Re: [OAUTH-WG] self-issued access tokens
toshio9.ito@toshiba.co.jp Fri, 01 October 2021 04:45 UTC
Return-Path: <toshio9.ito@toshiba.co.jp>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3C04E3A0400 for <oauth@ietfa.amsl.com>; Thu, 30 Sep 2021 21:45:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id z_C1m8z9ycZQ for <oauth@ietfa.amsl.com>; Thu, 30 Sep 2021 21:45:08 -0700 (PDT)
Received: from mo-csw.securemx.jp (mo-csw1116.securemx.jp [210.130.202.158]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3C3553A0402 for <oauth@ietf.org>; Thu, 30 Sep 2021 21:45:07 -0700 (PDT)
Received: by mo-csw.securemx.jp (mx-mo-csw1116) id 1914j3pI020504; Fri, 1 Oct 2021 13:45:03 +0900
X-Iguazu-Qid: 2wHH6p2Z6cmIfVLIXO
X-Iguazu-QSIG: v=2; s=0; t=1633063503; q=2wHH6p2Z6cmIfVLIXO; m=q1EmHmzEbzFdppHs2pGv2Hv/thTpsOVRHAYjzSnTPpQ=
Received: from imx2-a.toshiba.co.jp (imx2-a.toshiba.co.jp [106.186.93.35]) by relay.securemx.jp (mx-mr1112) id 1914j2do028548 (version=TLSv1.2 cipher=AES128-GCM-SHA256 bits=128 verify=NOT); Fri, 1 Oct 2021 13:45:03 +0900
Received: from enc01.toshiba.co.jp (enc01.toshiba.co.jp [106.186.93.100]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by imx2-a.toshiba.co.jp (Postfix) with ESMTPS id B771F100112; Fri, 1 Oct 2021 13:45:02 +0900 (JST)
Received: from hop001.toshiba.co.jp ([133.199.164.63]) by enc01.toshiba.co.jp with ESMTP id 1914j2ZY031465; Fri, 1 Oct 2021 13:45:02 +0900
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=XwiiQVda2g+8aZPNqsd83lzIBMHbamzOOyyo3PCGDsiz4OScyFv9hcA8z6S/aynmtl/JQ0kgAn3wh4Po2wj4XH+mBVWFYv1bLEOn1xdyNnXkaPhTkWeAcyz0KHVxatbSnq/HOBlIHM9lVbPSyyOW1reEVfQVuX5LN4RcVZ0r0dS4I494U5XH5m8gY4iIQS+fk4faqtJ0/2qGSRdTmyqPuj/0owOarztSQcH8FVmrYdg86B5JG7vQt+Gk5xWBVVHehjaDDuRKrGcz/rAs2a+hoyLyl2Igc2oWc8UowFLvp74wEIC1RUx5gCKJEX2YNgTYWnp745lXtjJFKhl+2LGx+w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=rAJlCBWhVPGGoF9MfF0VMnz1URxQ18Sy19ihx/ZKRyg=; b=GGmMTbvSMqQJmksVOyEkKNv8hQEgqwLxzMnbUJlbe22HOCBhVbrli/ASIFWFrG6Wn8llKWh9ZYZE1BEVjZGfe+prUZ772xR+0s8kfS3N/Kk1GJiGkvwWC3pRjSgh29PM/Nl2TPEM6Vfjvg1JNdLUU+NUJqm1OWIAQLlDNccxZT6TaeOar7O8/ZF/JWF9KfGfj8QXTpHGd/JW8MuUb32yeE+R+FzVUHXrgGVuMwhxidndfJ1t6SZ2lCrGn3/2PpejCEWSkV6moHC35SdakGpKNB4BER612It86CqI5mdfJ+o/uOvKWNLtXsckXM/zAiMU6bu+O/tC3kwTBb8iu9zlvg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=toshiba.co.jp; dmarc=pass action=none header.from=toshiba.co.jp; dkim=pass header.d=toshiba.co.jp; arc=none
From: toshio9.ito@toshiba.co.jp
To: dick.hardt@gmail.com
CC: oauth@ietf.org
Thread-Topic: [OAUTH-WG] self-issued access tokens
Thread-Index: Ade01Nk+d5eF4L5tTXCgjU67TgIDjwAIzLwAAFmdA8AABlM7gAABzSyA
Date: Fri, 01 Oct 2021 04:45:00 +0000
X-TSB-HOP: ON
Message-ID: <TYCPR01MB56787D963D23F78B0800C6CBE5AB9@TYCPR01MB5678.jpnprd01.prod.outlook.com>
References: <TYCPR01MB567859999FB3350D6A1C63E5E5A99@TYCPR01MB5678.jpnprd01.prod.outlook.com> <CAD9ie-sgjUv3fppvTZvPpOyUKXo1H1i9LtkOk2yxzZ1+A+wt6w@mail.gmail.com> <TYCPR01MB56784381BE6799ADAA46E360E5AB9@TYCPR01MB5678.jpnprd01.prod.outlook.com> <CAD9ie-tMp44z_b=hG+OWC=Hc83RpC_WZ4AaerRMaOZ8cfEkDSg@mail.gmail.com>
In-Reply-To: <CAD9ie-tMp44z_b=hG+OWC=Hc83RpC_WZ4AaerRMaOZ8cfEkDSg@mail.gmail.com>
Accept-Language: ja-JP, en-US
Content-Language: ja-JP
authentication-results: gmail.com; dkim=none (message not signed) header.d=none;gmail.com; dmarc=none action=none header.from=toshiba.co.jp;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: dd5bbea5-352d-4f7c-2c85-08d984963a36
x-ms-traffictypediagnostic: TYAPR01MB5337:
x-microsoft-antispam-prvs: <TYAPR01MB53373E22A2AD52890FCB4BE8E5AB9@TYAPR01MB5337.jpnprd01.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:5516;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:TYCPR01MB5678.jpnprd01.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(366004)(38070700005)(7696005)(186003)(8936002)(86362001)(26005)(38100700002)(66446008)(64756008)(6506007)(316002)(4326008)(53546011)(508600001)(33656002)(5660300002)(83380400001)(8676002)(66946007)(66476007)(122000001)(9686003)(66556008)(55016002)(2906002)(71200400001)(6916009)(52536014)(76116006); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_TYCPR01MB56787D963D23F78B0800C6CBE5AB9TYCPR01MB5678jpnp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: TYCPR01MB5678.jpnprd01.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: dd5bbea5-352d-4f7c-2c85-08d984963a36
