Re: [OAUTH-WG] self-issued access tokens

toshio9.ito@toshiba.co.jp Fri, 01 October 2021 04:45 UTC

Return-Path: <toshio9.ito@toshiba.co.jp>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3C04E3A0400 for <oauth@ietfa.amsl.com>; Thu, 30 Sep 2021 21:45:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id z_C1m8z9ycZQ for <oauth@ietfa.amsl.com>; Thu, 30 Sep 2021 21:45:08 -0700 (PDT)
Received: from mo-csw.securemx.jp (mo-csw1116.securemx.jp [210.130.202.158]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3C3553A0402 for <oauth@ietf.org>; Thu, 30 Sep 2021 21:45:07 -0700 (PDT)
Received: by mo-csw.securemx.jp (mx-mo-csw1116) id 1914j3pI020504; Fri, 1 Oct 2021 13:45:03 +0900
X-Iguazu-Qid: 2wHH6p2Z6cmIfVLIXO
X-Iguazu-QSIG: v=2; s=0; t=1633063503; q=2wHH6p2Z6cmIfVLIXO; m=q1EmHmzEbzFdppHs2pGv2Hv/thTpsOVRHAYjzSnTPpQ=
Received: from imx2-a.toshiba.co.jp (imx2-a.toshiba.co.jp [106.186.93.35]) by relay.securemx.jp (mx-mr1112) id 1914j2do028548 (version=TLSv1.2 cipher=AES128-GCM-SHA256 bits=128 verify=NOT); Fri, 1 Oct 2021 13:45:03 +0900
Received: from enc01.toshiba.co.jp (enc01.toshiba.co.jp [106.186.93.100]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by imx2-a.toshiba.co.jp (Postfix) with ESMTPS id B771F100112; Fri, 1 Oct 2021 13:45:02 +0900 (JST)
Received: from hop001.toshiba.co.jp ([133.199.164.63]) by enc01.toshiba.co.jp with ESMTP id 1914j2ZY031465; Fri, 1 Oct 2021 13:45:02 +0900
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=XwiiQVda2g+8aZPNqsd83lzIBMHbamzOOyyo3PCGDsiz4OScyFv9hcA8z6S/aynmtl/JQ0kgAn3wh4Po2wj4XH+mBVWFYv1bLEOn1xdyNnXkaPhTkWeAcyz0KHVxatbSnq/HOBlIHM9lVbPSyyOW1reEVfQVuX5LN4RcVZ0r0dS4I494U5XH5m8gY4iIQS+fk4faqtJ0/2qGSRdTmyqPuj/0owOarztSQcH8FVmrYdg86B5JG7vQt+Gk5xWBVVHehjaDDuRKrGcz/rAs2a+hoyLyl2Igc2oWc8UowFLvp74wEIC1RUx5gCKJEX2YNgTYWnp745lXtjJFKhl+2LGx+w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=rAJlCBWhVPGGoF9MfF0VMnz1URxQ18Sy19ihx/ZKRyg=; b=GGmMTbvSMqQJmksVOyEkKNv8hQEgqwLxzMnbUJlbe22HOCBhVbrli/ASIFWFrG6Wn8llKWh9ZYZE1BEVjZGfe+prUZ772xR+0s8kfS3N/Kk1GJiGkvwWC3pRjSgh29PM/Nl2TPEM6Vfjvg1JNdLUU+NUJqm1OWIAQLlDNccxZT6TaeOar7O8/ZF/JWF9KfGfj8QXTpHGd/JW8MuUb32yeE+R+FzVUHXrgGVuMwhxidndfJ1t6SZ2lCrGn3/2PpejCEWSkV6moHC35SdakGpKNB4BER612It86CqI5mdfJ+o/uOvKWNLtXsckXM/zAiMU6bu+O/tC3kwTBb8iu9zlvg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=toshiba.co.jp; dmarc=pass action=none header.from=toshiba.co.jp; dkim=pass header.d=toshiba.co.jp; arc=none
From: toshio9.ito@toshiba.co.jp
To: dick.hardt@gmail.com
CC: oauth@ietf.org
Thread-Topic: [OAUTH-WG] self-issued access tokens
Thread-Index: Ade01Nk+d5eF4L5tTXCgjU67TgIDjwAIzLwAAFmdA8AABlM7gAABzSyA
Date: Fri, 01 Oct 2021 04:45:00 +0000
X-TSB-HOP: ON
Message-ID: <TYCPR01MB56787D963D23F78B0800C6CBE5AB9@TYCPR01MB5678.jpnprd01.prod.outlook.com>
References: <TYCPR01MB567859999FB3350D6A1C63E5E5A99@TYCPR01MB5678.jpnprd01.prod.outlook.com> <CAD9ie-sgjUv3fppvTZvPpOyUKXo1H1i9LtkOk2yxzZ1+A+wt6w@mail.gmail.com> <TYCPR01MB56784381BE6799ADAA46E360E5AB9@TYCPR01MB5678.jpnprd01.prod.outlook.com> <CAD9ie-tMp44z_b=hG+OWC=Hc83RpC_WZ4AaerRMaOZ8cfEkDSg@mail.gmail.com>
In-Reply-To: <CAD9ie-tMp44z_b=hG+OWC=Hc83RpC_WZ4AaerRMaOZ8cfEkDSg@mail.gmail.com>
Accept-Language: ja-JP, en-US
Content-Language: ja-JP
authentication-results: gmail.com; dkim=none (message not signed) header.d=none;gmail.com; dmarc=none action=none header.from=toshiba.co.jp;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: dd5bbea5-352d-4f7c-2c85-08d984963a36
x-ms-traffictypediagnostic: TYAPR01MB5337:
x-microsoft-antispam-prvs: <TYAPR01MB53373E22A2AD52890FCB4BE8E5AB9@TYAPR01MB5337.jpnprd01.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:5516;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: HEIgPY15saQr5nEdGJkQz27Da6ruiFMXvPE/H4wVtTRWQIPDxQsGENIVYtQxoR57Ue4SNMY7pLF2lawEZwboBSniieHGO/Ny1+rMvvvt5vfTGwdRdSkaHTaDNf/8HZTf0jwX8piB7sloPJJtgAxdBl8Q4pvcYbU0SIwCIikKVOJUqHDgw2kBQLhor4QnqBLAmEAuL1sh3dcE9QrOAT6qzHT1ahQFSjzPct3a4ebP1dEbBWj3A/nrrAhB6wR3Aa6DX/GJ2xuFAefpxPRtk7jKZSZfOmdQQZXc9KwOCX2wbIPAliko/14LhA8wjtcQhM50/xHcLbMqwTJvTfqXdlr4P/+Wfuc6o1gRR/mHTKH0/Uu3uSo7Q7Zivlv1uePcqKbNYWVtjZwrpeR/qcZCFBAfZhJ3qBuBsBvnwdbuheD0AW1kjEVeLeoOmXGoZC5SXWRctcWSIv3V7DDu0Vo7Xi7n+ScAxAhRjru5DTsJ+Ryfx0vftTsKmh4RBoJ2LB6hyRixACVzPUaAtbiMwTtAA6ODY1ER2eopnWP+80dp8Ig06J+04y+XJqkiajcCt4RJLsV6bEKxQFoI3+bl3lirOBXly9QC+SHCQ6sT2bo1cof6Y+wxjUZSd/Nw1puayQnaYyELZWcQLm+6vTICv63aBTtBiKWTOf0DZY3iDps+bMEctFFlij2l+DTsNonGtE5UPIyTrhqaJDIcoMuu6upRAqlEKg==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:TYCPR01MB5678.jpnprd01.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(366004)(38070700005)(7696005)(186003)(8936002)(86362001)(26005)(38100700002)(66446008)(64756008)(6506007)(316002)(4326008)(53546011)(508600001)(33656002)(5660300002)(83380400001)(8676002)(66946007)(66476007)(122000001)(9686003)(66556008)(55016002)(2906002)(71200400001)(6916009)(52536014)(76116006); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_TYCPR01MB56787D963D23F78B0800C6CBE5AB9TYCPR01MB5678jpnp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: TYCPR01MB5678.jpnprd01.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: dd5bbea5-352d-4f7c-2c85-08d984963a36
X-MS-Exchange-CrossTenant-originalarrivaltime: 01 Oct 2021 04:45:00.5777 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: f109924e-fb71-4ba0-b2cc-65dcdf6fbe4f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: OasvZuoKUjAa8h5tRn3Qro8GTzWkWgjpBTz1gLSQGYJtwAymNAVAPBU1QVwnOGrX+OGhO8ZtxapY1v2wxVBoaJmiMq+eZTxxlCI+h3z9Ii0=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: TYAPR01MB5337
MSSCP.TransferMailToMossAgent: 103
X-OriginatorOrg: toshiba.co.jp
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/-cTnMA58iO7L-p7dznB3LwwAwRA>
Subject: Re: [OAUTH-WG] self-issued access tokens
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Oct 2021 04:45:15 -0000

