[OAUTH-WG] I-D Action: draft-ietf-oauth-incremental-authz-02.txt

2019-05-03 Thread internet-drafts
A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Web Authorization Protocol WG of the IETF. Title : OAuth 2.0 Incremental Authorization Author : William Denniss Filename: draft-ietf

Re: [OAUTH-WG] Transaction Authorization with OAuth

2019-05-03 Thread Takahiko Kawasaki
Dear Torsten, To the point. (^_^; It is "request object". Sorry. Best, Taka 2019年4月30日(火) 19:24 Torsten Lodderstedt : > Dear Taka, > > thanks for your feedback. > > How would this more generic mechanism differ from the JSON-based request > object? I personally would advocate to use both, struc

[OAUTH-WG] Token Exchange status and Resource Indicators

2019-05-03 Thread Emond Papegaaij
Hi all, For the application I work on, Topicus KeyHub, we are investigating 'OAuth 2.0 Token Exchange'. We want to use this protocol to exchange an access token for a SAML assertion for signing in to AWS (see below). However, I noticed that draft 16 has expired on April 22, 2019. Is this specif

Re: [OAUTH-WG] JWT Response for OAuth Token Introspection implementations

2019-05-03 Thread Filip Skokan
Hi Rifaat, node.js OSS oidc-provider implements the document in full behind an optional feature toggle - https://github.com/panva/node-oidc-provider/blob/master/docs/README.md#featuresjwtintrospection Best, Filip Odesláno z iPhonu 2. 5. 2019 v 22:46, Rifaat Shekh-Yusef : > All, > > As part

Re: [OAUTH-WG] MTLS and Native apps Best practices

2019-05-03 Thread Rob Otto
Are you hoping to use the key to authenticate the user, or the OAuth client? If it's the latter, then you don't need to use MTLS to the authorisation endpoint. If it's the former, I'd argue that you would certainly need to include your public key in an X509 cert and *somehow* make it available to t

Re: [OAUTH-WG] MTLS and Native apps Best practices

2019-05-03 Thread Phil Hunt
Yes. I was more wondering if the app can invoke the system embedded view using its own key pair to ensure protected authen. Eg. If the authorization endpoint is set to require mutual tls, can the system view use the app’s keys since the app is invoking it? Or, would there have to be a user x.5