Re: [OAUTH-WG] WGLC for Step-up Authentication

Vittorio Bertocci <vittorio@auth0.com> Mon, 10 October 2022 19:21 UTC

Return-Path: <vittorio.bertocci@okta.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3F3F7C15257C for <oauth@ietfa.amsl.com>; Mon, 10 Oct 2022 12:21:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.455
X-Spam-Level:
X-Spam-Status: No, score=-2.455 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.249, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=okta.com header.b=WK1coGLF; dkim=pass (2048-bit key) header.d=auth0.com header.b=Qszc2b3w
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sk-09mEXNpCQ for <oauth@ietfa.amsl.com>; Mon, 10 Oct 2022 12:21:43 -0700 (PDT)
Received: from mx0b-00553301.pphosted.com (mx0b-00553301.pphosted.com [205.220.176.21]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4AEA1C14F6E7 for <oauth@ietf.org>; Mon, 10 Oct 2022 12:21:43 -0700 (PDT)
Received: from pps.filterd (m0209341.ppops.net [127.0.0.1]) by mx0b-00553301.pphosted.com (8.17.1.5/8.17.1.5) with ESMTP id 29AHrtMq027958 for <oauth@ietf.org>; Mon, 10 Oct 2022 12:21:42 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=okta.com; h=mime-version : references : in-reply-to : from : date : message-id : subject : to : cc : content-type; s=proofpoint-2020; bh=mov6Ax8ErUhlA9yhTLdxwKBg070WYzWTqZkjSWd3MzI=; b=WK1coGLF6EPhCRgs70/8IpfqmXDJ0g1mHqLmCA0gcoKKM6gv3eAFVSwhxnoJrNescCnH 9Pn0wTYkHL9z5riOXQx6dKGJa5Mo073eP1+c9SB7QQoic9GmyHI1spip6Fee0Gd1zIEz qqMNlrdWx5Ru+jPMjzdql5m2dDs5k0q+SoQfuGBocfTMROpfmRgjToWqzOnzeCX4YE+2 tVxPmKQ40mmbak3LzPF1Nmm3qmiMlz8FrEMwd8GPYOMAxhqPDTuxoazJZVdJSZ9Tf+wB 0+bFP5FkcAxGOCbfd07820M+j0nkmgPj29kw4+OGXDTR8/e9bC27/PUUzMZ4wbnwtfYW Pg==
Received: from mail-oa1-f70.google.com (mail-oa1-f70.google.com [209.85.160.70]) by mx0b-00553301.pphosted.com (PPS) with ESMTPS id 3k382etva1-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NOT) for <oauth@ietf.org>; Mon, 10 Oct 2022 12:21:42 -0700
Received: by mail-oa1-f70.google.com with SMTP id 586e51a60fabf-132ac95c2abso5714759fac.23 for <oauth@ietf.org>; Mon, 10 Oct 2022 12:21:41 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=auth0.com; s=newauth0; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=mov6Ax8ErUhlA9yhTLdxwKBg070WYzWTqZkjSWd3MzI=; b=Qszc2b3wRNa+oIYpkC3Bd4t3pnq35ubKvaUKAkQUmEegZIxk4fMzgEHCN3ow4sSVes ucpkoaUS+hAYWYzYtMeBtMBO4wf7C5uPthBf1qUrkYkZXVfZQZzzit/C4yh3NnVMhhNB FG0wayYba56iTRGF1sd0JHVEQrDYDD1Qv0Zl2cFPaiCan0Hj1pA8yVEas9LLp2c32zAF kLIl9z1exVDMQyV76wukhedxVeHiOj+cEouwIttrAOLbwTBjv+jaukk6neoAMycPg0WD 4QYtg43MWtOT5KFDJaFHPl0TPqa2E060oP8WZ2ec8S9OqSTRNjclArd0v4gbr8T9Y6n1 AsRg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=mov6Ax8ErUhlA9yhTLdxwKBg070WYzWTqZkjSWd3MzI=; b=dAtCyWL1OQ41TO5kL9azaVlmHB1st2u1utMZDNucDST+e1MQ0k8AG+X3eAZntrkLuk ERvhCiZNMUeb8MTdXHZSzuoTyuLfwMQEajCzeL6tjWdeqyoWLQjHzkLJFx/+MQr07D1I jefpQqBDTV0MnSKSU12jj3xrdPZ1tduiSWjAnyLq5HsV50OMZ2Ukcdc1Mn38LKUDFd8m vOcUfwYl9jydAITbOa6m6prqwJNOrd9gv82/+cB2gKPU8BsHmgXPXEVSeKy+ceR+BYht ES/9obNfkNioeSjMa2j9oHXjDly95o0qeR2YQ5tM/UB6it1kNDnmG5/eAqRsGhghoZFP 8IUA==
