Re: [OAUTH-WG] PAR and client metadata

2020-05-01 Thread Torsten Lodderstedt
wfm - thanks. Brian Campbell schrieb am Mo. 27. Apr. 2020 um 21:06: > require_pushed_authorization_requests works for me and is maybe/arguably a > bit better by being more consistent with other names. > > On Mon, Apr 27, 2020 at 12:58 PM Filip Skokan wrote: > >> Alternatively,

Re: [OAUTH-WG] PAR and client metadata

2020-04-27 Thread Brian Campbell
require_pushed_authorization_requests works for me and is maybe/arguably a bit better by being more consistent with other names. On Mon, Apr 27, 2020 at 12:58 PM Filip Skokan wrote: > Alternatively, `require_pushed_authorization_requests`. Since we already > have the

Re: [OAUTH-WG] PAR and client metadata

2020-04-27 Thread Filip Skokan
Alternatively, `require_pushed_authorization_requests`. Since we already have the `*require_*request_uri_registration` server and `*require_* auth_time` client metadata properties. WDYT? S pozdravem, *Filip Skokan* On Sun, 26 Apr 2020 at 16:58, Torsten Lodderstedt wrote: > Hi all, > > I

Re: [OAUTH-WG] PAR and client metadata

2020-04-27 Thread Brian Campbell
I think your proposal hits the right level of granularity and usefulness. And I'm thrilled that you went ahead and offered up a name. On Sun, Apr 26, 2020 at 8:58 AM Torsten Lodderstedt wrote: > Hi all, > > I think this topic has several aspects: > - Is the client required to use PAR only?

Re: [OAUTH-WG] PAR and client metadata

2020-04-26 Thread Torsten Lodderstedt
Hi all, I think this topic has several aspects: - Is the client required to use PAR only? Doesn’t this also mean it is required to use request_uri only? - Is there a need to separate those to questions or shall we treat this as the same? - Who decides whether PAR and request_uri are

Re: [OAUTH-WG] PAR and client metadata

2020-04-19 Thread Vladimir Dzhuvinov
In a off-list conversation Torsten floated the idea of letting confidential PAR-only clients register without a redirect_uris and having this "PAR only" parameter will enable that. A "PAR only" parameter will also prevent client developers from accidentally making plain authz requests (for

Re: [OAUTH-WG] PAR and client metadata

2020-04-17 Thread George Fletcher
I don't know about a PAR "requirement", but it feels like the PAR spec is the right place to put this. My understanding of what's being asked is... how does the AS advertise to it's clients that it will ONLY accept PAR based request_uris and other authn/authz request methods will fail. On

Re: [OAUTH-WG] PAR and client metadata

2020-04-17 Thread Torsten Lodderstedt
Is this really a PAR requirement? I’m asking since the client in the end is required to use an authorization request in the fron channel but with a PAR request_uri. So one could see this as a constrained on the authorisation request itself. Another question is whether this request_uri must be

Re: [OAUTH-WG] PAR and client metadata

2020-04-16 Thread George Fletcher
Maybe if we make it an array of authorization "flows" supported? A bit like the AS can describe whether it supports "pairwise", "public" or both? Not sure what to name it though:) Possible values could be "redirect" and "par" (redirect not being quite right:) which allows for expansion in the

Re: [OAUTH-WG] PAR and client metadata

2020-04-16 Thread Brian Campbell
On Thu, Apr 16, 2020 at 2:15 AM Filip Skokan wrote: > I would support defining a client level property. I would also support an > AS discovery property for an AS-wide policy that is signalled to all > clients (and maybe that one would be enough). > I do think there needs to be something at the

Re: [OAUTH-WG] PAR and client metadata

2020-04-16 Thread Brian Campbell
On Wed, Apr 15, 2020 at 1:44 PM Richard Backman, Annabelle wrote: > As I think through this, I’m struggling to identify the threats this > actually helps mitigate. > > A client metadata parameter implies that the value may be different for > different clients, and that any given client won’t

Re: [OAUTH-WG] PAR and client metadata

2020-04-16 Thread Sascha Preibisch
I am also in favour of such metadata. I just implemented the draft and I used a client, which had multiple redirect_uris, for testing purposes. That in mind, one of my thoughts is that it could also be an advantage to not only bind a client to use PAR but in combination with a specific

Re: [OAUTH-WG] PAR and client metadata

2020-04-16 Thread Filip Skokan
I would support defining a client level property. I would also support an AS discovery property for an AS-wide policy that is signalled to all clients (and maybe that one would be enough). FWIW (and this touches my earlier responses about the dpop scheme) defining metadata (both AS and Client) is

Re: [OAUTH-WG] PAR and client metadata

2020-04-14 Thread Brian Campbell
I was hoping to get to a rough consensus in support of the idea before coming up with a name that everyone will hate :) In the meantime, however, name suggestions are of course welcome. On Tue, Apr 14, 2020 at 2:22 PM Vladimir Dzhuvinov wrote: > I'm all for that. > > I suppose you have

Re: [OAUTH-WG] PAR and client metadata

2020-04-14 Thread Vladimir Dzhuvinov
I'm all for that. I suppose you have already thought of a suitable name? :) Vladimir On 14/04/2020 23:08, Brian Campbell wrote: > Using PAR can facilitate improved security by giving clients a > (relatively) simple means for sending a confidential, integrity > protected, and (for confidential

[OAUTH-WG] PAR and client metadata

2020-04-14 Thread Brian Campbell
Using PAR can facilitate improved security by giving clients a (relatively) simple means for sending a confidential, integrity protected, and (for confidential clients anyway) authenticated authorization request. It seems like some of that improved security could be undermined by a malicious