Hi Mario,

Am 29.10.22 um 16:41 schrieb Mario Loffredo:


Apart from that, based on my interpretation of GDPR, a generic third-party client application processing the PII coming from the RDAP server as claims should be authorized by the end user through a specific request for consent.

[PK] I would stay away from any interpretation of GDPR in context of technical protocol. The protocol as proposed allows RDAP server to apply any policy it find appropriate, including not sharing any data at all, sharing some or all data without or with consent. It is very alike OpenID core Section 3.1.2.4. which does not mandate any specific way of authorization and includes "establishing consent via conditions for processing the request or other means (for example, via previous administrative consent)" which is exactly what server policy defines.

[ML] IMO you are not allowed to stay away. I mean, you should address the potential privacy implications of one single consent authorizing PII processing for two different purposes by the client and the server. Beside GDPR, Section 5.2.3 of RFC6973 states that secondary use defined as "the use of collected information about an individual without the individual's consent for a purpose different from that for which the information was collected" is a potential privacy threat to avoid or mitigate.

Given that usually a public RDAP client is unknown to the RDAP server and it can't leverage other lawful basis to legitimize its PII processing, my understanding of that statement is that the draft should declare somewhere (Privacy Considerations ?) that an additional consent is required for public clients. With regard to confidential clients, one consent could be sufficient (am not completely sure) assuming that all the purposes for PII processing are explicitly declared in the server's DPP and, presumably, all of them are regulated by contract.

[PK] The current draft allows the RDAP server to add any interactive step in between RDAP "login" request and the response, so if needed RDAP server MAY add a second consent according to own policy and legal requirements. I agree that 2 consents are not the best possible UX, but keeping it open for RDAP server operator to decide is for me the best option as only the RDAP server operator knows its policy and legal requirements. We may add some text around it to 3.2.1 (as an optional step in the process) and/or 4.2 to give implementers a clear indication of this consideration to take when implementing the server. A separate "Privacy Considerations" section is another possible approach. @Scott, what would you suggest?



My only concern is that without an option for confidential clients the choice of options when defining the policy would be limited by the technical capability of the protocol, because each policy will need to deal with a case of sharing data to potentially unknown party.


This is because the request for consent from the Authorization Server regards only the server processing.

BTW, if "scope" is optional, should the farv1_openidcConfiguration object include a "scopeSupported" property?

[PK] Agreed. I would define it as a list of strings scopes_supported, same as RFC8414.
In that case, I expect that the empty list will be allowed meaning that the scope parameter is unsupported.

[PK] RFC8414 defines it like this    scopes_supported RECOMMENDED.  JSON array containing a list of the OAuth 2.0 [RFC6749] "scope" values that this authorization server supports.       Servers MAY choose not to advertise some supported scope values even when this parameter is used.

With this definition an empty list may also mean the parameter is supported but the server does not specify its allowed values. RFC6749 also does not have to cope with "scope" not supported as it is a mandatory parameter in OAuth2.

We may take a guidance of OpenID Connect Discovery, where 2 server metadata items are used in analog case for claims parameter: claims_parameter_supported (bool) and claims_supported (list of strings).

So for our case it would be scope_parameter_supported and scopes_supported.


Kind Regards,

Pawel



_______________________________________________
regext mailing list
regext@ietf.org
https://www.ietf.org/mailman/listinfo/regext

Reply via email to