the requested claims. Correct?

In addition, IMO the following aspects related to GDPR should be considered:

- The RDAP server would be entitled to process PII under the consent lawful basis but the RDAP client wouldn't be allowed to leverage such a basis for its own PII processing.

- Usually, domain registries have a web page showing their own Data Protection Policy. In the case where the RDAP server could process PII, the DPP should state (more or less) that the RDAP server processes PII only for making access control decision and removes it at the end of an authenticated session. The DPP should also ensure that PII is not revealed unintentionally to other parties. For that said, can't see how such a DPP could cover PII processing by other application than the RDAP server.


What's your opinion?

[PK] The text was proposed in the way which does not exclude certain valid use-cases but still allows the RDAP server to set its own policy on sharing data.

This is clear that RDAP server is acting as sort of Identity Provider towards its clients, so the similar considerations about data sharing shall apply. RDAP server may ask the user for the consent about sharing PII as well, decision is clearly by the RDAP server operator.

The proposal is also not obliging RDAP server to obey to the scope request from the RDAP client and same time not mandating forwarding any data to the client.

But if the RDAP server operator is comfortable to do so the protocol allows for that as well.


One reason why I put confidential clients as an open point is that currently only supporting public clients which are not authenticated by any way means that RDAP server has no means to apply different policies to registered trusted clients. Currently all are same so likely the least privileged policy would always apply, meaning no PII shared.

A way forward could be to indicate option for confidential clients but leaving the details up to implementation. The other option is to propose also a standard way of client authentication within this draft.


Kind Regards,

Pawel

_______________________________________________
regext mailing list
regext@ietf.org
https://www.ietf.org/mailman/listinfo/regext

Reply via email to