Yes I will! Would love to meet up to discuss. On Mon, Jun 30, 2025 at 12:30 PM Lombardo, Jeff <jeff...@amazon.com> wrote:
> Hi Nick, > > > > Happy to contribute and take a look into your work to build a stronger > case to present to this WG. > > > > Will you be in Madrid per chance? > > > > Regards, > > > > Jeff > > > > *Jean-François “Jeff” Lombardo* | Amazon Web Services > > > > Architecte Principal de Solutions, Spécialiste de Sécurité > Principal Solution Architect, Security Specialist > Montréal, Canada > > ( +1 514 778 5565 <(514)%20778-5565> > > *Commentaires à propos de notre échange? **Exprimez-vous **ici* > <https://urldefense.com/v3/__https:/feedback.aws.amazon.com/?ea=jeffsec&fn=Jean*20Francois&ln=Lombardo__;JQ!!Pe07N362zA!0k9CkAV8Djpw_8EfIAKrbhP3TQrJr0oMnznlUgBJ3V3NoEk6hihx7dNHnQuejn6SSH2CP8Iow3G-tTzppHeg$> > *.* > > > > *Thoughts on our interaction? Provide feedback **here* > <https://urldefense.com/v3/__https:/feedback.aws.amazon.com/?ea=jeffsec&fn=Jean*20Francois&ln=Lombardo__;JQ!!Pe07N362zA!0k9CkAV8Djpw_8EfIAKrbhP3TQrJr0oMnznlUgBJ3V3NoEk6hihx7dNHnQuejn6SSH2CP8Iow3G-tTzppHeg$> > *.* > > > > *From:* Nick Watson <nwat...@google.com> > *Sent:* June 30, 2025 1:45 PM > *To:* Lombardo, Jeff <jeffsec=40amazon....@dmarc.ietf.org> > *Cc:* oauth@ietf.org; Alex Babeanu <alex.babe...@indykite.com>; > yaron.zeh...@rbinternational.com; hannes.tschofe...@gmx.net; Lombardo, > Jeff <jeff...@amazon.com> > *Subject:* RE: [EXT] [OAUTH-WG] [OAUTH-WG/IETF-123] Introduction and > socialization of Personal Draft - OAuth 2.0 step-up authorization challenge > protocol > > > > *CAUTION*: This email originated from outside of the organization. Do not > click links or open attachments unless you can confirm the sender and know > the content is safe. > > > > *AVERTISSEMENT*: Ce courrier électronique provient d’un expéditeur > externe. Ne cliquez sur aucun lien et n’ouvrez aucune pièce jointe si vous > ne pouvez pas confirmer l’identité de l’expéditeur et si vous n’êtes pas > certain que le contenu ne présente aucun risque. > > > > Hi Jeff, > > > > Thanks for the draft. It looks to be a useful extension. I've also been > thinking about this problem as failure modes have become significantly more > complicated in the last several years due to evolving privacy/security > landscapes, regulation, and now the proliferation of agents. I have an (as > yet) unpublished draft of an augmented error protocol for both token > endpoint and resource server. I'd be interested in collaborating with you > all on this spec as well, to see whether it could fully subsume the > functionality from my WIP draft. > > > > I had a couple of thoughts: > > > > 1. In Section 5, the spec puts out of scope how the client should respond > to a step-up authorization challenge. While I think it's good to leave the > door open for RS and AS to define custom options, it seems like it might be > useful for the spec to have some normative language for the out-of-the-box > options, e.g. RAR, rather than leaving it to clients to infer the expected > behavior from the examples. > > > > 2. It may be the case that during refresh token exchange, the token > endpoint already knows some things will fail. Can we allow the token > endpoint to return insufficient_authorization with details too? > > > > Nick > > > > On Mon, Jun 30, 2025 at 7:41 AM Lombardo, Jeff <jeffsec= > 40amazon....@dmarc.ietf.org> wrote: > > Dear OAuth Working Group, > > > > Alex, Yaron, George, and I would like to introduce a personal Draft to > you. We have been working on since the beginning of the year while we were > water testing our use cases and preliminary thoughts at OSW25. > > > > *Personal Draft - OAuth 2.0 step-up authorization challenge protocol *[ > https://datatracker.ietf.org/doc/draft-lombardo-oauth-step-up-authz-challenge-proto/] > would extend of *RFC 9470 - OAuth 2.0 Step Up Authentication Challenge > Protocol* by allowing a resource server to return detailed step-up > authorization challenges: > > 1/ Based on access control decisions enforced at the resource server – > whatever through a dedicated logic or a call to a Policy Decision Point > (PDP) > > 2/ Enabling clients to request new tokens through enhanced grant types and > extension like, but not limited to, RFC9396 - OAuth 2.0 Rich Authorization > Requests, RFC9126 - OAuth 2.0 Pushed Authorization Requests, RFC8693 - > OAuth 2.0 Token Exchange, or other grant type as the client might see fit > > > > This Personal Draft also aims at supporting requirements for > [FAPI2.0-Security-Profiles] or [hl7.fhir.uv.smart-app-launch] regulated > APIs when they are supporting and recommending those enhanced flows as > ways to make access token least privilege, context based, and finer grained. > > > > We are also requesting, please, a 10 minutes time slot at IETF-123 / > Madrid to be able to present our work and gather comments, questions, and > support in the aim of working forward on this proposal as an IETF Draft. > > > > In the meantime, we remain available to answer any questions, comments, > suggestions. > > > > Regards, > > > > Jeff > > > > > > *Jean-François “Jeff” Lombardo* | Amazon Web Services > > > > Architecte Principal de Solutions, Spécialiste de Sécurité > Principal Solution Architect, Security Specialist > Montréal, Canada > > ( +1 514 778 5565 <(514)%20778-5565> > > *Commentaires à propos de notre échange? **Exprimez-vous **ici* > <https://urldefense.com/v3/__https:/feedback.aws.amazon.com/?ea=jeffsec&fn=Jean*20Francois&ln=Lombardo__;JQ!!Pe07N362zA!0k9CkAV8Djpw_8EfIAKrbhP3TQrJr0oMnznlUgBJ3V3NoEk6hihx7dNHnQuejn6SSH2CP8Iow3G-tTzppHeg$> > *.* > > > > *Thoughts on our interaction? Provide feedback **here* > <https://urldefense.com/v3/__https:/feedback.aws.amazon.com/?ea=jeffsec&fn=Jean*20Francois&ln=Lombardo__;JQ!!Pe07N362zA!0k9CkAV8Djpw_8EfIAKrbhP3TQrJr0oMnznlUgBJ3V3NoEk6hihx7dNHnQuejn6SSH2CP8Iow3G-tTzppHeg$> > *.* > > > > _______________________________________________ > OAuth mailing list -- oauth@ietf.org > To unsubscribe send an email to oauth-le...@ietf.org > >
_______________________________________________ OAuth mailing list -- oauth@ietf.org To unsubscribe send an email to oauth-le...@ietf.org