Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-access-token-jwt-03.txt

2019-12-18 Thread Brian Campbell
But there's more going on with aud that needs to be looked at and/or wasn't updated. I think this "The aud claim MAY include a list of individual resource indicators if they are all aliases referring to the same requested resource known by the authorization server." should

Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-access-token-jwt-03.txt

2019-12-18 Thread Brian Campbell
On Mon, Dec 16, 2019 at 10:31 PM Vittorio Bertocci wrote: > Re: aliases, I see where the confusion is coming from! > I updated the request section, but the session 2.2 data structure still > mentions the aliases. That should be cleaned up as well. > In any case the intent was always to only

Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-access-token-jwt-03.txt

2019-12-18 Thread Brian Campbell
-03 Sec 2.1 has: "The typ header parameter for a JWT access token MUST be at+jwt. See the security considerations section for details on the importance of preventing JWT access tokens to be interpreted as id_tokens." As previously mentioned in

Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-access-token-jwt-03.txt

2019-12-18 Thread Brian Campbell
On Mon, Dec 16, 2019 at 9:20 PM Vittorio Bertocci wrote: > > authentication session properties: > > Let me try another angle. Say that I perform an authz code grant asking > for AT, ID_T and RT- obtaining AT', ID_T' and RT'. > The values of auth_time, acr and amr in AT' will be the same as the

Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-access-token-jwt-03.txt

2019-12-17 Thread Steinar Noem
the lines here. If this is the > intention, it should be clearly stated. Alternatively, remove (or change to > a SHOULD) the requirement that multi-value `aud` claims must only contain > aliases for the same resource indicator. > > > > – > > Annabelle Richard Backman > &

Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-access-token-jwt-03.txt

2019-12-17 Thread Vittorio Bertocci
Hi Torsten! > > just to make sure I understood correctly. Are you saying the client has > credentials but is not authenticated using those in all potential > scenarios? Can you pls. explain the rationale? Yes, that's the scenario. In Azure AD you create an app registration that generates a

Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-access-token-jwt-03.txt

2019-12-16 Thread Torsten Lodderstedt
Hi Vittorio, > On 17. Dec 2019, at 05:19, Vittorio Bertocci > wrote: > > In the cases I have seen, the idea is that a client (whose clientID is > already known to the RS) can obtain tokens thru different grants, some of > them confidential and others public; just to make sure I understood

Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-access-token-jwt-03.txt

2019-12-16 Thread Vittorio Bertocci
expectation is that each RS should recognize that generic >> audience. Is this correct? If so it seems to go against the spirit of >> resource indicators as indicating the target or location of a resource. >> It’s stretching that definition, at the very least. >> >> >

Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-access-token-jwt-03.txt

2019-12-16 Thread Vittorio Bertocci
t the very least. > > > > But as I said, I’m reading between the lines here. If this is the > intention, it should be clearly stated. Alternatively, remove (or change to > a SHOULD) the requirement that multi-value `aud` claims must only contain > aliases for the same resource indicator. &g

Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-access-token-jwt-03.txt

2019-12-16 Thread Vittorio Bertocci
Dear all, I finally found the time to push a new draft of the JWT profile for ATs. This version incorporates the feedback kindly provided by Brian and Aaron at IETF105. Unfortunately I didn't have a chance to participate to IETF106, hence we didn't do much progress since then. There are still two

[OAUTH-WG] I-D Action: draft-ietf-oauth-access-token-jwt-03.txt

2019-12-16 Thread internet-drafts
A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Web Authorization Protocol WG of the IETF. Title : JSON Web Token (JWT) Profile for OAuth 2.0 Access Tokens Author : Vittorio Bertocci