Do you have a git repo too?

Jean-François “Jeff” Lombardo | Amazon Web Services

Architecte Principal de Solutions, Spécialiste de Sécurité
Principal Solution Architect, Security Specialist
Montréal, Canada
( +1 514 778 5565

Commentaires à propos de notre échange? Exprimez-vous 
ici<https://urldefense.com/v3/__https:/feedback.aws.amazon.com/?ea=jeffsec&fn=Jean*20Francois&ln=Lombardo__;JQ!!Pe07N362zA!0k9CkAV8Djpw_8EfIAKrbhP3TQrJr0oMnznlUgBJ3V3NoEk6hihx7dNHnQuejn6SSH2CP8Iow3G-tTzppHeg$>.

Thoughts on our interaction? Provide feedback 
here<https://urldefense.com/v3/__https:/feedback.aws.amazon.com/?ea=jeffsec&fn=Jean*20Francois&ln=Lombardo__;JQ!!Pe07N362zA!0k9CkAV8Djpw_8EfIAKrbhP3TQrJr0oMnznlUgBJ3V3NoEk6hihx7dNHnQuejn6SSH2CP8Iow3G-tTzppHeg$>.

From: Nick Watson <nwat...@google.com>
Sent: July 1, 2025 6:28 PM
To: Lombardo, Jeff <jeff...@amazon.com>
Cc: Lombardo, Jeff <jeffsec=40amazon....@dmarc.ietf.org>; oauth@ietf.org; Alex 
Babeanu <alex.babe...@indykite.com>; yaron.zeh...@rbinternational.com; 
hannes.tschofe...@gmx.net
Subject: RE: [EXT] [OAUTH-WG] [OAUTH-WG/IETF-123] Introduction and 
socialization of Personal Draft - OAuth 2.0 step-up authorization challenge 
protocol


CAUTION: This email originated from outside of the organization. Do not click 
links or open attachments unless you can confirm the sender and know the 
content is safe.


AVERTISSEMENT: Ce courrier électronique provient d’un expéditeur externe. Ne 
cliquez sur aucun lien et n’ouvrez aucune pièce jointe si vous ne pouvez pas 
confirmer l’identité de l’expéditeur et si vous n’êtes pas certain que le 
contenu ne présente aucun risque.

I uploaded my early draft to datatracker – 
https://datatracker.ietf.org/doc/draft-watson-oauth-rich-error-response/ 
(github<https://github.com/njwatson32/oauth-error>) – so people can take a look 
if they want.

On Mon, Jun 30, 2025 at 12:30 PM Lombardo, Jeff 
<jeff...@amazon.com<mailto:jeff...@amazon.com>> wrote:
Hi Nick,

Happy to contribute and take a look into your work to build a stronger case to 
present to this WG.

Will you be in Madrid per chance?

Regards,

Jeff

Jean-François “Jeff” Lombardo | Amazon Web Services

Architecte Principal de Solutions, Spécialiste de Sécurité
Principal Solution Architect, Security Specialist
Montréal, Canada
( +1 514 778 5565<tel:(514)%20778-5565>
Commentaires à propos de notre échange? Exprimez-vous 
ici<https://urldefense.com/v3/__https:/feedback.aws.amazon.com/?ea=jeffsec&fn=Jean*20Francois&ln=Lombardo__;JQ!!Pe07N362zA!0k9CkAV8Djpw_8EfIAKrbhP3TQrJr0oMnznlUgBJ3V3NoEk6hihx7dNHnQuejn6SSH2CP8Iow3G-tTzppHeg$>.

Thoughts on our interaction? Provide feedback 
here<https://urldefense.com/v3/__https:/feedback.aws.amazon.com/?ea=jeffsec&fn=Jean*20Francois&ln=Lombardo__;JQ!!Pe07N362zA!0k9CkAV8Djpw_8EfIAKrbhP3TQrJr0oMnznlUgBJ3V3NoEk6hihx7dNHnQuejn6SSH2CP8Iow3G-tTzppHeg$>.

From: Nick Watson <nwat...@google.com<mailto:nwat...@google.com>>
Sent: June 30, 2025 1:45 PM
To: Lombardo, Jeff 
<jeffsec=40amazon....@dmarc.ietf.org<mailto:40amazon....@dmarc.ietf.org>>
Cc: oauth@ietf.org<mailto:oauth@ietf.org>; Alex Babeanu 
<alex.babe...@indykite.com<mailto:alex.babe...@indykite.com>>; 
yaron.zeh...@rbinternational.com<mailto:yaron.zeh...@rbinternational.com>; 
hannes.tschofe...@gmx.net<mailto:hannes.tschofe...@gmx.net>; Lombardo, Jeff 
<jeff...@amazon.com<mailto:jeff...@amazon.com>>
Subject: RE: [EXT] [OAUTH-WG] [OAUTH-WG/IETF-123] Introduction and 
socialization of Personal Draft - OAuth 2.0 step-up authorization challenge 
protocol


CAUTION: This email originated from outside of the organization. Do not click 
links or open attachments unless you can confirm the sender and know the 
content is safe.


