Hi Nat,

Per my response to Justin, the title and introduction were revised to address 
the confusion.  It did not introduce the term “Registered token”, since this 
isn’t standard terminology that I’m aware of, and would therefore likely cause 
more readability issues than it would solve.  Use of the “azp” (authorized 
party) claim is also now described in Section 3 of -03.

                                                            -- Mike

From: OAuth [mailto:[email protected]] On Behalf Of Nat Sakimura
Sent: Tuesday, March 24, 2015 5:47 PM
To: Justin Richer
Cc: <[email protected]>
Subject: Re: [OAUTH-WG] Last Call comments on 
draft-ietf-oauth-proof-of-possession

I tend to agree.

This document is describing the format of (subset of) what I have been calling 
as Registered token in contrast to a bearer token.

It is currently covering two types of registered token:
- key embedding
- key reference embedding

There can be other types such as
- authorized presenter ID embedding

etc. as well, in which case, you would have a top level member "azp" and no 
"cnf".

Perhaps a title change to something like "JWT registered token format" etc. may 
be a good idea.

Cheers,

Nat


2015-03-25 8:31 GMT+09:00 Justin Richer 
<[email protected]<mailto:[email protected]>>:
I believe that this draft is misnamed and therefore somewhat misleading: it’s 
fundamentally a method of protected key transmission using JWT, and not about 
proof of possession of that key. The proof is in simply using the key to create 
a JWT within an application (such as will be in 
draft-ietf-oauth-signed-http-request). Proof of possession of a key does not 
require the transmission of the key or a direct reference through the client 
via a data structure, and I don’t want to accidentally give the impression that 
one needs to use a structured token for proof of possession to work.

For instance, in an alternative approach, the AS can issue a random-blob token 
to the client along side the key value (as it’s done in this draft), and the 
client presents the random-blob token to the RS. The RS then looks up the 
information about the random-blob, using a local lookup or introspection or 
some other magic, to get the information that it needs. The client doesn’t need 
to know anything about it, as the token itself is opaque to the client.

That said, overall the structure and function of the draft is good for what it 
actually is. The client remains agnostic about what’s inside the token itself, 
as in regular OAuth. It gives semantic processing for an RS to process messages 
(of various types) signed by keys issued alongside these structured tokens.

I think this problem could be fixed by renaming the draft and rewriting the 
introduction.

 — Justin

_______________________________________________
OAuth mailing list
[email protected]<mailto:[email protected]>
https://www.ietf.org/mailman/listinfo/oauth



--
Nat Sakimura (=nat)
Chairman, OpenID Foundation
http://nat.sakimura.org/
@_nat_en
_______________________________________________
OAuth mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to