[OAUTH-WG] Re: Call for adoption - RFC7523bis

2025-02-11 Thread Dominick Baier
I support adoption. On 7. February 2025 at 20:51:43, Michael Jones (michael_b_jo...@hotmail.com) wrote: I obviously am in favor of adoption, as I believe we should do the work to close the identified security vulnerabilities in a timely manner. Thanks to all who worked on this doc with me prio

[OAUTH-WG] Philippe de Ryck on the insecurities of OAuth in the browser

2023-03-31 Thread Dominick Baier
Good examples of bypassing some of the recommendations from the web BCP and OAuth 2.1 https://youtu.be/OpFN6gmct8c ___ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth

[OAUTH-WG] Small bug in DPoP 12

2023-01-08 Thread Dominick Baier
Hi, While implementing I found Section 4.2 says htu: The *HTTP* target URI (Section 7.1 of [RFC9110]), without query and fragment parts, of the request to which the JWT is attached. While Section 4.3 says the htu claim matches the *HTTPS* URI value for the HTTP request in which the JWT was re

[OAUTH-WG] WebApp BCP thoughts

2022-09-20 Thread Dominick Baier
Hi Aaron et al, I re-read the latest version of the web app BCP. For me it has become increasingly hard to follow, and so I’m concerned that it’s even harder for the target audience this document is intended for. It seems that over time more and more content got accumulated which IMO jumps straig

[OAUTH-WG] Web apps BCP feedback

2021-09-25 Thread Dominick Baier
s not prevent CSRF attacks from within a site boundary. Scenarios could be a compromised sub-domain, like sub-domain takeover or just some vulnerable application co-located on the same site. thanks ——— Dominick Baier ___ OAuth mailing list OAuth@ietf.org

Re: [OAUTH-WG] Implementations for OAuth 2.0 Authorization Server Issuer Identification

2021-09-05 Thread Dominick Baier
We have implemented it https://duendesoftware.com/products/identityserver ——— Dominick Baier On 4. September 2021 at 16:26:21, Rifaat Shekh-Yusef ( rifaat.s.i...@gmail.com) wrote: All, As part of the shepherd write-up for the OAuth 2.0 Authorization Server Issuer Identification document, we

Re: [OAUTH-WG] Token Mediating and session Information Backend For Frontend (TMI BFF)

2021-02-17 Thread Dominick Baier
No. But they are CSRF protected (either SameSite or anti-forgery) and HttpOnly. ——— Dominick Baier On 17. February 2021 at 21:08:37, Neil Madden (neil.mad...@forgerock.com) wrote: Do you eliminate the cookies too? On 17 Feb 2021, at 19:50, Dominick Baier wrote:  Well. Maybe it is at least

Re: [OAUTH-WG] Token Mediating and session Information Backend For Frontend (TMI BFF)

2021-02-17 Thread Dominick Baier
Well. Maybe it is at least worth while then to at least mention that you could also take a slightly different approach and eliminate all tokens in the browser - with the respective trade offs. ——— Dominick Baier On 17. February 2021 at 20:46:42, Warren Parad (wpa...@rhosys.ch) wrote: While

Re: [OAUTH-WG] Token Mediating and session Information Backend For Frontend (TMI BFF)

2021-02-17 Thread Dominick Baier
this doesn’t solve the XSS problem” - this is absolutely correct. But when there are no tokens in the browser - you can simply eliminate that part of the threat model ;) ——— Dominick Baier On 17. February 2021 at 18:30:23, Vittorio Bertocci ( vittorio.berto...@auth0.com) wrote: Thanks Dominick

Re: [OAUTH-WG] Token Mediating and session Information Backend For Frontend (TMI BFF)

2021-02-17 Thread Dominick Baier
implement a more and more common security guideline these days - namely: “no JS-accessible tokens in the browser” - but this document doesn’t cover this. cheers ——— Dominick Baier On 16. February 2021 at 22:01:37, Brian Campbell ( bcampbell=40pingidentity@dmarc.ietf.org) wrote: On Mon, Feb 15

