Re: [OAUTH-WG] Building on the protocol in the draft “OAuth 2.0 Token Exchange: An STS for the REST of Us” to include Authentication Tokens

John Bradley <ve7jtb@ve7jtb.com> Tue, 19 April 2016 18:06 UTC

Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 45F6A12EE1B for <oauth@ietfa.amsl.com>; Tue, 19 Apr 2016 11:06:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level:
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=ve7jtb-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AgphMX-c2pyb for <oauth@ietfa.amsl.com>; Tue, 19 Apr 2016 11:06:16 -0700 (PDT)
Received: from mail-qk0-x236.google.com (mail-qk0-x236.google.com [IPv6:2607:f8b0:400d:c09::236]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E26ED12EB79 for <oauth@ietf.org>; Tue, 19 Apr 2016 11:06:15 -0700 (PDT)
Received: by mail-qk0-x236.google.com with SMTP id r191so6281653qke.2 for <oauth@ietf.org>; Tue, 19 Apr 2016 11:06:15 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ve7jtb-com.20150623.gappssmtp.com; s=20150623; h=mime-version:subject:from:in-reply-to:date:cc:message-id:references :to; bh=/U/xBmyNe56UKeKx30/emiSwj0TvN5afpVheOSWF48A=; b=2IJ+P2ec5eM2y95oJfIrFZaIb4lbZamy/5nXLRWBKm1y8/5QaRDJKjiWp0llFEp0pS ZsunEY94Y4HJyQODG8/hXCol00EZKtnuu8Ms42xYIfwuijv6VJnVkCfe+geIUs8suAM2 mzQhst5f2jIm9jKKW3xgZrZrSU8eui4FrcI9N51AhkqmAHnKELz1zHQ7t/U4Gbnb2YLK 5PaC462qAvE28TG9/rbnYojKu/jcXTFGLfUiMo9W4w4BuoxWWAPiV5zX9FR7vNRFIYvD y2uVRtgFjKcqlOl6Oz8suQXOpQo/5pbA2BnO+kYgcM0lHyOo3I15fIMrkHwl9hPaCunS htAw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :message-id:references:to; bh=/U/xBmyNe56UKeKx30/emiSwj0TvN5afpVheOSWF48A=; b=gK+Lr7lteyPEMuDT92triXy7Muz0+7/0rVW88j4uEezy9blfim0w+gDrOfIvVG3IM4 u7SHnHd4/CU4XIkRLHMUgf1uF8UbVUA2+ux6JRkTBbUzXra/3H7DjOILGOiH2XKdfA3w 38T6vGf2c8UtmulExPH+N78xiOCOSDt8pGenBf/JG1Y1Eu+rCfnkzx96TOB0FPRIquPU niKXNhi1XXPCSmgTogM7f5aLxjWSedLg9hYDTLL0b3QQ+wBwqcD2Fs2QeRdZL8J1+46Z 3Dik78Dl1VZOtXltADcGu3RJ1JlX7f2+60ZwPkGSDIuxT/tJ9KA1kzntPtu3pYHkpQ8Y OGMw==
X-Gm-Message-State: AOPr4FV0Z8Xv2OjO6ki2Sl8ZrEaFrfI6UyhqL70bUKdFbcLStayyIZE71IEVgG08cxYfJA==
X-Received: by 10.55.204.197 with SMTP id n66mr5598507qkl.95.1461089174878; Tue, 19 Apr 2016 11:06:14 -0700 (PDT)
Received: from [192.168.8.100] ([181.202.40.4]) by smtp.gmail.com with ESMTPSA id p188sm9354888qke.1.2016.04.19.11.06.13 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Tue, 19 Apr 2016 11:06:14 -0700 (PDT)
Content-Type: multipart/alternative; boundary="Apple-Mail=_E4BFB470-169C-4D63-926A-7888AA003738"
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <FF8F219E-AB2E-48F5-AD90-DEA783343C1B@verisign.com>
Date: Tue, 19 Apr 2016 15:06:09 -0300
Message-Id: <A85A7E53-1AE2-4141-B6AF-FE3E19DEBA75@ve7jtb.com>
References: <FF8F219E-AB2E-48F5-AD90-DEA783343C1B@verisign.com>
To: "Fregly, Andrew" <afregly@verisign.com>
X-Mailer: Apple Mail (2.3124)
Archived-At: <http://mailarchive.ietf.org/arch/msg/oauth/6u-jK1oFsKBuJ7SkTXYKEke-2W4>
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Building on the protocol in the draft “OAuth 2.0 Token Exchange: An STS for the REST of Us” to include Authentication Tokens
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Apr 2016 18:06:18 -0000

Looking at OpenID Connect and it’s trust model for producing id_tokens that assert identity may help you.
http://openid.net/wg/connect/ <http://openid.net/wg/connect/>

Unfortunately I can’t quite make out what you are trying to do. 

It sort of sounds like you want an id_token from a idP and then have the client exchange that assertion for another token?

John B.
> On Apr 19, 2016, at 1:18 PM, Fregly, Andrew <afregly@verisign.com> wrote:
> 
> I have a use case where a client application needs to authenticate with a dynamically determined Identity Provider that is separate from the Authorization Service that will be used issue an access token to the client. The use case also requires that as part of authorization, the client provides to the Authorization Service an authentication token signed by an Identity Provider that the Authorization Service has a trust relationship with. The trust relationship is verifiable based on the Authorization Service having recorded the public keys or certificates of trusted Identity Providers in a trust store, this allowing the Authorization Service to verify an Identity Provider’s signature on an authentication token. <>
>  
> In looking at the various OAuth RFCs, particularly RFCs 7521, 7522, and 7523, I see that they get me close in terms of supporting the use case. What is missing is a means for solving the following problem. These RFCs require that the Identity Provider put an Audience claim in the authentication token. The problem with this is that I do not see in the RFCs how the Identity Provider can be told who the Audience is to put into the authentication token. This leads me to the title of this message. The draft “OAuth 2.0 Token Exchange: An STS for the REST of Us” defines a mechanism for identifying the Audience for an STS to put into a token it generates. That would solve my problem except that the draft limits the type of STS to being Authorization Servers. What is needed is this same capability for interacting with an Identity Provider. This would enable RFCs 7521, 7522 and 7523 to be useful in situation where the Identity Provider needs to be told the identity of the Authorization Service.
>  
> I am new to interacting with the IETF. I also am not an expert on the RFCs or prior history of the OAuth group relative to this topic, so please point me to any existing solution if this is a solved problem. Otherwise, I would like to get feedback on my suggestion.
>  
> Thanks You,
> 
> Andrew Fregly
> Verisign Inc.
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org <mailto:OAuth@ietf.org>
> https://www.ietf.org/mailman/listinfo/oauth <https://www.ietf.org/mailman/listinfo/oauth>