Re: [OAUTH-WG] draft-bertocci-oauth-access-token-jwt-00

George Fletcher <gffletch@aol.com> Mon, 01 April 2019 15:12 UTC

Return-Path: <gffletch@aol.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0EA78120273 for <oauth@ietfa.amsl.com>; Mon, 1 Apr 2019 08:12:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=aol.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BZQSU4MVLYSZ for <oauth@ietfa.amsl.com>; Mon, 1 Apr 2019 08:12:38 -0700 (PDT)
Received: from sonic308-2.consmr.mail.bf2.yahoo.com (sonic308-2.consmr.mail.bf2.yahoo.com [74.6.130.41]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D91C812025A for <oauth@ietf.org>; Mon, 1 Apr 2019 08:12:05 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=aol.com; s=a2048; t=1554131524; bh=QSKV8/yAbGDCHcIfb9k2NiimsstfwCpeCNvnMkio7PI=; h=Subject:To:References:From:Date:In-Reply-To:From:Subject; b=OoOQTqPQZ1mbk3GLhMBu/XNTybjYgATWPp1b+UlGx2KEeoDsO+MUeiDmVc3d7uVplyxm7u9XZMkLBPWe2TXFXIdccumlURuD+UA+0uFKqNkPh1gLRPPXZHSzjfDQAMGyUliUDLsaBtvcFbZ9Og2b8EvLvt68oj4ITEW9obCKo0L/aYuPHqQVrPcBV8+7rIYjCbBTZpVeDuQ8PcEv/zDPL3gFFel3d2Sj5nPPPG5Be1wWci7TMhoGBGf9I3EMlWAjrqp1y+4DPeFQ+Qeyo01pfJIfO/siMuEUVMqu78rHpid8SS6hApWKie74lfJYsWMGgqTPePYbzc5dlXTGSztCUQ==
X-YMail-OSG: zfHFtegVM1mdhKAYz2.O8nO2n.HRI6ORg.w3lbhoV0IsOFE0o4fP.wDJBBpiH0O rKfqhOF_Px7Q96k26z_2HR_c1SAKVVulJLBmy6qBGtHWGlH1abbBPcknUP1T6I9wB42VFfJKiHkm jQ2g0jQnqATfOLDRCbRYQeWp.hYwLXlWexrE9DJbKkZll.amaNMaQ1lLq56Krjx6kAGEr1r9JV6u Ur.hCF5153G8vjItwmxlEOs8YbivGKo0DLju8JU3pTIIvwYVDnV7_mdABuiJc7lFVcd9R4_QfudQ ukccEqxZh6u4auR22NYMs8vbUujO7iHoGlSNdCgrngP_Sf6xH6ahwL6xR4AR1KUarsFvdvbicB8s Zik0_s1G9D6tBDO.XjiTFuR94bA3ev73YVB0mH2psBxeadFb7eaSfu2_nXbh9TdsPIOfZkbwpupY DGXtSfwbUpo21SICnLvCc5VBTsywo.uk9cBng.nSpV7IZb9DHVhyemf5M.5U4nvOr3vUbeRvm4LG 8_N.96EbSW1am7GLVvUwYSmd98xNF9CDhpRevmhBk0EKDeI2C_SYaFu00IsLa7PpIYjBLebHO9Yf VIkdWDV22v8tddGqdazh0YiO4Qn2.Yb1omyc5ngtD_TzzMUyZVlF83zfDQaTb8AV2K3EBthUbAhK 1xliHkvg039jJvqktiLMjQ0rw5u2gvQL0mLtb70fubgf3onsVvgdL9zQ6qIJiG249iqHbQqm2Q8I R.6YsFcsV..laKRz9tc8H.6YMSkYMfZuU3EZuVTF2liKWHs9HbXJUPhSnZ29kmaTDIsf2vipg0qf IuQGE_hEzfwH.EyuLnZvMdbi3tdN5adsZahGIFKyhkpq3NM6rUvNCsE2KchyurjJHGDp2fgE48wO mvrOXCqtucMSorQq1eMGE5qT_hGcOWlJSLLLmRAHM4tJFzPSoKCTEhP.rsDaDTCpVuVy56QEEG0T oeGOnlqv_3.l1UBcgJ15k.U_Q1YGyR0Yf_ZMUO34Ygq1xvU2RZguidbXeDHcbEpOeK2HYrT4M.W1 DnmtpYRjdOWeVSOyC_xo9y93FEwSmU3XMuPdZIuCGC2weO4YM8WKcQUUDS1MfP2VL
Received: from sonic.gate.mail.ne1.yahoo.com by sonic308.consmr.mail.bf2.yahoo.com with HTTP; Mon, 1 Apr 2019 15:12:04 +0000
Received: from nat-wireless-users3.cfw-a-gci.net.dulles.office.oath (EHLO [172.130.136.180]) ([184.165.3.238]) by smtp405.mail.bf1.yahoo.com (Oath Hermes SMTP Server) with ESMTPA ID 98946fadc4f8d133735a28b394727279; Mon, 01 Apr 2019 15:12:02 +0000 (UTC)
To: Vittorio@auth0.com, IETF oauth WG <oauth@ietf.org>
References: <CAO_FVe6eWy3zppQAij7qxD+ycYL8ebqGJKG0y-A7GhN+0=kb4g@mail.gmail.com>
From: George Fletcher <gffletch@aol.com>
Organization: AOL LLC
Message-ID: <2a523e40-470b-4727-4e38-7a60552a285a@aol.com>
Date: Mon, 01 Apr 2019 11:12:00 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:60.0) Gecko/20100101 Thunderbird/60.5.3
MIME-Version: 1.0
In-Reply-To: <CAO_FVe6eWy3zppQAij7qxD+ycYL8ebqGJKG0y-A7GhN+0=kb4g@mail.gmail.com>
Content-Type: multipart/alternative; boundary="------------509EE0F3FFD7A96855C76C89"
Content-Language: en-US
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/FiWw9ZG5Ry0KYbgPimBm2yZvs0A>
Subject: Re: [OAUTH-WG] draft-bertocci-oauth-access-token-jwt-00
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 01 Apr 2019 15:12:42 -0000