Re: [OAUTH-WG] Token Mediating and session Information Backend For Frontend (TMI BFF)

2021-02-14 Thread Dominick Baier
it is in-memory or local storage) - but this exactly seems to happen in D. Thanks ——— Dominick Baier On 12. February 2021 at 21:46:20, Vittorio Bertocci ( vittorio.bertocci=40auth0@dmarc.ietf.org) wrote: Dear all, Brian and yours truly are proposing a new specification that shows how the user

Re: [OAUTH-WG] Call for Adoption - AS Issuer Identifier in Authorization Response

2020-12-14 Thread Dominick Baier
+1 ——— Dominick Baier On 8. December 2020 at 13:51:04, Rifaat Shekh-Yusef (rifaat.s.i...@gmail.com) wrote: All, This is a call for adoption for the following AS Issuer Identifier in Authorization Response as a WG document: https://datatracker.ietf.org/doc/draft-meyerzuselhausen-oauth-iss-auth

Re: [OAUTH-WG] Implementation Status of "JWT Secured Authorization Request (JAR)"

2020-09-21 Thread Dominick Baier
Also IdentityServer implements JAR https://github.com/IdentityServer ——— Dominick Baier On 21. September 2020 at 21:22:17, Hannes Tschofenig ( hannes.tschofe...@arm.com) wrote: Hi all Because some procedural issues I have to update the shepherd writeup of the JAR document and I wanted to

Re: [OAUTH-WG] Shepherd writeup for the JSON Web Token (JWT) Profile for OAuth 2.0 Access Tokens -- Information about Implementations

2020-09-18 Thread Dominick Baier
IdentityServer is. https://github.com/IdentityServer Cheers ——— Dominick Baier On 17. September 2020 at 14:56:01, Hannes Tschofenig ( hannes.tschofe...@arm.com) wrote: Hi Vittorio, Hi all, I am working on the shepherd writeup for and you can find the latest version here: https://github.com

Re: [OAUTH-WG] swapping a jwsreq/JAR JWT for a client authentication JWT

2020-07-22 Thread Dominick Baier
Good point. Thanks, Brian. We should retrofit typs everywhere..in hindsight. ——— Dominick Baier On 22. July 2020 at 23:55:20, Brian Campbell (bcampb...@pingidentity.com) wrote: Because it wouldn't actually prevent it in this case due to JWT assertion client authentication (

Re: [OAUTH-WG] swapping a jwsreq/JAR JWT for a client authentication JWT

2020-07-22 Thread Dominick Baier
Even more. Jwsreq should have it. But the authors decided against it. ——— Dominick Baier On 23. July 2020 at 07:38:04, Dominick Baier (dba...@leastprivilege.com) wrote: Good point. Thanks, Brian. We should retrofit typs everywhere..in hindsight. ——— Dominick Baier On 22. July 2020 at 23:55

Re: [OAUTH-WG] swapping a jwsreq/JAR JWT for a client authentication JWT

2020-07-22 Thread Dominick Baier
Why not use a typ header as suggested by the JWT BCP? ——— Dominick Baier On 22. July 2020 at 17:37:41, Brian Campbell ( bcampbell=40pingidentity@dmarc.ietf.org) wrote: The TL;DR here is a somewhat tentative suggestion that a brief security consideration be added to https

Re: [OAUTH-WG] Call for adoption - OAuth 2.1 document

2020-07-15 Thread Dominick Baier
I support adoption ——— Dominick Baier On 16. July 2020 at 01:54:08, William Denniss ( wdenniss=40google@dmarc.ietf.org) wrote: I support adoption. On Wed, Jul 15, 2020 at 4:37 PM wrote: > +1 > > > > *From:* OAuth *On Behalf Of *Dick Hardt > *Sent:* Wednesday, July

Re: [OAUTH-WG] OAuth services/libraries wanted for security evaluation...

