So, you mean…

If a frontend client want to use
* sender-constrained code, bearer access token and sender-constrained refresh 
token, use DynReg.
* sender-constrained code, sender-constrained access token and 
sender-constrained refresh token, use DynReg + DPoP.
* bearer code, sender-constrained access token and sender-constrained refresh 
token, use DPoP only.
* bearer code, bearer access token and bearer refresh token, use neither.

is my understanding correct??

> 2020/06/07 20:49、Neil Madden <neil.mad...@forgerock.com>のメール:
> 
> There are multiple issues with using dynamic client registration for this. If 
> a user uninstalls and later reinstalls an app then they can end up with 
> multiple registrations for the same client, which makes it harder for them to 
> manage access. Additionally, client registrations typically don’t expire so 
> the AS doesn’t know when it can remove unused clients.
> 
> Besides, this ship already sailed with mTLS cert-bound refresh tokens. 
> 
> Neil
> 
>> On 7 Jun 2020, at 12:34, Nov Matake <mat...@gmail.com> wrote:
>> 
>> Confidential clients can also use DPoP.
>> 
>>> 2020/06/07 20:25、Torsten Lodderstedt <tors...@lodderstedt.net 
>>> <mailto:tors...@lodderstedt.net>>のメール:
>>> 
>>> If the client would register for every transaction.
>>> 
>>> And don’t forget, DPoP also supports sender constrained access to resource 
>>> servers, which dyn registration does not.
>>> 
>>>> Am 07.06.2020 um 13:04 schrieb Nov Matake <mat...@gmail.com 
>>>> <mailto:mat...@gmail.com>>:
>>>> 
>>>> Since each client instance has at least one key, those are same level of 
>>>> state management.
>>>> 
>>>>> 2020/06/07 16:24、Torsten Lodderstedt <tors...@lodderstedt.net 
>>>>> <mailto:tors...@lodderstedt.net>>のメール:
>>>>> 
>>>>> There are similarities in this particular use case but I would argue DPoP 
>>>>> is more light weight than dynamic client registration, less state 
>>>>> management in particular.
>>>>> 
>>>>>> Am 07.06.2020 um 05:41 schrieb Nov Matake <mat...@gmail.com 
>>>>>> <mailto:mat...@gmail.com>>:
>>>>>> 
>>>>>> DPoP-bound refresh token seems feature duplication with dynamic client 
>>>>>> registration.
>>>>>> 
>>>>>>> 2020/06/07 7:57、Francis Pouatcha <fpo=40adorsys...@dmarc.ietf.org 
>>>>>>> <mailto:fpo=40adorsys...@dmarc.ietf.org>>のメール:
>>>>>>> 
>>>>>>> 
>>>>>>> > Am 05.06.2020 um 22:17 schrieb George Fletcher <gffletch=40aol.com 
>>>>>>> > <http://40aol.com/>@dmarc..ietf.org <http://ietf.org/>>:
>>>>>>> > 
>>>>>>> > Secondly, I do think we need a way to allow for the refresh_token to 
>>>>>>> > be bound while leaving the access_tokens as bearer tokens. This adds 
>>>>>>> > useful security without impacting existing RS deployments.
>>>>>>> 
>>>>>>> +1 that’s a very useful 
>>>>>>> feature_______________________________________________
>>>>>>> AFAIK a refresh_token is always bound. What am I missing here?
>>>>>>> -- 
>>>>>>> Francis Pouatcha
>>>>>>> Co-Founder and Technical Lead at adorys
>>>>>>> https://adorsys-platform.de/solutions/ 
>>>>>>> <https://adorsys-platform.de/solutions/>_______________________________________________
>>>>>>> OAuth mailing list
>>>>>>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>>>>> https://www.ietf.org/mailman/listinfo/oauth 
>>>>>>> <https://www.ietf.org/mailman/listinfo/oauth>
>>>>>> 
>>>> 
>> 
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to