AVERTISSEMENT: Ce courrier électronique provient d’un expéditeur externe. Ne 
cliquez sur aucun lien et n’ouvrez aucune pièce jointe si vous ne pouvez pas 
confirmer l’identité de l’expéditeur et si vous n’êtes pas certain que le 
contenu ne présente aucun risque.

Hi Jeff,

Thanks for the draft. It looks to be a useful extension. I've also been 
thinking about this problem as failure modes have become significantly more 
complicated in the last several years due to evolving privacy/security 
landscapes, regulation, and now the proliferation of agents. I have an (as yet) 
unpublished draft of an augmented error protocol for both token endpoint and 
resource server. I'd be interested in collaborating with you all on this spec 
as well, to see whether it could fully subsume the functionality from my WIP 
draft.

I had a couple of thoughts:

1. In Section 5, the spec puts out of scope how the client should respond to a 
step-up authorization challenge. While I think it's good to leave the door open 
for RS and AS to define custom options, it seems like it might be useful for 
the spec to have some normative language for the out-of-the-box options, e.g. 
RAR, rather than leaving it to clients to infer the expected behavior from the 
examples.

2. It may be the case that during refresh token exchange, the token endpoint 
already knows some things will fail. Can we allow the token endpoint to return 
insufficient_authorization with details too?

Nick

On Mon, Jun 30, 2025 at 7:41 AM Lombardo, Jeff 
<jeffsec=40amazon....@dmarc.ietf.org<mailto:40amazon....@dmarc.ietf.org>> wrote:
Dear OAuth Working Group,

Alex, Yaron, George, and I would like to introduce a personal Draft to you. We 
have been working on since the beginning of the year while we were water 
testing our use cases and preliminary thoughts at OSW25.

Personal Draft - OAuth 2.0 step-up authorization challenge protocol 
[https://datatracker.ietf.org/doc/draft-lombardo-oauth-step-up-authz-challenge-proto/]
 would extend of RFC 9470 - OAuth 2.0 Step Up Authentication Challenge Protocol 
by allowing a resource server to return detailed step-up authorization 
challenges:
1/ Based on access control decisions enforced at the resource server – whatever 
through a dedicated logic or a call to a Policy Decision Point (PDP)
2/ Enabling clients to request new tokens through enhanced grant types and 
extension like, but not limited to, RFC9396 - OAuth 2.0 Rich Authorization 
Requests, RFC9126 - OAuth 2.0 Pushed Authorization Requests, RFC8693 - OAuth 
2.0 Token Exchange, or other grant type as the client might see fit

This Personal Draft also aims at supporting requirements for 
[FAPI2.0-Security-Profiles] or [hl7.fhir.uv.smart-app-launch] regulated APIs 
when they are supporting and recommending those  enhanced flows as ways to make 
access token least privilege, context based, and finer grained.

We are also requesting, please, a 10 minutes time slot at IETF-123 / Madrid to 
be able to present our work and gather comments, questions, and support in the 
aim of working forward on this proposal as an IETF Draft.

In the meantime, we remain available to answer any questions, comments, 
suggestions.

Regards,

Jeff


Jean-François “Jeff” Lombardo | Amazon Web Services

Architecte Principal de Solutions, Spécialiste de Sécurité
Principal Solution Architect, Security Specialist
Montréal, Canada
( +1 514 778 5565<tel:(514)%20778-5565>
Commentaires à propos de notre échange? Exprimez-vous 
ici<https://urldefense.com/v3/__https:/feedback.aws.amazon.com/?ea=jeffsec&fn=Jean*20Francois&ln=Lombardo__;JQ!!Pe07N362zA!0k9CkAV8Djpw_8EfIAKrbhP3TQrJr0oMnznlUgBJ3V3NoEk6hihx7dNHnQuejn6SSH2CP8Iow3G-tTzppHeg$>.

Thoughts on our interaction? Provide feedback 
here<https://urldefense.com/v3/__https:/feedback.aws.amazon.com/?ea=jeffsec&fn=Jean*20Francois&ln=Lombardo__;JQ!!Pe07N362zA!0k9CkAV8Djpw_8EfIAKrbhP3TQrJr0oMnznlUgBJ3V3NoEk6hihx7dNHnQuejn6SSH2CP8Iow3G-tTzppHeg$>.

_______________________________________________
OAuth mailing list -- oauth@ietf.org<mailto:oauth@ietf.org>
To unsubscribe send an email to 
oauth-le...@ietf.org<mailto:oauth-le...@ietf.org>
_______________________________________________
OAuth mailing list -- oauth@ietf.org
To unsubscribe send an email to oauth-le...@ietf.org

Reply via email to