2020-06-25 Thread Dominick Baier
Hey, Have a look at https://github.com/IdentityServer/IdentityServer4 <https://github.com/IdentityServer/IdentityServer4> I <https://github.com/IdentityServer/IdentityServer4>t’s an OIDC certified ..NET implementation Thanks! ——— Dominick Baier On 25. June 2020 at 11:27:34, Thib

[OAUTH-WG] To the authors of jwsreq/JAR

2020-05-31 Thread Dominick Baier
. Is it a technical issue? thanks ——— Dominick Baier ___ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth

[OAUTH-WG] JAR: JWT typ

2020-05-19 Thread Dominick Baier
Hi, This has been brought up before - but no response. Either I can’t find it - or it is missing. But is the setting the JWT typ explicitly mentioned somewhere? I think it should to prevent cross JWT confusion. Thanks ——— Dominick Baier ___ OAuth

Re: [OAUTH-WG] draft-ietf-oauth-jwsreq-21

2020-05-11 Thread Dominick Baier
Would be also interested in the official language here. Would an implementation need to introduce an optional “strict JAR validation mode” - which complies with JAR, but breaks OIDC compatibility? ——— Dominick Baier On 7. May 2020 at 15:32:33, Brock Allen (brockal...@gmail.com) wrote

Re: [OAUTH-WG] OAuth 2.1 - require PKCE?

2020-05-11 Thread Dominick Baier
In IdentityServer, the PKCE requirement is per client. We started with a default of false - and now switched to true. FWIW ——— Dominick Baier On 10. May 2020 at 22:22:35, Mike Jones ( michael.jones=40microsoft@dmarc.ietf.org) wrote: Exactly! I believe that this also the same point that

Re: [OAUTH-WG] JWT profile and IdentityServer

2020-05-04 Thread Dominick Baier
right because all of our customers use both in conjunction. IOW - you move our cheese ;) But don’t worry about it. ——— Dominick Baier On 4. May 2020 at 10:55:41, Dominick Baier (dba...@leastprivilege.com) wrote: Hey, No problem - this email was not intended to make you change the document. Just

Re: [OAUTH-WG] JWT profile and IdentityServer

2020-05-04 Thread Dominick Baier
same conclusion. And yes I know - you cannot please everybody ;) Still some comment inline... thanks ——— Dominick Baier On 4. May 2020 at 10:20:16, Vittorio Bertocci (vittorio.berto...@auth0.com) wrote: Thank you Dominick, very useful! I’d like to understand more about the security risk

[OAUTH-WG] JWT profile and IdentityServer

2020-05-04 Thread Dominick Baier
-writing and I guess this applies to any reasonably complex system that is already out there. So I am still not sold that the “dual purpose” claims are the best choice. YMMV. IOW - we will not adopt the sub/client_id semantics as proposed by the document. My 2c / cheers ——— Dominick Baier

Re: [OAUTH-WG] Second WGLC on "JSON Web Token (JWT) Profile for OAuth 2.0 Access Tokens"

2020-04-21 Thread Dominick Baier
Oh and while we are at it - could you also fix the typo in my name? Thanks ;) ——— Dominick Baier On 21. April 2020 at 09:43:49, Vittorio Bertocci ( vittorio.berto...@auth0.com) wrote: This is a great point. In my head I just considered the OIDC semantic and thought only of highlighting the app

Re: [OAUTH-WG] Second WGLC on "JSON Web Token (JWT) Profile for OAuth 2.0 Access Tokens"

2020-04-20 Thread Dominick Baier
... ——— Dominick Baier On 20. April 2020 at 09:48:51, vittorio.berto...@auth0.com ( vittorio.berto...@auth0.com) wrote: Thanks Dominick for your comments! Inline *>** All other OAuth specs make a very clear distinction between users and client.* There’s a nuance worth highlighting here:

Re: [OAUTH-WG] Second WGLC on "JSON Web Token (JWT) Profile for OAuth 2.0 Access Tokens"

