[OAUTH-WG] OAuth and OpenID Connect enterprise profiles

2020-03-02 Thread Peck, Michael A
Hello all, For anyone who may be interested: MITRE, in support of the U.S. Government, has developed tailored OAuth and OpenID Connect profiles for use in enterprise environments. We have leveraged previous standards efforts (e.g. work in the IETF and in the OpenID Foundation) and have detailed

Re: [OAUTH-WG] Benjamin Kaduk's Discuss on draft-ietf-oauth-jwt-introspection-response-08: (with DISCUSS and COMMENT)

2020-03-02 Thread Takahiko Kawasaki
Do you mean different requests should have the same jti value for better security? It is not good that RFC 7662 has chosen "jti" as a property to hold the identifier for an access/refresh token although the format of introspection responses is not JWT but just JSON. If the name were, for instance,

Re: [OAUTH-WG] Conflicting definitions in JWT Response for OAuth Token Introspection

2020-03-02 Thread Torsten Lodderstedt
> On 2. Mar 2020, at 18:27, Takahiko Kawasaki wrote: > > From RFC 7662, Section 2.1 > To prevent token scanning attacks, the endpoint MUST also require some form > of authorization to access this endpoint, such as client authentication as > described in OAuth 2.0 [RFC6749] or a separate OAuth

Re: [OAUTH-WG] Conflicting definitions in JWT Response for OAuth Token Introspection

2020-03-02 Thread Takahiko Kawasaki
>From RFC 7662, Section 2.1 *To prevent token scanning attacks, the endpoint MUST also require some form of authorization to access this endpoint, such as client authentication as described in OAuth 2.0 [RFC6749] or a separate OAuth 2.0 access token such as the bearer token described in OAuth 2.0

Re: [OAUTH-WG] Benjamin Kaduk's Discuss on draft-ietf-oauth-jwt-introspection-response-08: (with DISCUSS and COMMENT)

2020-03-02 Thread Torsten Lodderstedt
> Am 02.03.2020 um 17:52 schrieb Takahiko Kawasaki : > > The requirement for "jti" described > in draft-ietf-oauth-jwt-introspection-response-08 is problematic. I think having different jti values for different requests is a security risk. smime.p7s Description: S/MIME cryptographic signature

Re: [OAUTH-WG] Benjamin Kaduk's Discuss on draft-ietf-oauth-jwt-introspection-response-08: (with DISCUSS and COMMENT)

2020-03-02 Thread Takahiko Kawasaki
Hi Torsten, draft-ietf-oauth-jwt-introspection-response-08 says as follows. *The "jti" claim is a unique identifier for the access token passed in the introspection request. This identifier MUST be stable for all introspection calls for a given access token.* This requirement expects that the

Re: [OAUTH-WG] Conflicting definitions in JWT Response for OAuth Token Introspection

2020-03-02 Thread Torsten Lodderstedt
Hi Taka, I see, the audience is multi value. In my impression both specs assume a single value audience. But I think we can handle this as follows: Since the caller of the introspection respect is a single RS, the AS first needs to map & check the resources associated with the underlying acce

Re: [OAUTH-WG] Conflicting definitions in JWT Response for OAuth Token Introspection

2020-03-02 Thread Takahiko Kawasaki
Hi Torsten, For example, if an authorization request includes two "resource" request parameters like below, resource=https://host1.example.com/resource1 resource=https://host2.example.com/resource2 RFC 8707 expects that the value of "aud" in an introspection response look like the following. "a

Re: [OAUTH-WG] Benjamin Kaduk's Discuss on draft-ietf-oauth-jwt-introspection-response-08: (with DISCUSS and COMMENT)

2020-03-02 Thread Torsten Lodderstedt
Hi Ben, >> >>> >>> I don't think the new semantics for "jti" in the introspection response >>> are compatible with the RFC 7519 definition. Specifically, we say that >>> "jti" will be tied to the input access token, but 7519 says that "jti" >>> has to change when the contents of the JWT change

Re: [OAUTH-WG] Conflicting definitions in JWT Response for OAuth Token Introspection

2020-03-02 Thread Torsten Lodderstedt
Hi Filip, Hi Taka, iat: We might add a structure (e.g. "underlying_access_token") to be able to convey “iat" for both the underlying access token as well as the JWT-formatted introspection response to the RS. I’m not really convinced we need to add this additional complexity since, in my experi

Re: [OAUTH-WG] Conflicting definitions in JWT Response for OAuth Token Introspection

2020-03-02 Thread Torsten Lodderstedt
Hi Taka, > On 1. Mar 2020, at 08:10, Takahiko Kawasaki wrote: > > Hello, > > I'm wondering if the following conflicts in "JWT Response for OAuth Token > Introspection" (draft 8) have already been pointed out. > > RFC 8707 (Resource Indicators for OAuth 2.0) requires that 'aud' in an > intro

Re: [OAUTH-WG] OAuth 2.1: dropping password grant

2020-03-02 Thread Dick Hardt
That sounds like a good addition to a separate document Phil. ᐧ On Sun, Mar 1, 2020 at 8:33 AM Phillip Hunt wrote: > Why not just require service accounts to use mutually acceptable http > method of authentication? Eg instead id/password, service acnt client > could use mtls auth or http basic

Re: [OAUTH-WG] Benjamin Kaduk's Discuss on draft-ietf-oauth-jwt-introspection-response-08

2020-03-02 Thread Jaap Francke
Hi Ben, I saw your question and by coincidence i had just been doing some reading in RFC7662. Maybe this helps. Could you give me a pointer where in the text it says that if "active" is false, no other claims are present? ("active" only appears three times, but none of them seem to say this.)