Re: [OAUTH-WG] OAuth: The frustrating lack of good libraries

2022-03-02 Thread Sascha Preibisch
Hello Daniel! Some time ago I started an open source project: Loginbuddy. Loginbuddy is a tool that mainly supports OpenID Connect based logins. It can be deployed as a standalone service or be used as a side-car next to other docker containers in the same network. Although it is not necessarily

Re: [OAUTH-WG] [EXTERNAL] Re: Authorization code reuse and OAuth 2.1

2021-10-13 Thread Sascha Preibisch
hich I feel like might be a stretch to say that's typical, but > this scenario was clearly thought of ahead of time. Doing that would enable > an AS to avoid storing server-side state. > > On Wed, Oct 13, 2021 at 1:50 PM Sascha Preibisch < > saschapreibi...@gmail.com>

Re: [OAUTH-WG] [EXTERNAL] Re: Authorization code reuse and OAuth 2.1

2021-10-13 Thread Sascha Preibisch
If the challenge is based on distributed authorization server configurations, how would they handle PKCE? I imagine that managing the state for PKCE is not less challenging than managing authorization codes on the server side, preventing reuse of them. With that in mind I am not sure if I follow th

Re: [OAUTH-WG] self-issued access tokens

2021-09-29 Thread Sascha Preibisch
Yeah, Daniel, I remember we spoke about it. I do think my version is slightly different as there is no access_token issued by the server. Regards, Sascha On Wed, 29 Sept 2021 at 08:42, Daniel Fett wrote: > That very much sounds like a static string as the access token plus DPoP. > > -Daniel >

Re: [OAUTH-WG] self-issued access tokens

2021-09-29 Thread Sascha Preibisch
Vittorio, I wrote an approach where a client would receive a grant by the authorization server but issues the token itself. The post can be found here: https://oauth.blog/oauthblog.jsp (fancy name: Serverless Token Issuance) I presented the idea at IIW right before I wrote the post. I believe tha

Re: [OAUTH-WG] Can a client send the Authorization Request?

2021-05-25 Thread Sascha Preibisch
ent vs client making > the request. The former distinction doesn't really matter in this case, > whereas in the latter distinction the client option seems to be breaking > the spec (only the user agent should send it). > > Amichai > On 5/26/21 4:15 AM, Sascha Preibisch wrote: >

Re: [OAUTH-WG] Can a client send the Authorization Request?

2021-05-25 Thread Sascha Preibisch
as well as e.g. 4.2.1, it seems > pretty explicit that it's the user agent that makes the actual HTTP request > (Authorization Request with all its params etc), after being redirected to > it from the client, no? I don't see much wiggle room there to allow for the > client to

Re: [OAUTH-WG] Can a client send the Authorization Request?

2021-05-25 Thread Sascha Preibisch
Hello Amichai! There could be several reasons why you see that behaviour in your web browser. For example: - This RFC suggests sending a request to the authorization server, get a session specific URL back which can be forwarded to the authorization server via the browser. This is OAuth PAR (Push

Re: [OAUTH-WG] OAuth 2.0 Pushed Authorization Requests: Implementation Status

2021-03-24 Thread Sascha Preibisch
Hello Hannes! I have implemented PAR a while ago in my open source project "Loginbuddy" as documented here: - documentation: https://github.com/SaschaZeGerman/loginbuddy/wiki/Protocols-and-APIs - endpoint: /pauthorize I hope it hope, Sascha On Wed, 24 Mar 2021 at 12:54, Hannes Tschofenig wrote:

Re: [OAUTH-WG] oauth par - authorize request with client_id

2020-11-04 Thread Sascha Preibisch
menters-note-about-jar-fff4cbd158fe > > Best Regards, > Taka > > On Thu, Nov 5, 2020 at 11:33 AM Sascha Preibisch < > saschapreibi...@gmail.com> wrote: > >> Hi all! >> >> A while ago I implemented draft 00 of this spec: >> - https://tools.ietf.org/

[OAUTH-WG] oauth par - authorize request with client_id

2020-11-04 Thread Sascha Preibisch
Hi all! A while ago I implemented draft 00 of this spec: - https://tools.ietf.org/html/draft-ietf-oauth-par-04 Now, in draft 04, I see that a request to the /authorize endpoint is defined with client_id and request_uri. The client_id was added since draft 00 (see: https://tools.ietf.org/html/draf

Re: [OAUTH-WG] Implementation questions around refresh token rotation

2020-10-10 Thread Sascha Preibisch
In the past, customers brought to our attention that some clients were not able to receive a new refresh_token and use it right away. For that use case we added a different type of rotation. The new refresh_token was exactly the same as the given one. Except that it had a new expiration date, lifet

Re: [OAUTH-WG] Call for adoption - OAuth 2.1 document

2020-07-30 Thread Sascha Preibisch
+1 On Thu, 16 Jul 2020 at 23:57, Vladimir Dzhuvinov wrote: > > +1 > > Vladimir > > On 15/07/2020 20:54, Dick Hardt wrote: > > +1 > > On Wed, Jul 15, 2020 at 10:42 AM Rifaat Shekh-Yusef > wrote: >> >> All, >> >> This is a call for adoption for the following OAuth 2.1 document as a WG >> documen

Re: [OAUTH-WG] Call for adoption - OAuth 2.1 document

2020-07-15 Thread Sascha Preibisch
+1 On Wed, 15 Jul 2020 at 13:40, Hans Zandbelt wrote: > > +1 > > Hans. > > On Wed, Jul 15, 2020 at 7:43 PM Rifaat Shekh-Yusef > wrote: >> >> All, >> >> This is a call for adoption for the following OAuth 2.1 document as a WG >> document: >> https://www.ietf.org/id/draft-parecki-oauth-v2-1-03.h

Re: [OAUTH-WG] OAuth 2.1-03 - WG adoption?

