Yes I will! Would love to meet up to discuss.

On Mon, Jun 30, 2025 at 12:30 PM Lombardo, Jeff <jeff...@amazon.com> wrote:

> Hi Nick,
>
>
>
> Happy to contribute and take a look into your work to build a stronger
> case to present to this WG.
>
>
>
> Will you be in Madrid per chance?
>
>
>
> Regards,
>
>
>
> Jeff
>
>
>
> *Jean-François “Jeff” Lombardo* | Amazon Web Services
>
>
>
> Architecte Principal de Solutions, Spécialiste de Sécurité
> Principal Solution Architect, Security Specialist
> Montréal, Canada
>
> ( +1 514 778 5565 <(514)%20778-5565>
>
> *Commentaires à propos de notre échange? **Exprimez-vous **ici*
> <https://urldefense.com/v3/__https:/feedback.aws.amazon.com/?ea=jeffsec&fn=Jean*20Francois&ln=Lombardo__;JQ!!Pe07N362zA!0k9CkAV8Djpw_8EfIAKrbhP3TQrJr0oMnznlUgBJ3V3NoEk6hihx7dNHnQuejn6SSH2CP8Iow3G-tTzppHeg$>
> *.*
>
>
>
> *Thoughts on our interaction? Provide feedback **here*
> <https://urldefense.com/v3/__https:/feedback.aws.amazon.com/?ea=jeffsec&fn=Jean*20Francois&ln=Lombardo__;JQ!!Pe07N362zA!0k9CkAV8Djpw_8EfIAKrbhP3TQrJr0oMnznlUgBJ3V3NoEk6hihx7dNHnQuejn6SSH2CP8Iow3G-tTzppHeg$>
> *.*
>
>
>
> *From:* Nick Watson <nwat...@google.com>
> *Sent:* June 30, 2025 1:45 PM
> *To:* Lombardo, Jeff <jeffsec=40amazon....@dmarc.ietf.org>
> *Cc:* oauth@ietf.org; Alex Babeanu <alex.babe...@indykite.com>;
> yaron.zeh...@rbinternational.com; hannes.tschofe...@gmx.net; Lombardo,
> Jeff <jeff...@amazon.com>
> *Subject:* RE: [EXT] [OAUTH-WG] [OAUTH-WG/IETF-123] Introduction and
> socialization of Personal Draft - OAuth 2.0 step-up authorization challenge
> protocol
>
>
>
> *CAUTION*: This email originated from outside of the organization. Do not
> click links or open attachments unless you can confirm the sender and know
> the content is safe.
>
>
>
> *AVERTISSEMENT*: Ce courrier électronique provient d’un expéditeur
> externe. Ne cliquez sur aucun lien et n’ouvrez aucune pièce jointe si vous
> ne pouvez pas confirmer l’identité de l’expéditeur et si vous n’êtes pas
> certain que le contenu ne présente aucun risque.
>
>
>
> Hi Jeff,
>
>
>
> Thanks for the draft. It looks to be a useful extension. I've also been
> thinking about this problem as failure modes have become significantly more
> complicated in the last several years due to evolving privacy/security
> landscapes, regulation, and now the proliferation of agents. I have an (as
> yet) unpublished draft of an augmented error protocol for both token
> endpoint and resource server. I'd be interested in collaborating with you
> all on this spec as well, to see whether it could fully subsume the
> functionality from my WIP draft.
>
>
>
> I had a couple of thoughts:
>
>
>
> 1. In Section 5, the spec puts out of scope how the client should respond
> to a step-up authorization challenge. While I think it's good to leave the
> door open for RS and AS to define custom options, it seems like it might be
> useful for the spec to have some normative language for the out-of-the-box
> options, e.g. RAR, rather than leaving it to clients to infer the expected
> behavior from the examples.
>
>
>
> 2. It may be the case that during refresh token exchange, the token
> endpoint already knows some things will fail. Can we allow the token
> endpoint to return insufficient_authorization with details too?
>
>
>
> Nick
>
>
>
> On Mon, Jun 30, 2025 at 7:41 AM Lombardo, Jeff <jeffsec=
> 40amazon....@dmarc.ietf.org> wrote:
>
> Dear OAuth Working Group,
>
>
>
> Alex, Yaron, George, and I would like to introduce a personal Draft to
> you. We have been working on since the beginning of the year while we were
> water testing our use cases and preliminary thoughts at OSW25.
>
>
>
> *Personal Draft - OAuth 2.0 step-up authorization challenge protocol *[
> https://datatracker.ietf.org/doc/draft-lombardo-oauth-step-up-authz-challenge-proto/]
> would extend of *RFC 9470 - OAuth 2.0 Step Up Authentication Challenge
> Protocol* by allowing a resource server to return detailed step-up
> authorization challenges:
>
> 1/ Based on access control decisions enforced at the resource server –
> whatever through a dedicated logic or a call to a Policy Decision Point
> (PDP)
>
> 2/ Enabling clients to request new tokens through enhanced grant types and
> extension like, but not limited to, RFC9396 - OAuth 2.0 Rich Authorization
> Requests, RFC9126 - OAuth 2.0 Pushed Authorization Requests, RFC8693 -
> OAuth 2.0 Token Exchange, or other grant type as the client might see fit
>
>
>
> This Personal Draft also aims at supporting requirements for
> [FAPI2.0-Security-Profiles] or [hl7.fhir.uv.smart-app-launch] regulated
> APIs when they are supporting and recommending those  enhanced flows as
> ways to make access token least privilege, context based, and finer grained.
>
>
>
> We are also requesting, please, a 10 minutes time slot at IETF-123 /
> Madrid to be able to present our work and gather comments, questions, and
> support in the aim of working forward on this proposal as an IETF Draft.
>
>
>
> In the meantime, we remain available to answer any questions, comments,
> suggestions.
>
>
>
> Regards,
>
>
>
> Jeff
>
>
>
>
>
> *Jean-François “Jeff” Lombardo* | Amazon Web Services
>
>
>
> Architecte Principal de Solutions, Spécialiste de Sécurité
> Principal Solution Architect, Security Specialist
> Montréal, Canada
>
> ( +1 514 778 5565 <(514)%20778-5565>
>
> *Commentaires à propos de notre échange? **Exprimez-vous **ici*
> <https://urldefense.com/v3/__https:/feedback.aws.amazon.com/?ea=jeffsec&fn=Jean*20Francois&ln=Lombardo__;JQ!!Pe07N362zA!0k9CkAV8Djpw_8EfIAKrbhP3TQrJr0oMnznlUgBJ3V3NoEk6hihx7dNHnQuejn6SSH2CP8Iow3G-tTzppHeg$>
> *.*
>
>
>
> *Thoughts on our interaction? Provide feedback **here*
> <https://urldefense.com/v3/__https:/feedback.aws.amazon.com/?ea=jeffsec&fn=Jean*20Francois&ln=Lombardo__;JQ!!Pe07N362zA!0k9CkAV8Djpw_8EfIAKrbhP3TQrJr0oMnznlUgBJ3V3NoEk6hihx7dNHnQuejn6SSH2CP8Iow3G-tTzppHeg$>
> *.*
>
>
>
> _______________________________________________
> OAuth mailing list -- oauth@ietf.org
> To unsubscribe send an email to oauth-le...@ietf.org
>
>
_______________________________________________
OAuth mailing list -- oauth@ietf.org
To unsubscribe send an email to oauth-le...@ietf.org

Reply via email to