Thanks for raising this Takahiko.

I want to confirm I understand the use case.

>From what you describe, I think you're suggesting that the desired state is
for a client to authenticate with a SPIFFE credential, while using a
different client_id (potentially an https:// or other identifier), and that
this could potentially be addressed by including additional metadata in
CIMD?

Cheers

Pieter

On Fri, Feb 20, 2026 at 4:33 PM Takahiko Kawasaki <[email protected]> wrote:

> Hi Emilia,
>
> Thank you for your response.
>
> Client IDs and client authentication methods should be orthogonal.
>
> A CIMD client can have a client ID of "https://example.com/client.json";,
> and the client metadata document may contain the following metadata to
> indicate that the client uses OAuth SPIFFE Client Authentication with
> JWT-SVIDs (assuming that spiffe_jwt represents the client authentication
> method):
>
> "token_endpoint_auth_method": "spiffe_jwt"
>
>
> This is how CIMD and SPIFFE Client Authentication coexist. If we avoid
> introducing the requirement that the client ID must start with spiffe://,
> we would not need to take the extra step of replacing spiffe:// with
> https:// inside the client ID.
>
> Individual deployments are free to decide to use client IDs that start
> with spiffe://, but it is undesirable for a client authentication method to
> impose constraints on the format of client IDs. If a mechanism functions
> correctly without such a restriction, it is better for a standard not to
> impose one.
>
> Implementer of OpenID Federation, CIMD, various client authentication
> methods
> Taka @ Authlete
> OpenID Federation - https://www.authlete.com/developers/oidcfed/
> CIMD - https://www.authlete.com/developers/cimd/
> OAuth 2.0 Client Authentication -
> https://medium.com/@darutk/oauth-2-0-client-authentication-4b5f929305d4
>
>
> On Sat, Feb 21, 2026 at 12:33 AM Emelia S. <[email protected]> wrote:
>
>> Hi all,
>>
>> So OAuth SPIFFE Client Authentication does not conflict with OAuth Client
>> ID Metadata or OpenID Federation 1.0, since different protocols are used
>> https:// vs spiffe://
>>
>> That allows both to co-exist in an authorization server. It's OAuth
>> Client ID Metadata and OpenID Federation 1.0 that conflict (but you
>> almost certainly wouldn't deploy them together due to different
>> security/trust models), as they both use https:// URIs, so you can't
>> differentiate between them without trying to fetch, but they have different
>> fetch semantics (iirc).
>>
>> I'm basing this response on the example in
>> https://arndt-s.github.io/oauth-spiffe-client-authentication/draft-ietf-oauth-spiffe-client-auth-00/draft-ietf-oauth-spiffe-client-auth.html#section-3.2.1
>>
>> An AS can look at the client_id and go "this starts with https://
>> therefore I'll use CIMD" or "this starts with spiffe:// so I'll use OAuth
>> SPIFFE Client Authentication", just like how you can deploy CIMD and
>> DCR/Static Registration on the same AS, as long as DCR would never generate
>> a client_id starting with https:// (which should never happen for most
>> id generation schemes)
>>
>> If SPIFFE Client Authentication does not require the spiffe:// protocol
>> scheme, and uses https:// then yes, they would be incompatible. I'd
>> recommend keeping the spiffe:// scheme — perhaps a resolution step is
>> "replace spiffe:// with https:// in the client_id"
>>
>> Yours,
>> Emelia Smith
>>
>> CIMD Co-author
>>
>> On 20 Feb 2026, at 16:04, Takahiko Kawasaki <[email protected]> wrote:
>>
>> Hello,
>>
>> It appears that issues posted to the issue trackers under the management
>> of https://github.com/oauth-wg/ are automatically shared with the OAuth
>> WG mailing list. However, since it is unclear whether issues posted to the
>> OAuth SPIFFE Client Authentication issue tracker under arndt-s's account
>> are also automatically shared with the OAuth WG, I am posting the same
>> content here as well.
>>
>> SPIFFE-CLIENT-AUTH ISSUE 29: Client ID for Client Authentication using
>> X509-SVID
>> https://github.com/arndt-s/oauth-spiffe-client-authentication/issues/29
>>
>> In draft 00 of OAuth SPIFFE Client Authentication, when using Client
>> Authentication with X509-SVID, it requires that the value of the client_id
>> request parameter be the SPIFFE ID. However, I believe this requirement
>> should be removed. The reasons are as follows:
>>
>> - Systems that use the OpenID Federation 1.0 specification cannot use
>> OAuth SPIFFE Client Authentication.
>> - Systems that use the OAuth Client ID Metadata Document specification
>> cannot use OAuth SPIFFE Client Authentication.
>> - Systems in which client IDs cannot be flexibly changed cannot use OAuth
>> SPIFFE Client Authentication.
>>
>> The client authentication method defined in RFC 8705 Section 2.1 works
>> correctly even if the value of the tls_client_auth_san_uri client metadata
>> differs from the client ID.
>>
>> Best Regards,
>> Taka @ Authlete
>>
>>
>> _______________________________________________
>> OAuth mailing list -- [email protected]
>> To unsubscribe send an email to [email protected]
>>
>>
>>
>
> --
> *Takahiko Kawasaki*
> Co-Founder
> [email protected]
> [image: Authlete]
> authlete.com <https://www.authlete.com/> |Linkedin
> <https://www.linkedin.com/company/authlete/>
> _______________________________________________
> OAuth mailing list -- [email protected]
> To unsubscribe send an email to [email protected]
>
_______________________________________________
OAuth mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to