2020-07-07 Thread Sascha Preibisch
by the WG? > > ᐧ > > On Tue, Jul 7, 2020 at 4:04 PM Sascha Preibisch > wrote: > >> Hi all! >> >> Here is the rest of my feedback. At the end I also included a list of >> typos and the summary of changes that I have found between RFC 6739 >> and the

Re: [OAUTH-WG] OAuth 2.1-03 - WG adoption?

2020-07-07 Thread Sascha Preibisch
Hi all! Here is the rest of my feedback. At the end I also included a list of typos and the summary of changes that I have found between RFC 6739 and the current draft. Regards, Sascha Section 2.3. Client Authentication - Draft and current: - both documents contain this

Re: [OAUTH-WG] OAuth 2.1-03 - WG adoption?

2020-07-06 Thread Sascha Preibisch
Hi all! I am reading through this document for the first time. I am mainly looking at it in comparison to OAuth 2.0 (RFC 6749) and with the eyes of a developer. I am trying to understand where phrases have changed and, of course, where features are changing. What is the best way to provide feedba

Re: [OAUTH-WG] Aligning PKCE requirements within the OAuth Security BCP

2020-05-06 Thread Sascha Preibisch
The document is called "...Best Current Practice ..." and includes recommendations. Could it be sufficient to say "Authorization servers support PKCE" in section 2.1.1? I believe MUST and other such terms may not necessarily belong into such document. Regards, Sascha On Wed, 6 May 2020 at 14:04,

Re: [OAUTH-WG] PAR - Guidance on the request URI structure needed?

2020-04-27 Thread Sascha Preibisch
+1 On Mon, 27 Apr 2020 at 01:42, Filip Skokan wrote: > > I believe implementers should be free to devise their own URIs and not be > locked down to one by the spec, at the same time, and RFC6755 subnamespace > would be good for guidance. > > So, I would suggest it be RECOMMENDED to use e.g. >

Re: [OAUTH-WG] PAR and client metadata

2020-04-16 Thread Sascha Preibisch
I am also in favour of such metadata. I just implemented the draft and I used a client, which had multiple redirect_uris, for testing purposes. That in mind, one of my thoughts is that it could also be an advantage to not only bind a client to use PAR but in combination with a specific redirect_ur

Re: [OAUTH-WG] Corona Virus and Vancouver

2020-03-09 Thread Sascha Preibisch
I will be there if it is not getting worse. But in any case I am in Vancouver. Regards, Sascha On Mon., Mar. 9, 2020, 11:35 Daniel Fett, wrote: > Hi all, > > can we do a quick roll call on who is coming or not coming to Vancouver? > > For me, at the current point in time, it depends on whether

Re: [OAUTH-WG] New OAuth DPoP and Security BCP drafts

2019-08-01 Thread Sascha Preibisch
Hi all! I am reading through the latest draft ( ... dpop-02). When I got to the first example request (bullet 5.) I saw that only 'grant_type, code, redirect_uri' are used. If I am not mistaken the recommendation is to generally use PKCE with an authorization_code flow. Therefore, I wondered if t

Re: [OAUTH-WG] Transaction Authorization with OAuth

2019-04-25 Thread Sascha Preibisch
hmOID":"2.16.840.1.101.3.4.2.1" > }, > "payment":{ > "type":"sepa-credit-transfer", > "instructedAmount":{ > "currency":"EUR", > "amount":"123.50" >

Re: [OAUTH-WG] Transaction Authorization with OAuth

2019-04-23 Thread Sascha Preibisch
um 22:06 Uhr schrieb Torsten Lodderstedt : > > Hi Sascha, > > > Am 22.04.2019 um 20:34 schrieb Sascha Preibisch : > > > > Thank you for the article, Torsten! > > my pleasure :-) > > > > > I like that 'scope' is out of the game for these kinds of

Re: [OAUTH-WG] Transaction Authorization with OAuth

2019-04-22 Thread Sascha Preibisch
Thank you for the article, Torsten! I like that 'scope' is out of the game for these kinds of authorizations. What I can see for the general use case is a required identifier within the 'structures_scope' document that identifies the profile it should be used for. Thank you, Sascha Am Sa., 20.

Re: [OAUTH-WG] Call for adoption: JWT Usage in OAuth2 Access Tokens

2019-04-15 Thread Sascha Preibisch
horization server cannot set an appropriate value if it was not passed in as a request parameter. Thanks, Sascha Am Sa., 13. Apr. 2019 um 09:29 Uhr schrieb Schanzenbach, Martin : > > > > > On 10. Apr 2019, at 19:39, Sascha Preibisch > > wrote: > > > > I am late in t

Re: [OAUTH-WG] Call for adoption: JWT Usage in OAuth2 Access Tokens

2019-04-11 Thread Sascha Preibisch
I am late in the game, but not too late I hope. I would like to see 'aud' be the requesting client_id. For identifying the the target resource, a 'resource' claim should be introduced. I am also suggesting to not introduce 'typ: at+jwt'. It is simply a jwt and the validation process will show if i