Thanks Dick,

Our use case is to connect IoT devices to a cloud service. The cloud service has
to authenticate those devices. The devices are not operated by humans. They run
on its own.

We want public key-based authentication for those devices. In that case, mutual
TLS is a popular option (e.g. AWS IoT Core). However, we don't want to use
mutual TLS for several reasons (e.g. it's too coupled with the transport layer).
So, we are seeking a solution that is more in application layer.


Toshio Ito

From: Dick Hardt <dick.hardt@gmail.com>
Sent: Friday, October 1, 2021 12:53 PM
To: ito toshio(伊藤 俊夫 ○RDC□IT研○CNL) <toshio9.ito@toshiba.co.jp>
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] self-issued access tokens

Would be useful to understand your use case and what you the goals and constraints are

On Thu, Sep 30, 2021 at 5:58 PM <toshio9.ito@toshiba.co.jp<mailto:toshio9.ito@toshiba.co.jp>> wrote:
Thanks Dick,

I agree. The scenario of self-issued access tokens doesn't really follow the
model of OAuth.

So, if we do standardize self-issued access tokens, maybe OAUTH WG is not the
right venue. Maybe HTTPBIS or HTTPAPI WGs?


Toshio Ito

From: Dick Hardt <dick.hardt@gmail.com<mailto:dick.hardt@gmail.com>>
Sent: Wednesday, September 29, 2021 3:06 PM
To: ito toshio(伊藤 俊夫 ○RDC□IT研○CNL) <toshio9.ito@toshiba.co.jp<mailto:toshio9.ito@toshiba.co.jp>>
Cc: oauth@ietf.org<mailto:oauth@ietf.org>
Subject: Re: [OAUTH-WG] self-issued access tokens

If the client is sending a self-signed JWT to the RS, you essentially are just authenticating directly to the RS. Not really OAuth as the RS has not delegated authorization authority to the AS.

If the client sends a self-signed JWT (a PAR) to the AS, and gets back an access token to present to the RS, you get centralized authorization decisions, a key feature of OAuth.