Re: [OAUTH-WG] MTLS token endoint & discovery

2019-02-13 Thread Dominick Baier
t; > > *From:* OAuth on behalf of Filip Skokan < > panva...@gmail.com> > *Date:* Tuesday, February 12, 2019 at 1:13 PM > *To:* "Richard Backman, Annabelle" > *Cc:* Brian Campbell , oauth > > *Subject:* Re: [OAUTH-WG] MTLS token endoint & discovery > >

Re: [OAUTH-WG] MTLS token endoint & discovery

2019-02-13 Thread Filip Skokan
> > > > *From: *OAuth on behalf of Filip Skokan < > panva...@gmail.com> > *Date: *Tuesday, February 12, 2019 at 1:13 PM > *To: *"Richard Backman, Annabelle" > *Cc: *Brian Campbell , oauth > > *Subject: *Re: [OAUTH-WG] MTLS token endoint & discovery

Re: [OAUTH-WG] MTLS token endoint & discovery

2019-02-12 Thread Filip Skokan
ken_endpoint_auth_methods_supported). > > > > -- > > Annabelle Richard Backman > > AWS Identity > > > > > > *From: *OAuth on behalf of Brian Campbell > > *Date: *Tuesday, February 12, 2019 at 10:58 AM > *To: *Dominick Baier > *Cc: *oauth > *Sub

Re: [OAUTH-WG] MTLS token endoint & discovery

2019-02-12 Thread Justin Richer
lf of Brian Campbell <mailto:bcampbell=40pingidentity@dmarc.ietf.org> Date: Tuesday, February 12, 2019 at 10:58 AM To: Dominick Baier <mailto:dba...@leastprivilege.com> Cc: oauth <mailto:oauth@ietf.org> Subject: Re: [OAUTH-WG] MTLS token endoint & discovery Thanks

Re: [OAUTH-WG] MTLS token endoint & discovery

2019-02-12 Thread Brian Campbell
Perhaps it's due to my own lack of imagination but I don't see any new vectors or how the existing mitigations don't work here too. Please propose some text though, if there's something that should be in the document. On Tue, Feb 12, 2019 at 8:50 AM Justin Richer wrote: > At the moment, I like t

Re: [OAUTH-WG] MTLS token endoint & discovery

2019-02-12 Thread Brian Campbell
Thanks for the input, Dominick. I'd said previously that I was having trouble adequately gauging whether or not there's sufficient consensus to go ahead with the update. I was even thinking of asking the chairs about a consensus call during the office hours meeting yesterday. But it got canceled.

Re: [OAUTH-WG] MTLS token endoint & discovery

2019-02-12 Thread Justin Richer
At the moment, I like this suggestion. It feels a little … funny … but that might be just because it’s different from what we had before. We’ll need to have a clear security considerations discussion about this though, as it does add another vector for a mix-up attack. I doubt that at this stag

Re: [OAUTH-WG] MTLS token endoint & discovery

2019-02-11 Thread Dominick Baier
IMHO that’s a reasonable and pragmatic option. Thanks ——— Dominick On 11. February 2019 at 13:26:37, Brian Campbell (bcampb...@pingidentity.com) wrote: It's been pointed out that the potential issue is not isolated to the just token endpoint but that revocation, introspection, etc. could be impa

Re: [OAUTH-WG] MTLS token endoint & discovery

2019-02-11 Thread Brian Campbell
It's been pointed out that the potential issue is not isolated to the just token endpoint but that revocation, introspection, etc. could be impacted as well. So, at this point, the proposal on the table is to add a new optional AS metadata parameter named 'mtls_endpoints' that's value we be a JSON

[OAUTH-WG] MTLS token endoint & discovery

2019-02-09 Thread Dominick Baier
We are currently implementing MTLS in IdentityServer. Our approach will be that we’ll offer a separate token endpoint that supports client certs. Are you planning on adding an official endpoint name for discovery? Right now we are using “mtls_token_endpoint”.. Thanks ——— Dominick On 7. February