2020-04-20 Thread Dominick Baier
Hence my question What should be the recommended semantics - “informative” - “or don’t accept before a certain time stamp” ? ——— Dominick Baier On 20. April 2020 at 09:05:53, Philippe De Ryck ( phili...@pragmaticwebsecurity.com) wrote: In theory, you can issue a token that only becomes valid

Re: [OAUTH-WG] Second WGLC on "JSON Web Token (JWT) Profile for OAuth 2.0 Access Tokens"

2020-04-19 Thread Dominick Baier
Just a quick data point - The Microsoft .NET JWT implementation checks for exp and nbf. Not iat. I guess my real question is - what’s the difference between the two practically speaking - and shouldn’t be the more common (aka supported by most libraries) be used? ——— Dominick Baier On 20

Re: [OAUTH-WG] Second WGLC on "JSON Web Token (JWT) Profile for OAuth 2.0 Access Tokens"

2020-04-16 Thread Dominick Baier
Tbh - the most valuable part of the doc to me is the definition of the “at+jwt” typ. For the rest I’d rather like to see just some standard claims and IF they are used, which semantics they have. cheers ——— Dominick Baier On 15. April 2020 at 20:59:31, Rifaat Shekh-Yusef (rifaat.i...@gmail.com) wrot

[OAUTH-WG] Full Third-Party Cookie Blocking

2020-03-25 Thread Dominick Baier
style architecture instead. Cheers ——— Dominick Baier ___ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth

Re: [OAUTH-WG] Call for Adoption: DPoP

2020-03-17 Thread Dominick Baier
+1 ——— Dominick Baier On 17. March 2020 at 14:18:37, Torsten Lodderstedt ( torsten=40lodderstedt@dmarc.ietf.org) wrote: +1 > On 17. Mar 2020, at 13:40, Vladimir Dzhuvinov wrote: > > +1 for DPoP > > On 17/03/2020 14:25, Rob Otto wrote: >> I support adoption >&g

Re: [OAUTH-WG] First Draft of OAuth 2.1

2020-03-13 Thread Dominick Baier
the wording needs to be clearer. ——— Dominick Baier On 12. March 2020 at 23:15:19, Vittorio Bertocci ( vittorio=40auth0@dmarc.ietf.org) wrote: Rotation can be used to detect leakage, right? Client credentials offer more guarantees, but unless you are using private JWTs with a non exportable

Re: [OAUTH-WG] OAuth 2.1: dropping password grant

2020-03-01 Thread Dominick Baier
s possible. ——— Dominick Baier On 28. February 2020 at 22:04:10, Dick Hardt (dick.ha...@gmail.com) wrote: It looks like there is consensus to remove ROPC for a user -- but that the password grant is not a bad practice for service accounts. That leads to providing clarity on service accounts. 1) add servi

Re: [OAUTH-WG] OAuth 2.1 - drop implicit flow?

2020-02-18 Thread Dominick Baier
No - please get rid of it. ——— Dominick Baier On 18. February 2020 at 21:32:31, Dick Hardt (dick.ha...@gmail.com) wrote: Hey List (I'm using the OAuth 2.1 name as a placeholder for the doc that Aaron, Torsten, and I are working on) Given the points Aaron brought up in

Re: [OAUTH-WG] [EXTERNAL] Re: JWT Secured Authorization Request (JAR) vs OIDC request object

2020-01-16 Thread Dominick Baier
Agreed - that’s why we disabled request_uri by default and added extensibility points to implement validation. I thought it is odd that this was not mentioned in the typical “security considerations” in the OIDC spec.. ——— Dominick Baier On 16. January 2020 at 08:07:44, Neil Madden (neil.mad

Re: [OAUTH-WG] Meeting Minutes

2019-12-16 Thread Dominick Baier
I’d support adoption of both PAR and RAR. ——— Dominick Baier On 16. December 2019 at 23:02:58, Rob Otto ( robotto=40pingidentity@dmarc.ietf.org) wrote: I’d support adoption of both PAR and RAR. On Mon, 16 Dec 2019 at 21:57, Richard Backman, Annabelle wrote: > +1 for a call for adopt

