Re: [OAUTH-WG] DPoP and OpenID Connect

2022-02-17 Thread David Waite
Hello Dmitry! AFAIK there isn’t any accepted work within OpenID Foundation defining an interaction between id_tokens and DPoP. Like most of the OAuth additions which have come out after OpenID Connect 1.0, one could expect that it would layer on top transparently as something which pertains

Re: [OAUTH-WG] DPoP and client registration metadata

2022-02-17 Thread George Fletcher
On 2/17/22 4:32 PM, Brian Campbell wrote: On Thu, Feb 17, 2022 at 12:28 PM George Fletcher wrote: Given that the FAPI 2 baseline is requiring either DPoP or MTLS as the sender-constraining methods, I think we need to provide more guidance about how DPoP is used in cases outside

Re: [OAUTH-WG] WGLC for JWK Thumbprint URI document

2022-02-17 Thread Mike Jones
Hi David, Rifaat reminded me that yours is the only WGLC comment that has not been resolved by publication of -01. As noted earlier, the substantive differences between this draft and the JWK URI draft that you’re proposing are being primarily discussed in the OpenID Connect working group,

Re: [OAUTH-WG] DPoP and client registration metadata

2022-02-17 Thread Brian Campbell
On Thu, Feb 17, 2022 at 12:28 PM George Fletcher wrote: > From an authorization server perspective, I think it makes sense to be > able to flag certain clients as only supporting DPoP bound tokens and hence > rejecting any request without the appropriate proof. > There's work underway over in

Re: [OAUTH-WG] DPoP proof and the public key

2022-02-17 Thread Daniel Fett
Hi George, the main reason for this is to facilitate a client implementation that always sends the same kind of proof. For the client, there's no need to distinguish between token request, resource request, or even PAR request. Even though the key would only be needed once, of course.

Re: [OAUTH-WG] DPoP and client registration metadata

2022-02-17 Thread George Fletcher
From an authorization server perspective, I think it makes sense to be able to flag certain clients as only supporting DPoP bound tokens and hence rejecting any request without the appropriate proof. Given that the FAPI 2 baseline is requiring either DPoP or MTLS as the sender-constraining

Re: [OAUTH-WG] DPoP and OpenID Connect

2022-02-17 Thread George Fletcher
It's probably better to post this question in the OIDC working group email list or file an issue with OpenID Connect. I think it is an interesting and relevant question. OpenID Connect does define the 'private_secret_jwt' mechanism which can be used for client authentication and could be

[OAUTH-WG] DPoP proof and the public key

2022-02-17 Thread George Fletcher
Hi, I'm going to expose my ignorance here... but what is the rationale for requiring the public key in every DPoP proof? Is there a security reason? or is it for ease of development? If large RSA keys are being used, that public key is rather large for sending with every request when even a