[OAUTH-WG] aud in JWT Response for OAuth Token Introspection

2019-05-06 Thread Takahiko Kawasaki
Hello, I have a question regarding "JWT Response for OAuth Token Introspection" (draft-02). https://datatracker.ietf.org/doc/draft-ietf-oauth-jwt-introspection-response/?include_text=1 How to determine the value of "aud" in the response JWT? The example payload uses "https://protected.example.n

Re: [OAUTH-WG] draft-bertocci-oauth-access-token-jwt-00

2019-05-06 Thread Vittorio Bertocci
Let me try a different angle. An AS might generate sub claims and client_id identifiers using a different format/template. That means that there might be a client with client_id X that gets assigned a sub value Y, despite the client being the same, hence the check “sub==client_id” would fail. The l

Re: [OAUTH-WG] draft-bertocci-oauth-access-token-jwt-00

2019-05-06 Thread Hans Zandbelt
I'm suggesting that whichever "sub" and "client_id" the RS is receiving and however it was generated, it must mean something to it in alignment with the JWT/OAuth2/OIDC specs, otherwise it wouldn't be there at all; moreover, if the "sub" has the same value as "client_id" it must be a client talking

Re: [OAUTH-WG] draft-bertocci-oauth-access-token-jwt-00

2019-05-06 Thread Vittorio Bertocci
I am not following. We want this to be adopted, right? :) if we provide guidance that is sound but hard to implement we are going to fail. Considerations on whether the guidance requires a big effort to be applied are very much in scope for me. On Mon, May 6, 2019 at 14:54 Hans Zandbelt wrote: >

Re: [OAUTH-WG] draft-bertocci-oauth-access-token-jwt-00

2019-05-06 Thread Hans Zandbelt
the scope and way of generating sub/client_id is orthogonal to the semantics IMHO but if I'm the only one who thinks so, I'll rest my case Hans. On Mon, May 6, 2019 at 10:49 PM Vittorio Bertocci wrote: > See below, Hans- the sub doesn’t have to be global, it could be something > generated just

Re: [OAUTH-WG] draft-bertocci-oauth-access-token-jwt-00

2019-05-06 Thread Vittorio Bertocci
See below, Hans- the sub doesn’t have to be global, it could be something generated just for this particular RS. Or the AS might have its own recipe for generating sub values that different from the recipe used to generate client_ids. It would be much easier for an AS to emit a claim making this ex

Re: [OAUTH-WG] draft-bertocci-oauth-access-token-jwt-00

2019-05-06 Thread Hans Zandbelt
I may be missing something but I'd argue that by requiring and comparing both "sub" and "client_id" we achieve the same semantics without a new/additional claim (barring name spacing) Hans. On Mon, May 6, 2019 at 8:58 PM Karl McGuinness wrote: > Makes sense that we don’t want to further couple

Re: [OAUTH-WG] draft-bertocci-oauth-access-token-jwt-00

2019-05-06 Thread George Fletcher
In OpenID Connect, aggregated and distributed claims are ways for the OpenID Provider to reference claims issued by other entities (e.g. attribute provider or "Issuer" in the SSI sense). There is no requirement from a spec perspective that the /userinfo endpoint be co-located with the AS. It se

Re: [OAUTH-WG] XYZ and Transactional OAuth

2019-05-06 Thread Hans Zandbelt
OAuth 2.0 has its merits and will be around for the next 20 years or so; yet we're bumping into its limitations every day if not only for its complexity and the incomprehensibility for regular IT peeps that don't have the full historical background; support for transactions is obviously missing tod

Re: [OAUTH-WG] Recommendations for OAuth 2.0 with Browser-Based Apps

2019-05-06 Thread David Waite
On May 6, 2019, at 1:42 PM, Emond Papegaaij wrote: > > Hi all, > > For a browser-based app, we try to follow the recommendations set in draft- > ietf-oauth-browser-based-apps-01. This does allow us to create a secure OAuth > 2.0 browser-based application, but at the moment it comes at a cost wr

Re: [OAUTH-WG] draft-bertocci-oauth-access-token-jwt-00

2019-05-06 Thread Karl McGuinness
Makes sense that we don’t want to further couple AS and RS with grant types. I’m OK if we want a dedicated claim to establish whether the token is resource owner delegated vs client acting as itself. Subject Type is already a concept in RISC. Just making folks are aware of prior art. https:

Re: [OAUTH-WG] draft-bertocci-oauth-access-token-jwt-00

2019-05-06 Thread Vladimir Dzhuvinov
On 06/05/2019 22:26, Vittorio Bertocci wrote: > I am not following, Vladimir. What do you mean? Can you make some examples > to clarify? > The userinfo is always colocated with the AS, hence I would expect most > vendors not to use JWT for the ATs issued for userinfo access That's what I was curio

[OAUTH-WG] Recommendations for OAuth 2.0 with Browser-Based Apps

2019-05-06 Thread Emond Papegaaij
Hi all, For a browser-based app, we try to follow the recommendations set in draft- ietf-oauth-browser-based-apps-01. This does allow us to create a secure OAuth 2.0 browser-based application, but at the moment it comes at a cost wrt. user experience when the access token expires. Our current so

