Hi George,

#2 doesn't seem confidential, it's still a secret shared amongst
installations and anyone reverse engineering the apk, extracting the
secret, can form the client_secret_jwt client_assertion with it just fine.

Best,
Filip

On Wed, Nov 28, 2018 at 4:48 PM George Fletcher <gffletch=
40aol....@dmarc.ietf.org> wrote:

> In addition, a few additional patterns are enabled...
>
> 1. The native app can generate a public/private key pair and then use
> private_secret_jwt as the client credential validation method via the
> client credentials flow (defined in OpenID Connect).
>
> 2. Maybe more simply, if the native app is issued a shared secret, the app
> can use client_secret_jwt method for client authentication which ensures
> the shared secret never leaves the device. (Again defined in the OpenID
> Connect spec).
>
> 3. Once the native app instance has credentials, they can be used for
> additional securing of app API transactions in addition to just the
> OAuth2/OpenID Connect flows.
>
> Thanks,
> George
>
> On 11/27/18 3:28 PM, William Denniss wrote:
>
> If the secret is dynamically provisioned then you have a confidential
> client. Anyone reverse engineering their own installation of the native app
> would only extract their own client's credentials, as opposed to the shared
> secret of all installations. Having a confidential client means that
> requests to the token endpoint (code, refresh) are client authenticated, so
> PKCE wouldn't be needed.
>
> On Tue, Nov 27, 2018 at 1:44 AM, Christian Mainka <
> Christian.Mainka=40rub...@dmarc.ietf..org
> <Christian.Mainka=40rub...@dmarc.ietf.org>> wrote:
>
>> Hi,
>>
>> we just stumbled upon this [1] statement:
>> "Except when using a mechanism like Dynamic Client Registration
>>    [RFC7591] to provision per-instance secrets, native apps are
>>    classified as public clients ..."
>>
>> What does this mean for us? Native App + Dynamic Client Registration =
>> Confidential Client?
>> Which threats are covered if Dynamic Client Registration is used on
>> Native Apps?
>>
>> Best Regards,
>> Vladi/Christian
>>
>> [1]: https://tools.ietf.org/html/rfc8252#section-8.4
>>
>> --
>> Dr.-Ing. Christian Mainka
>> Horst Görtz Institute for IT-Security
>> Chair for Network and Data Security
>> Ruhr-University Bochum, Germany
>>
>> Universitätsstr. 150, ID 2/463
>> D-44801 Bochum, Germany
>>
>> Telefon: +49 (0) 234 / 32-26796
>> Fax: +49 (0) 234 / 32-14347
>> http://nds.rub.de/chair/people/cmainka/
>> @CheariX
>>
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
>
>
>
> _______________________________________________
> OAuth mailing listOAuth@ietf.orghttps://www.ietf.org/mailman/listinfo/oauth
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to