Thanks for writing this up. One comment on auth_time...

    auth_time  OPTIONAL - as defined in section 2 of [OpenID.Core  <https://tools.ietf.org/html/draft-bertocci-oauth-access-token-jwt-00#ref-OpenID.Core>].
       Important: as this claim represents the time at which the end user
       authenticated, its value will remain the same for all the JWT
       access tokens issued within that session.  For example: all the
       JWT access tokens obtained with a given refresh token will all
       have the same value of auth_time, corresponding to the instant in
       which the user first authenticated to obtain the refresh token.

During a current session a user can be challenged for additional 
credentials or required to re-authenticate due to a number of different 
reasons. For example, OIDC prompt=login or max_age=NNN. In this context, 
I'd assume that the auth_time value should be updated to the latest time 
at which the user authenticated.

If we need a timestamp for when the "session" started, then there could 
be a session_start_time claim.

Thanks,
George

On 3/24/19 7:29 PM, Vittorio Bertocci wrote:
> Dear all,
> I just submitted a draft describing a JWT profile for OAuth 2.0 access 
> tokens. You can find it in 
> https://datatracker.ietf.org/doc/draft-bertocci-oauth-access-token-jwt/.
> I have a slot to discuss this tomorrow at IETF 104 (I'll be presenting 
> remotely). I look forward for your comments!
>
> Here's just a bit of backstory, in case you are interested in how this 
> doc came to be. The trajectory it followed is somewhat unusual.
>
>   * Despite OAuth2 not requiring any specific format for ATs, through
>     the years I have come across multiple proprietary solution using
>     JWT for their access token. The intent and scenarios addressed by
>     those solutions are mostly the same across vendors, but the syntax
>     and interpretations in the implementations are different enough to
>     prevent developers from reusing code and skills when moving from
>     product to product.
>   * I asked several individuals from key products and services to
>     share with me concrete examples of their JWT access tokens (THANK
>     YOU Dominick Baier (IdentityServer), Brian Campbell
>     (PingIdentity), Daniel Dobalian (Microsoft), Karl Guinness (Okta)
>     for the tokens and explanations!).
>     I studied and compared all those instances, identifying
>     commonalities and differences.
>   * I put together a presentation summarizing my findings and
>     suggesting a rough interoperable profile (slides:
>     https://sec.uni-stuttgart.de/_media/events/osw2019/slides/bertocci_-_a_jwt_profile_for_ats.pptx
>     <https://sec..uni-stuttgart.de/_media/events/osw2019/slides/bertocci_-_a_jwt_profile_for_ats.pptx>
>     ) - got early feedback from Filip Skokan on it. Thx Filip!
>   * The presentation was followed up by 1.5 hours of unconference
>     discussion, which was incredibly valuable to get tight-loop
>     feedback and incorporate new ideas. John Bradley, Brian Campbell
>     Vladimir Dzhuvinov, Torsten Lodderstedt, Nat Sakimura, Hannes
>     Tschofenig were all there and contributed generously to the
>     discussion. Thank you!!!
>     Note: if you were at OSW2019, participated in the discussion and
>     didn't get credited in the draft, my apologies: please send me a
>     note and I'll make things right at the next update.
>   * On my flight back I did my best to incorporate all the ideas and
>     feedback in a draft, which will be discussed at IETF104 tomorrow.
>     Rifaat, Hannes and above all Brian were all super helpful in
>     negotiating the mysterious syntax of the RFC format and submission
>     process.
>
> I was blown away by the availability, involvement and willingness to 
> invest time to get things right that everyone demonstrated in the 
> process. This is an amazing community.
> V.
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth