Hello,

A few late remarks and questions about this version of the draft. Sorry if it was already answered, but I haven't found answers in the previous emails.

Section 2.1: in case the JWT is signed then encrypted, which jwt should include the "typ" parameter with the "at+jwt" value? The outer encrypted JWT (JWE), the inner signed JWT (JWS) or both?

Section 3: the example is missing the "iat" and "jti" fields that are mandatory per section 2.2:

   {"typ":"at+JWT","alg":"RS256","kid":"RjEwOwOA"}
   {
     "iss": "https://authorization-server.example.com/";,
     "sub": " 5ba552d67",
     "aud":   "https://rs.example.com/";,
     "exp": 1544645174,
     "client_id": "s6BhdRkqt3_",
     "scope": "openid profile reademail"
   }

Section 4 "Validating JWT Access Tokens":

   o  If the JWT access token is encrypted, decrypt it using the keys
      and algorithms that the resource server specified during
      registration.  If encryption was negotiated with the authorization
      server at registration time and the incoming JWT access token is
      not encrypted, the resource server SHOULD reject it.

The registration details are not documented. As an RS seems to be a special case of an OAuth2 client (without any grant type granted, except, possibily, "client_credentials") I was expecting registration of dynamic client registration metadata similar to those for ID tokens (something like "access_token_signed_response_alg", "access_token_encrypted_response_alg" and "access_token_encrypted_response_enc"), and same for discovery metadata.

Is the rationale for the absence of the registration of these fields that RSes are not considered as OAuth2 clients?

Also, in the same section, nothing is said about the validation of "iat" and "jti".

Regards,

--

Tangui


27.04.2020 21:27, [email protected] пишет:
A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Web Authorization Protocol WG of the IETF.

         Title           : JSON Web Token (JWT) Profile for OAuth 2.0 Access 
Tokens
         Author          : Vittorio Bertocci
        Filename        : draft-ietf-oauth-access-token-jwt-07.txt
        Pages           : 19
        Date            : 2020-04-27

Abstract:
    This specification defines a profile for issuing OAuth 2.0 access
    tokens in JSON web token (JWT) format.  Authorization servers and
    resource servers from different vendors can leverage this profile to
    issue and consume access tokens in interoperable manner.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-oauth-access-token-jwt/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-oauth-access-token-jwt-07
https://datatracker.ietf.org/doc/html/draft-ietf-oauth-access-token-jwt-07

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-oauth-access-token-jwt-07


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


_______________________________________________
OAuth mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to