X-MS-Exchange-CrossTenant-originalarrivaltime: 01 Oct 2021 04:45:00.5777 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: f109924e-fb71-4ba0-b2cc-65dcdf6fbe4f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: OasvZuoKUjAa8h5tRn3Qro8GTzWkWgjpBTz1gLSQGYJtwAymNAVAPBU1QVwnOGrX+OGhO8ZtxapY1v2wxVBoaJmiMq+eZTxxlCI+h3z9Ii0=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: TYAPR01MB5337
MSSCP.TransferMailToMossAgent: 103
X-OriginatorOrg: toshiba.co.jp
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/-cTnMA58iO7L-p7dznB3LwwAwRA>
Subject: Re: [OAUTH-WG] self-issued access tokens
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Oct 2021 04:45:15 -0000
Thanks Dick, Our use case is to connect IoT devices to a cloud service. The cloud service has to authenticate those devices. The devices are not operated by humans. They run on its own. We want public key-based authentication for those devices. In that case, mutual TLS is a popular option (e.g. AWS IoT Core). However, we don't want to use mutual TLS for several reasons (e.g. it's too coupled with the transport layer). So, we are seeking a solution that is more in application layer. Toshio Ito From: Dick Hardt <dick.hardt@gmail.com> Sent: Friday, October 1, 2021 12:53 PM To: ito toshio(伊藤 俊夫 ○RDC□IT研○CNL) <toshio9.ito@toshiba.co.jp> Cc: oauth@ietf.org Subject: Re: [OAUTH-WG] self-issued access tokens Would be useful to understand your use case and what you the goals and constraints are On Thu, Sep 30, 2021 at 5:58 PM <toshio9.ito@toshiba.co.jp<mailto:toshio9.ito@toshiba.co.jp>> wrote: Thanks Dick, I agree. The scenario of self-issued access tokens doesn't really follow the model of OAuth. So, if we do standardize self-issued access tokens, maybe OAUTH WG is not the right venue. Maybe HTTPBIS or HTTPAPI WGs? Toshio Ito From: Dick Hardt <dick.hardt@gmail.com<mailto:dick.hardt@gmail.com>> Sent: Wednesday, September 29, 2021 3:06 PM To: ito toshio(伊藤 俊夫 ○RDC□IT研○CNL) <toshio9.ito@toshiba.co.jp<mailto:toshio9.ito@toshiba.co.jp>> Cc: oauth@ietf.org<mailto:oauth@ietf.org> Subject: Re: [OAUTH-WG] self-issued access tokens If the client is sending a self-signed JWT to the RS, you essentially are just authenticating directly to the RS. Not really OAuth as the RS has not delegated authorization authority to the AS. If the client sends a self-signed JWT (a PAR) to the AS, and gets back an access token to present to the RS, you get centralized authorization decisions, a key feature of OAuth.
- [OAUTH-WG] self-issued access tokens toshio9.ito
- Re: [OAUTH-WG] self-issued access tokens Dick Hardt
- Re: [OAUTH-WG] self-issued access tokens Vittorio Bertocci
- Re: [OAUTH-WG] self-issued access tokens Sascha Preibisch
- Re: [OAUTH-WG] self-issued access tokens Daniel Fett
- Re: [OAUTH-WG] self-issued access tokens Sascha Preibisch
- Re: [OAUTH-WG] self-issued access tokens Nikos Fotiou
- Re: [OAUTH-WG] self-issued access tokens David Waite
- Re: [OAUTH-WG] self-issued access tokens Nikos Fotiou
- Re: [OAUTH-WG] self-issued access tokens toshio9.ito
- Re: [OAUTH-WG] self-issued access tokens toshio9.ito
- Re: [OAUTH-WG] self-issued access tokens toshio9.ito
- Re: [OAUTH-WG] self-issued access tokens Dick Hardt
- Re: [OAUTH-WG] self-issued access tokens toshio9.ito
- Re: [OAUTH-WG] self-issued access tokens Dick Hardt
- Re: [OAUTH-WG] self-issued access tokens David Waite
- Re: [OAUTH-WG] self-issued access tokens toshio9.ito
- Re: [OAUTH-WG] self-issued access tokens Warren Parad
- Re: [OAUTH-WG] self-issued access tokens David Chadwick
- Re: [OAUTH-WG] self-issued access tokens Dick Hardt
- Re: [OAUTH-WG] self-issued access tokens toshio9.ito