For new extensions, giving the key uri a new name would seem to work the
same as we have different names for different endpoints.

The cow is out of the barn for current work though.
ᐧ

On Fri, Jan 10, 2020 at 1:22 PM Richard Backman, Annabelle <
richa...@amazon.com> wrote:

> Having different JWKS URIs in the metadata document for different purposes
> would address the issue, but I’m not sure off-hand if we can clearly
> delineate purposes in a robust way without making it too complicated. So it
> may be correct for the working group to accept the situation for what it is.
>
>
>
> However, if we do that then we need to stop pretending that “use different
> keys” is a viable option. That tool needs to be tossed out of the toolbox,
> because our specifications do not allow implementers to do that in a
> meaningful way. The fact that we’ve used that argument despite this
> limitation demonstrates that this is a non-obvious result of the trust
> model we’ve adopted. If we stick with that model, we need to be more
> conscious of this issue in our future work. Some documents will need
> Security Considerations that draw attention to it, others may need more
> attention. We also need to recognize that we will be ruling out certain
> types of deployments, and certain use cases.
>
>
>
> –
>
> Annabelle Richard Backman
>
> AWS Identity
>
>
>
>
>
> *From: *Dick Hardt <dick.ha...@gmail.com>
> *Date: *Friday, January 10, 2020 at 11:00 AM
> *To: *Neil Madden <neil.mad...@forgerock.com>
> *Cc: *Aaron Parecki <aa...@parecki.com>, oauth <oauth@ietf.org>, Mike
> Jones <michael.jo...@microsoft.com>, "Richard Backman, Annabelle" <
> richa...@amazon.com>
> *Subject: *[UNVERIFIED SENDER] Re: [OAUTH-WG] [UNVERIFIED SENDER] RE:
> Cryptographic hygiene and the limits of jwks_uri
>
>
>
> To restate my previous point, we may not be able to change what is
> currently specified and deployed, but we can for future extensions such as
> RAR and PAR.
>
>
>
> To paraphrase Annabelle, this ship may have already sailed.
>
>
>
> On Fri, Jan 10, 2020 at 10:52 AM Dick Hardt <dick.ha...@gmail.com> wrote:
>
> The metadata document is declarative, and can easily be yet another
> separate role in the AS.
>
>
>
> In large organizations, different people are empowered different roles, so
> the team owning the metadata document could be different from the team
> generating ID tokens, and different from the team generating JWTs.
>
>
>
>
>
> On Fri, Jan 10, 2020 at 10:27 AM Neil Madden <neil.mad...@forgerock.com>
> wrote:
>
> The problem with specifying a property on the key itself is that a
> microservice might lie about what it’s keys are for. I think you either
> need separate documents or some separate metadata mapping uses to key ids..
>
>
>
> — Neil
>
>
>
> On 10 Jan 2020, at 18:19, Aaron Parecki <aa...@parecki.com> wrote:
>
> !
>
> Can the keys in the document at the jwks_uri indicate what they are for?
> Either by adding other top-level properties next to "keys" or by specifying
> a property on a key itself? At least that way implementations that expect
> just one value of jwks_uri wouldn't have to change.
>
>
>
> Aaron
>
>
>
>
>
>
>
> On Fri, Jan 10, 2020 at 12:16 PM Dick Hardt <dick.ha...@gmail.com> wrote:
>
> Yes. Thanks for clarifying.
>
> ᐧ
>
>
>
> On Fri, Jan 10, 2020 at 10:14 AM Torsten Lodderstedt <
> tors...@lodderstedt.net> wrote:
>
> You mean additional JWKS URIs, for example?
>
>
>
> Am 10.01.2020 um 19:09 schrieb Dick Hardt <dick.ha...@gmail..com
> <dick.ha...@gmail.com>>:
>
> Perhaps I am misunderstanding what Annabelle was getting at, but having
> more than one key in the metadata document would solve the the issue. IE,
> extensions would define their own key instead of using the same one.
>
>
>
> The metadata document itself was an extension.
>
>
>
>
>
> On Fri, Jan 10, 2020 at 9:58 AM Torsten Lodderstedt <
> tors...@lodderstedt.net> wrote:
>
>
>
> > Am 10.01.2020 um 18:23 schrieb Dick Hardt <dick.ha...@gmail.com>:
> >
> > As OAuth 2.0 has been extended, the AS is now also an OpenID Connect
> Provider, and the access token is being defined. These extensions have
> assumed all of this functionality is a monolith.
> >
> > I'm not suggesting that we MUST make changes to existing extensions, but
> design future extensions so that an implementation can separate duties if
> desired.
>
> How do you envision this to work? As you said, OAuth 2.0 is built on the
> assumption the AS is (at least logically) a monolith. All extension were
> built on that underlying assumption. I don’t see how an arbitrary extension
> can relax that assumption and still be compatible with the rest (just
> revisit the discussion re PAR and keys).
>
> I think we should accept this design assumption, in the same way we should
> accept form encoding as request format instead of JSON, for OAuth 2.0
> extensions.
>
> OAuth 3.0 could explicitely be developed with different architectures in
> mind.
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
> --
>
> ----
>
> Aaron Parecki
>
> aaronparecki.com
>
> @aaronpk <http://twitter.com/aaronpk>
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to