Hi Pieter,

Yes, in another email I suggested defining a few new IANA OAuth parameters
to make everything fit together more seamlessly. Specifically, I proposed
the following:

*New client metadata:*

   - spiffe_id
   - spiffe_bundle_endpoint


*New client authentication method identifiers:*

   - spiffe_jwt
   - spiffe_x509


With these additions, SPIFFE Client Authentication can work smoothly
alongside CIMD and OpenID Federation.

Best Regards,
Taka @ Authlete

On Sat, Feb 21, 2026 at 2:06 AM Pieter Kasselman <[email protected]>
wrote:

> Thanks for raising this Takahiko.
>
> I want to confirm I understand the use case.
>
> From what you describe, I think you're suggesting that the desired state
> is for a client to authenticate with a SPIFFE credential, while using a
> different client_id (potentially an https:// or other identifier), and
> that this could potentially be addressed by including additional metadata
> in CIMD?
>
> Cheers
>
> Pieter
>
> On Fri, Feb 20, 2026 at 4:33 PM Takahiko Kawasaki <[email protected]>
> wrote:
>
>> Hi Emilia,
>>
>> Thank you for your response.
>>
>> Client IDs and client authentication methods should be orthogonal.
>>
>> A CIMD client can have a client ID of "https://example.com/client.json";,
>> and the client metadata document may contain the following metadata to
>> indicate that the client uses OAuth SPIFFE Client Authentication with
>> JWT-SVIDs (assuming that spiffe_jwt represents the client authentication
>> method):
>>
>> "token_endpoint_auth_method": "spiffe_jwt"
>>
>>
>> This is how CIMD and SPIFFE Client Authentication coexist. If we avoid
>> introducing the requirement that the client ID must start with spiffe://,
>> we would not need to take the extra step of replacing spiffe:// with
>> https:// inside the client ID.
>>
>> Individual deployments are free to decide to use client IDs that start
>> with spiffe://, but it is undesirable for a client authentication method to
>> impose constraints on the format of client IDs. If a mechanism functions
>> correctly without such a restriction, it is better for a standard not to
>> impose one.
>>
>> Implementer of OpenID Federation, CIMD, various client authentication
>> methods
>> Taka @ Authlete
>> OpenID Federation - https://www.authlete.com/developers/oidcfed/
>> CIMD - https://www.authlete.com/developers/cimd/
>> OAuth 2.0 Client Authentication -
>> https://medium.com/@darutk/oauth-2-0-client-authentication-4b5f929305d4
>>
>>
>> On Sat, Feb 21, 2026 at 12:33 AM Emelia S. <[email protected]>
>> wrote:
>>
>>> Hi all,
>>>
>>> So OAuth SPIFFE Client Authentication does not conflict with OAuth
>>> Client ID Metadata or OpenID Federation 1.0, since different protocols
>>> are used https:// vs spiffe://
>>>
>>> That allows both to co-exist in an authorization server. It's OAuth
>>> Client ID Metadata and OpenID Federation 1.0 that conflict (but you
>>> almost certainly wouldn't deploy them together due to different
>>> security/trust models), as they both use https:// URIs, so you can't
>>> differentiate between them without trying to fetch, but they have different
>>> fetch semantics (iirc).
>>>
>>> I'm basing this response on the example in
>>> https://arndt-s.github.io/oauth-spiffe-client-authentication/draft-ietf-oauth-spiffe-client-auth-00/draft-ietf-oauth-spiffe-client-auth.html#section-3.2.1
>>>
>>> An AS can look at the client_id and go "this starts with https://
>>> therefore I'll use CIMD" or "this starts with spiffe:// so I'll use OAuth
>>> SPIFFE Client Authentication", just like how you can deploy CIMD and
>>> DCR/Static Registration on the same AS, as long as DCR would never generate
>>> a client_id starting with https:// (which should never happen for most
>>> id generation schemes)
>>>
>>> If SPIFFE Client Authentication does not require the spiffe:// protocol
>>> scheme, and uses https:// then yes, they would be incompatible. I'd
>>> recommend keeping the spiffe:// scheme — perhaps a resolution step is
>>> "replace spiffe:// with https:// in the client_id"
>>>
>>> Yours,
>>> Emelia Smith
>>>
>>> CIMD Co-author
>>>
>>> On 20 Feb 2026, at 16:04, Takahiko Kawasaki <[email protected]> wrote:
>>>
>>> Hello,
>>>
>>> It appears that issues posted to the issue trackers under the management
>>> of https://github.com/oauth-wg/ are automatically shared with the OAuth
>>> WG mailing list. However, since it is unclear whether issues posted to the
>>> OAuth SPIFFE Client Authentication issue tracker under arndt-s's account
>>> are also automatically shared with the OAuth WG, I am posting the same
>>> content here as well.
>>>
>>> SPIFFE-CLIENT-AUTH ISSUE 29: Client ID for Client Authentication using
>>> X509-SVID
>>> https://github.com/arndt-s/oauth-spiffe-client-authentication/issues/29
>>>
>>> In draft 00 of OAuth SPIFFE Client Authentication, when using Client
>>> Authentication with X509-SVID, it requires that the value of the client_id
>>> request parameter be the SPIFFE ID. However, I believe this requirement
>>> should be removed. The reasons are as follows:
>>>
>>> - Systems that use the OpenID Federation 1.0 specification cannot use
>>> OAuth SPIFFE Client Authentication.
>>> - Systems that use the OAuth Client ID Metadata Document specification
>>> cannot use OAuth SPIFFE Client Authentication.
>>> - Systems in which client IDs cannot be flexibly changed cannot use
>>> OAuth SPIFFE Client Authentication.
>>>
>>> The client authentication method defined in RFC 8705 Section 2.1 works
>>> correctly even if the value of the tls_client_auth_san_uri client metadata
>>> differs from the client ID.
>>>
>>> Best Regards,
>>> Taka @ Authlete
>>>
>>>
>>> _______________________________________________
>>> OAuth mailing list -- [email protected]
>>> To unsubscribe send an email to [email protected]
>>>
>>>
>>>
>>
>> --
>> *Takahiko Kawasaki*
>> Co-Founder
>> [email protected]
>> [image: Authlete]
>> authlete.com <https://www.authlete.com/> |Linkedin
>> <https://www.linkedin.com/company/authlete/>
>> _______________________________________________
>> OAuth mailing list -- [email protected]
>> To unsubscribe send an email to [email protected]
>>
>

-- 
*Takahiko Kawasaki*
Co-Founder
[email protected]
[image: Authlete]
authlete.com <https://www.authlete.com/> |Linkedin
<https://www.linkedin.com/company/authlete/>
_______________________________________________
OAuth mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to