Re: [OAUTH-WG] WGLC on JSON Web Token (JWT)

2014-03-11 Thread Manger, James
Thanks for talking the time to reply to the individual comments, Mike. The structure of the JWT doc is still flawed. The root cause is that JWT tries to do three tasks: 1. Describe how a JOSE message can be a JWE or a JWS. 2. Describe how JOSE messages can nest (eg JWS in a JWE; JW

Re: [OAUTH-WG] JSON Web Token (JWT) Profile

2014-03-11 Thread Nat Sakimura
+1. Saving a few bytes in exchange to interoperability and security possible downgrade does not seem to be a good strategy for me. Nat 2014-03-12 7:04 GMT+09:00 Phil Hunt : > I think that's the wrong perspective. If you intend the issuer to be the > subject, you need to declare it. > > I wouldn

Re: [OAUTH-WG] JSON Web Token (JWT) Profile

2014-03-11 Thread Phil Hunt
I think that's the wrong perspective. If you intend the issuer to be the subject, you need to declare it. I wouldn't worry that it duplicates issuer. The fields have different meaning. Phil @independentid www.independentid.com phil.h...@oracle.com On 2014-03-11, at 1:43 PM, Antonio Sanso wrot

Re: [OAUTH-WG] JSON Web Token (JWT) Profile

2014-03-11 Thread Antonio Sanso
agree, but in some cases the subject is not only same as the issuer but simply it doesn’t matter. In my example below all it matters is that the assertion signed by app1 is valid…. Continue in my probably not relevant “Google example” if I set the prn same as the issuer it would not work (kee

Re: [OAUTH-WG] JSON Web Token (JWT) Profile

2014-03-11 Thread John Bradley
Company X will likely care about the subject being asserted by company A for auditing and possible revocation. It may be that the extension claim accessLevel=Accounting is sufficient to grant the access token. By Policy A could make sub itself, or an identifier for the user of the client in

Re: [OAUTH-WG] JSON Web Token (JWT) Profile

2014-03-11 Thread Manfred Steyer
Hi, perhaps you can show that I'm wrong, but I still think, that there are cases, where the subject is unknown cause it's not relevant. Let's consider the following federation-scenario: 1. Bob has a Token T1 that says, that he works for Company A on Project B. The Subject of this token is "Bob".

Re: [OAUTH-WG] JSON Web Token (JWT) Profile

2014-03-11 Thread John Bradley
The specification is intended to allow the interoperation of standard libraries. In some cases the subject and the iss may be the same, however the underlying OAuth library may be a general one and always require a subject for security processing. It is possible that all libraries could have

[OAUTH-WG] Working Group Last Call on draft-ietf-oauth-jwt-bearer-07

2014-03-11 Thread Hannes Tschofenig
This is a Last Call for comments on http://tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-07 Please have your comments in no later than March 25th. It is a fairly short document - have a look at it. Thanks! Hannes & Derek signature.asc Description: OpenPGP digital signature _

Re: [OAUTH-WG] JSON Web Token (JWT) Profile

2014-03-11 Thread Antonio Sanso
Ok this is my use case: - I am John Doe and going to AS to register my app named app1 - I then either upload my public key or download a private key - at this point I am ready to build my assertion, the issuer claim is going to be app1 and should suffice. is the subject really needed in this us

Re: [OAUTH-WG] JSON Web Token (JWT) Profile

2014-03-11 Thread John Bradley
The missing scheme especially on JWT issued by google is something I understand they are working on but need to be careful about breaking existing code, so will possibly need new endpoints that are spec compliant. While in this google case the subject and the issuer happen to be the same they

Re: [OAUTH-WG] JSON Web Token (JWT) Profile

2014-03-11 Thread Hannes Tschofenig
Maintaining both information in the JWT is IMHO valuable since it gives you some information about the security properties. Needless to say that there is a substantial difference between a self-created JWT and a JWT from a third party the relying party has some confidence in. Why Google has an old

Re: [OAUTH-WG] JSON Web Token (JWT) Profile

2014-03-11 Thread Antonio Sanso
On Mar 11, 2014, at 3:53 PM, Hannes Tschofenig wrote: > Thanks for clarifying. > > I took a quick look at the Google API and it seems that in their use > case the client creates the JWT and consequently the subject and the > issue would actually be the same. I suspect that this is the reason w

Re: [OAUTH-WG] JSON Web Token (JWT) Profile

2014-03-11 Thread Hannes Tschofenig
Thanks for clarifying. I took a quick look at the Google API and it seems that in their use case the client creates the JWT and consequently the subject and the issue would actually be the same. I suspect that this is the reason why they omitted the subject. Could you explain why you would like t

Re: [OAUTH-WG] JSON Web Token (JWT) Profile

2014-03-11 Thread Antonio Sanso
hi Hannes, I am aware of the 2 documents, I might be wrong but http://tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-07 is also about Authorization Grant Processing (this is the part I do use in my implementation ) and not only Client Authentication Processing. Just my 0.02 $ but this seems t

Re: [OAUTH-WG] JSON Web Token (JWT) Profile

2014-03-11 Thread Hannes Tschofenig
Hi Manfred, Hi Antonio, Note that there are two documents that talk about the JWT and you guys might be looking at the wrong document. The main JWT document (see http://tools.ietf.org/html/draft-ietf-oauth-json-web-token-18) defines the subject claim as optional (see Section 4.1.2). The JWT bear

Re: [OAUTH-WG] JSON Web Token (JWT) Profile

2014-03-11 Thread Manfred Steyer
Hi Antonio, some time ago, I wrote about the same issue, but – unfortunately – didn’t get an answer. I place my thoughts about this at the end of this mail. Wishes, Manfred 8<--- Hi, the draft about the JWT Profile for OAuth 2.0 Client Authent

[OAUTH-WG] JSON Web Token (JWT) Profile

2014-03-11 Thread Antonio Sanso
hi *, JSON Web Token (JWT) Profile section 3 [0] explicitely says The JWT MUST contain a "sub" (subject) claim Now IMHO there are cases where having the sub is either not needed or redundant (since it might overlap with the issuer).\ As far as I can see “even Google” currently violates this s