Re: [OAUTH-WG] JWT Secured Authorization Request (JAR) vs OIDC request object

2019-12-11 Thread Dominick Baier
“chosen code challenge attack” (at least that’s how I understood it) - again enforcing that makes the AS logic more complicated d) it’s a clear statement cheers ——— Dominick Baier On 11. December 2019 at 03:29:14, Nat Sakimura (sakim...@gmail.com) wrote: Correct. The WG supported the precedence

Re: [OAUTH-WG] Location and dates for next OAuth Security Workshop

2019-07-25 Thread Dominick Baier
August will conflict with holiday time for most Europeans… Just been to Trondheim last week - it was lovely weather. ——— Dominick On 25. July 2019 at 22:14:28, Mike Jones ( michael.jones=40microsoft@dmarc.ietf.org) wrote: I'm not aware of any conflicts for any of the three sets of dates. -

Re: [OAUTH-WG] Feedback on OAuth for browser-based Apps

2019-07-24 Thread Dominick Baier
: On Mon, Jul 22, 2019 at 2:14 AM Dominick Baier wrote: > I think you are mixing authentication and API access here. Depending on application scenario it makes a lot of sense to use OIDC - but rely on the resulting session to control API access. > Unless you want to dive into the details h

Re: [OAUTH-WG] Feedback on OAuth for browser-based Apps

2019-07-23 Thread Dominick Baier
, Dominick Baier wrote: Forgot one more thing In 7.1 Browser-based apps MUST use the OAuth 2.0 "state" parameter to protect themselves against Cross-Site Request Forgery and authorization code swap attacks and MUST use a unique value for each authorization request, and MUST

Re: [OAUTH-WG] Feedback on OAuth for browser-based Apps

2019-07-23 Thread Dominick Baier
ate in the authorization response matches the original state the app created. Isn’t state optional when PKCE is used? thanks ——— Dominick On 22. July 2019 at 08:14:33, Dominick Baier (dba...@leastprivilege.com) wrote: Hey, Just read the spec - good to see the progress. Some feedback: I am yet

[OAUTH-WG] Feedback on OAuth for browser-based Apps

2019-07-21 Thread Dominick Baier
Hey, Just read the spec - good to see the progress. Some feedback: I am yet undecided if I like the categorisation of the “Application Architecture Patterns”. I definitely want to distinguish between applications only accessing same-site back-end services and “others”. Not sure if “dynamic applic

Re: [OAUTH-WG] Call for adoption: JWT Usage in OAuth2 Access Tokens

2019-04-08 Thread Dominick Baier
+1 ——— Dominick On 8. April 2019 at 20:21:21, William Denniss ( wdenniss=40google@dmarc.ietf.org) wrote: I support adoption of this draft as a working group document. On Mon, Apr 8, 2019 at 11:11 AM George Fletcher wrote: > +1 for me as well :) > > On 4/8/19 1:38 PM, Hans Zandbelt wrote:

Re: [OAUTH-WG] draft-bertocci-oauth-access-token-jwt-00

2019-04-03 Thread Dominick Baier
;> >>- Despite OAuth2 not requiring any specific format for ATs, through >>the years I have come across multiple proprietary solution using JWT for >>their access token. The intent and scenarios addressed by those solutions >>are mostly the same across vend

Re: [OAUTH-WG] draft-bertocci-oauth-access-token-jwt-00

2019-03-25 Thread Dominick Baier
.. but > nevertheless I agree with the potential confusion and thus security > problems arising from that (though one may argue the semantics are the > same). > > Hans. > > On Mon, Mar 25, 2019 at 3:39 PM Dominick Baier > wrote: > >> Yes I know - and I think i

