Thanks Dag,I understand the benefits of doing this, but what is strange to me 
is that in the current dynamic client registration, the client goes a specific 
registration URL at the AS *prior* to doing the AuthZ request. In this SPIFFE 
registration case, the "client" has first been registered via SPIFFE with an 
entity trusted by the AS. This MUST have happened, because the client has an 
SVID. I believe that having a separate registration URL and authZ URL allows 
for better security. But with prior SPIFFE registration, equivalent (or better) 
security is possible, and a second registration can be skipped if these 
entities trust each other.I am not a fan of (for example) the client passing in 
redirect URLs for redirect flows as part of the authZ request itself. They 
should be pre-registered, even if it's immediately before the authZ protocol 
needs to use them.I think in this proposal, the SVID should be thought of as 
equivalent to the client ID, and the client can be considered pre-registered, 
or implicitly registered because of prior SPIFFE registration.-johnkSent from 
my Galaxy
-------- Original message --------From: Dag Sneeggen 
<dag.sneeg...@signicat.com> Date: 6/26/25  11:12  (GMT-05:00) To: 
"stable.pseudonym" <stable.pseudo...@gmail.com>, Pieter Kasselman 
<pie...@spirl.com>, oauth <oauth@ietf.org>, Ismael Kazzouzi <ism...@spirl.com> 
Subject: Re: [OAUTH-WG] Simplify Client Registration with SPIFFE 

IMO what're describing is a totally valid and probably common use case, but it 
is slightly different than what we focus on here. 




The advantage of the first use register is that you only create an oauth client 
when it's needed. 

With SPIFFE you can have hundreds of shortlived workloads being created and 
deleted. It's not a given that all of them need an oauth client. Or longlived 
workloads might not need an oauth client for their whole life span, or they 
need multiple. 

Here we essentially propose 1) on-demand automated client  lifecycle 
management. 2) mitigating secret sprawl by leveraging spiffe credentials. 






Sent from Outlook for Android

From: stable.pseudonym <stable.pseudo...@gmail.com>
Sent: Thursday, June 26, 2025 4:55:06 PM
To: Pieter Kasselman <pie...@spirl.com>; oauth <oauth@ietf.org>; Ismael 
Kazzouzi <ism...@spirl.com>; Dag Sneeggen <dag.sneeg...@signicat.com>
Subject: RE: [OAUTH-WG] Simplify Client Registration with SPIFFE
 









You don't often get email from stable.pseudo...@gmail.com. 
Learn why this is important 







Thanks Pieter,


In reading the client registration with SPIFFE draft, I believe that this is 
not as much "dynamic client registration" (as described in that doc) but 
"implicit client registration", where registration of the client has taken 
place prior to the
 client contacting the AS, and has been performed by some entity (a SPIFFE 
server) trusted well-enough by the AS that the AS may proceed to authorize the 
client based on that prior registration. 


In which case, why does the client need to be involved in the registration at 
all? Would it not be possible for the SPIFFE server to inform the AS of the new 
client, prior to the client contacting the AS? Have I understood this correctly?

Cheers, -johnk



Sent from my Galaxy






-------- Original message --------
From: Pieter Kasselman <pie...@spirl.com> 
Date: 6/25/25 07:20 (GMT-05:00) 
To: oauth <oauth@ietf.org>, Ismael Kazzouzi <ism...@spirl.com>, 
dag...@signicat.com

Subject: [OAUTH-WG] Simplify Client Registration with SPIFFE 






Hi fellow OAuth Working Group members


Below are two individual drafts that explore ways to simplify OAuth client 
registration (and as a bonus avoid proliferating client secrets). 


The drafts were inspired by a post from Dmitry Telegin that described the idea 
of using SPIFFE credentials to simplify client registration while 
simultaneously avoiding the need for client secrets [2] and in parallel renewed 
interest in using Dynamic Client
 Registration with protocols like the model Context Protocol (MCP) [3]. 


Taking inspiration from these ideas, and discussion, we prepared two drafts to 
start a conversation on ways to simplify client registration in dynamic, 
rapidly scaling, environments with an additional benefit of avoiding additional 
secret proliferation
 while leveraging existing deployed infrastructure. It is conceivable that 
these concepts can be generalised to other workload credentialing systems that 
are widely deployed, or may be deployed in the future.


1. OAuth Client Registration on First Use with SPIFFE: 
https://datatracker.ietf.org/doc/draft-kasselman-oauth-spiffe/

2.  OAuth 2.0 Dynamic
 Client Registration with Trusted Issuer Credentials: 
https://datatracker.ietf.org/doc/draft-kasselman-oauth-dcr-trusted-issuer-token/



We are looking forward to hearing from others that are exploring ways to 
simplify client registration.


Pieter, Dag and Ismael


[1] https://datatracker.ietf.org/doc/html/rfc7591

[2] https://mailarchive.ietf.org/arch/msg/oauth/XHjZCP0H14QLsPoiCGnptTKmNp4/
[3] 
https://modelcontextprotocol.io/specification/2025-06-18/basic/authorization#dynamic-client-registration







_______________________________________________
OAuth mailing list -- oauth@ietf.org
To unsubscribe send an email to oauth-le...@ietf.org

Reply via email to