I read over the document

It took me a while to figure out what exactly an ID-JAG that is shown in
the sequence diagram but not defined until later
The roles in the sequence diagram include the Resource Application AS --
but that role is not in Table 1
In section 4 the initial redirect to the IdP is described and then the post
to the token endpoint, but they are not explicit in the sequence diagram

Given that the specification starts with exchanging a SAML or ID Token for
an ID-JAG -- the document could start describing the protocol given a SAML
or ID Token?

This spec requires a client to have credentials registered at the IdP for
the ID Token exchange for an ID-JAG exchange.

Would the key binding doc in discussion in OpenID Connect WG allow the
client to not have to have credentials?
https://dickhardt.github.io/openid-key-binding/main.html

Or perhaps mandate DPoP for the ID Token -> ID-JAG exchange?

Is the intermediate token:

Identity Assertion Authorization Grant JWT
or a JWT Authorization Grant

It seems that both terms refer to the same thing - an ID-JAG

The term "Resource Application's token endpoint" is confusing -- this is
the token endpoint of the AS of the Resource Application -- not the resource

The token exchange at the resource AS requires another set of credentials
for the client that are registered at the AS of the resource.
Could we not use keys the client controls again here?



> 8.1 Client Authentication
> This specification SHOULD only be supported for confidential clients.
Public clients SHOULD redirect the user with an OAuth 2.0 Authorization
Request.

Which AS are the public clients redirecting the user? How would this work?
If this works, then why are needing this specification?





On Mon, Aug 25, 2025 at 1:39 PM Rifaat Shekh-Yusef via Datatracker <
nore...@ietf.org> wrote:

>
> Subject: Call for adoption:
> draft-parecki-oauth-identity-assertion-authz-grant-05  (Ends 2025-09-08)
>
> This message starts a 2-week Call for Adoption for this document.
>
> Abstract:
>    This specification provides a mechanism for an application to use an
>    identity assertion to obtain an access token for a third-party API by
>    coordinating through a common enterprise identity provider using
>    Token Exchange [RFC8693] and JWT Profile for OAuth 2.0 Authorization
>    Grants [RFC7523].
>
> File can be retrieved from:
>
> https://datatracker.ietf.org/doc/draft-parecki-oauth-identity-assertion-authz-grant/
>
> Please reply to this message keeping oauth@ietf.org in copy by indicating
> whether you support or not the adoption of this draft as a WG document.
> Comments to motivate your preference are highly appreciated.
>
> Authors, and WG participants in general, are reminded of the Intellectual
> Property Rights (IPR) disclosure obligations described in BCP 79 [2].
> Appropriate IPR disclosures required for full conformance with the
> provisions
> of BCP 78 [1] and BCP 79 [2] must be filed, if you are aware of any.
> Sanctions available for application to violators of IETF IPR Policy can be
> found at [3].
>
> Thank you.
> [1] https://datatracker.ietf.org/doc/bcp78/
> [2] https://datatracker.ietf.org/doc/bcp79/
> [3] https://datatracker.ietf.org/doc/rfc6701/
>
>
>
> _______________________________________________
> OAuth mailing list -- oauth@ietf.org
> To unsubscribe send an email to oauth-le...@ietf.org
>
_______________________________________________
OAuth mailing list -- oauth@ietf.org
To unsubscribe send an email to oauth-le...@ietf.org

Reply via email to