Hi Joe,

Thanks so much for the review. Comments inline (I'm only addressing some in
this email:)


On Wed, Apr 10, 2024 at 11:44 PM Joseph Salowey <j...@salowey.net> wrote:

> I have reviewed the Transaction Token document.  In general I think it is
> a needed document and I am glad there is work in this area. I have some
> questions and comments below:
>
> 1. Section 4 defines Trust Domain and seems to point to RFC 7519.  I
> couldn't find any reference to trust domain in 7519.
>
> 2. Why would you not include a kid claim? it seems that key rotation
> should be supported. Is there harm in requiring a kid?
>
gff: There is no harm in supporting kid and I don't believe it's explicitly
excluded. It's probably useful to add some text around key rotation and use
of kid.

>
> 3. From the text, I don't really understand what the purp: claim is for.
>
gff: The goal of the claim is to allow the transaction token to "downscope"
the inbound token especially when it's from an external client. For
example, if the client is a mobile app with OAuth scopes for
readGroupMessaging and writeGroupMessaging (encapsulated in the
access_token). Then if the purpose of the transaction is to "add a user to
a group chat", then that can be explicitly codified in the Transaction
Token reducing the authorization scope of the token and tailoring the
transaction token to the purpose of the requested transaction. I need to
add more context as you are not the first to ask about it :)

>
> 4. One of the things I expected to see in some txn-tokens is a
> username/email, but I did not see that in any examples, while there are
> privacy considerations here, is there a reason why it is not included?
> Would this be in the rctx: or the azd: claim? It not clear when I would use
> azd or rctx for a particular data value.
>
gff: the subject claim can contain any value as makes sense for the Trust
domain. There is also no explicit restrictions on additional claims that
can be added. Note that Yaron has provided feedback on moving back to the
Security Event Token definition of sub_id which allows for more clear
identification of the subject value and its type.

>
> 5. As discussed on the list I think there may be cases where there will
> not be an Oauth token to exchange.  THe decision is that this is out of
> scope for this document, but the case should probably be mentioned.
>
gff: there is a pull request (#90 in github) covering this topic. The
proposed text requires a self-signed access token (potentially using RFC
9068) for the subject_token.

>
> 6. Is it intended that a single transaction token service endpoint can
> serve more than one trust domain? (it seems like the protocol supports, but
> I am not sure if it is a design goal).
>
gff: I would say the original intent is that there would be a single
transaction token service per trust domain. Happy to discuss that and the
pros and cons.

>
> 7. For a replacement token  7.4 it says the replacement may not change the
> rctx, but does not say anything about the azd.   In section 5.2 it says
> that azd: remains immutable during the call chain.  It seems that these two
> things do not line up and the replacement token needs something to change.
>  Perhaps azd is not immutable?  What are the asserted values that may
> change referred to in 7.4.1.
>
gff: Great catch!! Yes, that needs to be rectified.

>
> 8. Section 7.5 is referring to OAUTH client authentication? Should it
> refer to RFC 8705 for mTLS/SPIFFE case?
>
gff: so from a non-normative perspective, we can give that as an example.
Feel free to propose some text. The spec is intentionally silent on what
mechanism is used for client authentication.

>
> 9. Section 9.1 it probably should be mentioned earlier in the document
> that a transaction token cannot be issued based on a refresh token.
>
gff: I think I agree and that's something that hasn't been discussed
previously.

>
> Once again, thanks for your work on this document, I think it will be very
> useful.
>
> Joe
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
>
> https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/oauth__;!!FrPt2g6CO4Wadw!NrO-8pJTwTlsHifvL_LVyK8Mazovv7wSoS6xcnmxydwMzzrRSmc5WmBTQVtt8dekiooBnG0a26CP3XJcM0XI$
>

______________________________________________________________________



The information contained in this e-mail may be confidential and/or proprietary 
to Capital One and/or its affiliates and may only be used solely in performance 
of work or services for Capital One. The information transmitted herewith is 
intended only for use by the individual or entity to which it is addressed. If 
the reader of this message is not the intended recipient, you are hereby 
notified that any review, retransmission, dissemination, distribution, copying 
or other use of, or taking of any action in reliance upon this information is 
strictly prohibited. If you have received this communication in error, please 
contact the sender and delete the material from your computer.



_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to