Re: [OAUTH-WG] draft-bertocci-oauth-access-token-jwt-00

2019-03-25 Thread Dominick Baier
/acting only in terms of users Hans. On Mon, Mar 25, 2019 at 2:41 PM Dominick Baier wrote: > IMHO the sub claim should always refer to the user - and nothing else. > > OIDC says: > > "Subject - Identifier for the End-User at the Issuer." > > client_id should be used

Re: [OAUTH-WG] draft-bertocci-oauth-access-token-jwt-00

2019-03-25 Thread Dominick Baier
in the implementations are different enough to prevent developers from reusing code and skills when moving from product to product. - I asked several individuals from key products and services to share with me concrete examples of their JWT access tokens (THANK YOU Dominick Bai

Re: [OAUTH-WG] popular apps that use appauth?

2019-02-25 Thread Dominick Baier
A good example of a desktop application using browser authentication is Github for Desktop. They use custom URLs/callbacks for both OSX and Windows. Works very well. ——— Dominick On 25. February 2019 at 11:48:20, Vittorio Bertocci ( vittorio=40auth0@dmarc.ietf.org) wrote: Ahh, as John knows

Re: [OAUTH-WG] popular apps that use appauth?

2019-02-24 Thread Dominick Baier
The Uber app uses it for their OAuth flow to PayPal e.g. ——— Dominick On 23. February 2019 at 18:05:33, Brock Allen (brockal...@gmail.com) wrote: I often have push back from customers (mainly the marketing department/UX folks) when suggesting AppAuth for native/mobile apps (IOW RFC8252). They as

Re: [OAUTH-WG] MTLS endpoints & discovery (was something else)

2019-02-21 Thread Dominick Baier
+1 ——— Dominick On 21. February 2019 at 09:35:35, Dave Tonge (dave.to...@momentumft.co.uk) wrote: +1 for mtls_endpoints optional metadata Dave Tonge On Thu, 21 Feb 2019 at 00:09, John Bradley wrote: > I agree. > > If someone really wants separate meta-data nothing stops them from having >

Re: [OAUTH-WG] [UNVERIFIED SENDER] Re: MTLS token endoint & discovery

2019-02-14 Thread Dominick Baier
complex code to work with. But that’s just my experience as, you know, an actual developer. Let’s keep the assumptions and snide remarks about others’ backgrounds off the list, please. -- Annabelle Richard Backman AWS Identity *From: *Dominick Baier *Date: *Wednesday, February 13, 2019 at

Re: [OAUTH-WG] MTLS token endoint & discovery

2019-02-13 Thread Dominick Baier
mTLS-optional scenario to the > mTLS-only scenario. This sidesteps the challenges of aligning the > “either/or” semantics of mTLS-optional with some of the rigid parameter > definitions in RFC8414 (see: token_endpoint, > token_endpoint_auth_methods_supported). > > > >

Re: [OAUTH-WG] MTLS token endoint & discovery

2019-02-11 Thread Dominick Baier
'm struggling, however, to adequately gauge whether or not there's sufficient consensus to go ahead with the update. There's been some support for it voiced. As well as talk of other approaches that could be alternatives or additional measures. And also some vocal oppositi

[OAUTH-WG] MTLS token endoint & discovery

2019-02-09 Thread Dominick Baier
We are currently implementing MTLS in IdentityServer. Our approach will be that we’ll offer a separate token endpoint that supports client certs. Are you planning on adding an official endpoint name for discovery? Right now we are using “mtls_token_endpoint”.. Thanks ——— Dominick On 7. February

Re: [OAUTH-WG] OAuth Security Topics -- Recommend authorization code instead of implicit

2018-12-03 Thread Dominick Baier
I agree with Vittorio - While we all agree that implicit is outdated and we can do better (and it is indeed good that this discussion has finally started for real) - the communication around the (preliminary) results of the BCP was unfortunate and not very responsible - quoting: “Simply put, the