[OAUTH-WG] XYZ and Transactional OAuth

2019-05-06 Thread Justin Richer
In a vein related to Torsten’s recent thread and blog post, I’ve also been working on a proposal around Transactional OAuth. As many of you know, I wrote a blog post about the basic idea last fall, and now I’ve got something a bit more concrete online that people can poke around with. I’m callin

Re: [OAUTH-WG] Token Exchange status and Resource Indicators

2019-05-06 Thread Emond Papegaaij
On zondag 5 mei 2019 15:54:48 CEST you wrote: > On Fri, May 3, 2019 at 9:39 AM Emond Papegaaij > > To summarize, I have to following questions: > > - Is the 'OAuth 2.0 Token Exchange' specification still active? > > Yes with the caveats mentioned above. I will say that although there's a > lot o

Re: [OAUTH-WG] draft-bertocci-oauth-access-token-jwt-00

2019-05-06 Thread Vittorio Bertocci
Fair enough! What others think about it? Exploring the approach: would we want a bool claim or an enumeration, e.g. sub_type = [ resource_owner | client ] ? On Mon, May 6, 2019 at 12:35 PM Vladimir Dzhuvinov wrote: > Hi Vittorio, > > On 06/05/2019 22:22, Vittorio Bertocci wrote: > > It is true

Re: [OAUTH-WG] draft-bertocci-oauth-access-token-jwt-00

2019-05-06 Thread Vladimir Dzhuvinov
Hi Vittorio, On 06/05/2019 22:22, Vittorio Bertocci wrote: > It is true that the grant_type is a client side consideration. I did think > about the "client_id==sub" heuristic, but that's not always applicable: > many systems have their own rules for generating sub, and in case they want > to preve

Re: [OAUTH-WG] draft-bertocci-oauth-access-token-jwt-00

2019-05-06 Thread Vittorio Bertocci
It is true that the grant_type is a client side consideration. I did think about the "client_id==sub" heuristic, but that's not always applicable: many systems have their own rules for generating sub, and in case they want to prevent tracking across RSes the sub might be generated ad-hoc for that p

Re: [OAUTH-WG] draft-bertocci-oauth-access-token-jwt-00

2019-05-06 Thread Vittorio Bertocci
I am not following, Vladimir. What do you mean? Can you make some examples to clarify? The userinfo is always colocated with the AS, hence I would expect most vendors not to use JWT for the ATs issued for userinfo access On Mon, May 6, 2019 at 12:21 PM Vladimir Dzhuvinov wrote: > > https://tools

Re: [OAUTH-WG] draft-bertocci-oauth-access-token-jwt-00

2019-05-06 Thread Vladimir Dzhuvinov
https://tools.ietf.org/html/draft-ietf-oauth-access-token-jwt-00#section-2.2.2 In OpenID Connect the access token is consumed by the UserInfo endpoint. Were there any suggestions to also spec parameter(s) for the claims names (with optional locales) for release at the UserInfo endpoint? Vladimir

Re: [OAUTH-WG] draft-bertocci-oauth-access-token-jwt-00

2019-05-06 Thread Vladimir Dzhuvinov
On 06/05/2019 20:32, Vittorio Bertocci wrote: > To that end, *Karl MCGuinness suggested that we include > grant_type as a return claim, which the RS could use to the same effect*. I > find the proposal very clever, and the people at IIW thought so as well. > What you think? The grant type is not s

Re: [OAUTH-WG] JWT Response for OAuth Token Introspection implementations

2019-05-06 Thread Vladimir Dzhuvinov
Hi Rifaat, On 02/05/2019 23:46, Rifaat Shekh-Yusef wrote: > All, > > As part of the shepherd write-up for the *JWT Response for OAuth Token > Introspection* draft, we are looking for information about implementations > for this document: > https://datatracker.ietf.org/doc/draft-ietf-oauth-jwt-intr

Re: [OAUTH-WG] Link relations for authenticating

2019-05-06 Thread Neil Madden
I don’t know the relative merits of Link headers vs .well-known, but there is at least one other draft standard I know of that is going down the .well-known route for this kind of thing (password changes in this case): https://github.com/WICG/change-password-url/blob/gh-pages/explainer.md — Nei

Re: [OAUTH-WG] Link relations for authenticating

2019-05-06 Thread Evert Pot
Hi Benjamin, Thanks for the hint. Will give that a shot! Evert On 2019-05-06 1:38 p.m., Benjamin Kaduk wrote: > Hi Evert, > > On Thu, May 02, 2019 at 11:41:50PM -0400, Evert Pot wrote: >> Hi everyone! >> >> I've been running into a number of situations where it would have been >> beneficial to h

Re: [OAUTH-WG] Link relations for authenticating

2019-05-06 Thread Benjamin Kaduk
Hi Evert, On Thu, May 02, 2019 at 11:41:50PM -0400, Evert Pot wrote: > Hi everyone! > > I've been running into a number of situations where it would have been > beneficial to have a few protocol/media-type agnositic link relation > types for user authentication purposes. > > https://tools.ietf.o

Re: [OAUTH-WG] draft-bertocci-oauth-access-token-jwt-00

2019-05-06 Thread Vittorio Bertocci
Hi all, thanks for your patience during this month long hiatus, and thanks for the comments. Last week at IIW I had the opportunity to discuss this with many of the people on the list. Here's a summary of where the discussion landaed on the subject of the sub (pun intended). - It seems that RFC 75