Re: [OAUTH-WG] Google's use of Implicit Grant Flow

2017-02-17 Thread Dominick Baier
said before - at the end of the day the access token will end up in the browser. Regardless how secure you made the authentication request in the first place. --- Dominick Baier On 17 February 2017 at 19:06:23, Jim Manico (j...@manicode.com) wrote: > Given a solid client library for JS, I th

Re: [OAUTH-WG] Google's use of Implicit Grant Flow

2017-02-17 Thread Dominick Baier
(e.g. not using CSP) will always write bad code that might lead to leaking a token. --- Dominick Baier On 17 February 2017 at 18:43:25, Adam Lewis ( adam.le...@motorolasolutions.com) wrote: +1000 We are currently going through internal turmoil over the usage of implicit grant for ua-based apps

Re: [OAUTH-WG] Mix-Up and CnP/ Code injection

2016-05-01 Thread Dominick Baier
always use them together - or put differently - I recommend against using OAuth on its own without OIDC (besides client_creds/extension grants scenarios of course). —  cheers Dominick Baier On 2 May 2016 at 04:08:25, William Denniss (wdenn...@google.com) wrote: I'm inclined to think that

Re: [OAUTH-WG] OAuth 2.0 for Native Apps: open source client libraries for Android and iOS now available

2016-03-31 Thread Dominick Baier
. —  cheers Dominick Baier On 1 April 2016 at 00:46:03, Eduardo Gueiros (eguei...@jive.com) wrote: Any plan to bring the libraries to more “young” languages like Swift in iOS and Kotlin in Android? > On Feb 26, 2016, at 12:30 PM, William Denniss wr

Re: [OAUTH-WG] HTTP signing spec and nonce

2016-02-26 Thread Dominick Baier
The nonce would allow to build a replay cache, the timestamp to trim that cache and reject messages that are too old. Similar protocols have a nonce for the above reasons (ws-sec msg security, hawk)... —  cheers Dominick Baier On 27 February 2016 at 03:48:00, Justin Richer (jric...@mit.edu

Re: [OAUTH-WG] Advertise PKCE support in OAuth 2.0 Discovery (draft-jones-oauth-discovery-00)

2016-02-02 Thread Dominick Baier
I also added a support for it to our .NET client library. blog post here:  http://leastprivilege.com/2016/02/02/pkce-support-in-identityserver-and-identitymodel/ --  Dominick Baier On 2 February 2016 at 09:25:43, Dominick Baier (dba...@leastprivilege.com) wrote: IdentityServer 2.4 has PKCE

Re: [OAUTH-WG] Advertise PKCE support in OAuth 2.0 Discovery (draft-jones-oauth-discovery-00)

2016-02-02 Thread Dominick Baier
IdentityServer 2.4 has PKCE support now as well https://github.com/IdentityServer/IdentityServer3/releases/tag/2.4.0 --  Dominick Baier On 1 February 2016 at 22:12:54, Mike Jones (michael.jo...@microsoft.com) wrote: Congratulations on your deployment!   From: William Denniss [mailto:wdenn

Re: [OAUTH-WG] PKCE & Hybrid Flow

2016-01-26 Thread Dominick Baier
Thanks! we are almost done implementing PKCE in identity server. And yea - a comment that PKCE applies to whenever a code is involved would be probably helpful for other implementers. Even if that makes total sense, it is not obvious. —  cheers Dominick Baier On 27 January 2016 at 03:11:28

[OAUTH-WG] PKCE & Hybrid Flow

2016-01-26 Thread Dominick Baier
Hi,  PKCE only mentions OAuth 2.0 code flow - but wouldn’t that also apply to OIDC hybrid flow e.g. code id_token? —  cheers Dominick Baier ___ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth

Re: [OAUTH-WG] Token introspection for public clients?

2015-07-19 Thread Dominick Baier
I totally agree with that - and that’s how we gonna implement it in identity server. We are planning to introduce something called a “scope secret” - it’s like a client secret but for resources. —  cheers Dominick Baier On 20 Jul 2015 at 07:01:48, Justin Richer (jric...@mit.edu) wrote