X-Gm-Message-State: ACrzQf1Wg3fUUdBjUvqdFa4b3SWC+aUacfN0BQthTsee/1mCGKTuXx8I qMGbCaGVUQaHJq2RXUvGwUFrXbGsTYlZNodfCvD8o/9H4czUNwS3N3oJHz7zGmjPtMAFnn+k+yY S/F4mGVVS+/uGyZs0htmb
X-Received: by 2002:a05:6871:590:b0:132:7a26:19a1 with SMTP id u16-20020a056871059000b001327a2619a1mr15956813oan.213.1665429700806; Mon, 10 Oct 2022 12:21:40 -0700 (PDT)
X-Google-Smtp-Source: AMsMyM5Y7xA0vhrJPOwSokurOXZ3Ppyf1tn5oAJ0DickG4mH1NXdLRlHUv3Ba1ym3z8JQeRuQdvdLp08vuZ7sSeVceU=
X-Received: by 2002:a05:6871:590:b0:132:7a26:19a1 with SMTP id u16-20020a056871059000b001327a2619a1mr15956798oan.213.1665429700319; Mon, 10 Oct 2022 12:21:40 -0700 (PDT)
MIME-Version: 1.0
References: <CADNypP9ypW35=CSJaOfaEqZGDLXGLjnMs4_x5Ue10-yP6BcVoQ@mail.gmail.com> <CADNypP95pWPndeBydEbThrrWrPCVDg2Jmor-68HFGHpqRqFtyA@mail.gmail.com> <DBAPR83MB04227E5BB028F94FD337032A915F9@DBAPR83MB0422.EURPRD83.prod.outlook.com> <CAEMK1uaBedVBcoBuf9NY53sa2MRKh2j5gXrnW65PCiGj6Rzu7g@mail.gmail.com>
In-Reply-To: <CAEMK1uaBedVBcoBuf9NY53sa2MRKh2j5gXrnW65PCiGj6Rzu7g@mail.gmail.com>
From: Vittorio Bertocci <vittorio@auth0.com>
Date: Mon, 10 Oct 2022 12:21:29 -0700
Message-ID: <CAEFJvaoHyDoj3mbKhSqZmwCjE-iNNk0ZF1V6X_b35SDbp9iXjQ@mail.gmail.com>
To: Dima Postnikov <dima@postnikov.net>
Cc: Pieter Kasselman <pieter.kasselman=40microsoft.com@dmarc.ietf.org>, oauth <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000afaefa05eab3115b"
X-Gmail-Okta-Auth: Authenticated
X-Gm-Spam: 0
X-Gm-Phishy: 0
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.895,Hydra:6.0.528,FMLib:17.11.122.1 definitions=2022-10-10_12,2022-10-10_02,2022-06-22_01
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/HbZyohdhkO6LTxXBys4HD7aFiIM>
Subject: Re: [OAUTH-WG] WGLC for Step-up Authentication
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 Oct 2022 19:21:47 -0000

Thanks Dima for the comment. Some thoughts:

> (editorial)...
Good point. "statically" would characterize the simplest of the scenarios,
but in fact any case where the AS is the only arbiter of the authn level
works for the point we are trying to make. We'll drop "statically". Thanks!

> Apart from...
This spec focuses on empowering an RS to communicate its ACR and freshness
requirements, regardless of the reasons leading the RS to make that
determination: the logic by which that happens is explicitly out of scope,
and in many real life cases it might simply be unknowable (eg anomaly
detection engines based on ML are often back boxes). The mechanism
described here can be used alongside other mechanisms that might require
the client to get the user to interact with the AS, as it is the case for
insufficient_scope, but those remain distinct cases (eg insufficient _scope
might not require any step up but simply explicit user consent, and if it
does require a stepup, that's entirely determined by the AS without any
communication with client or RS required).

On Fri, Oct 7, 2022 at 17:43 Dima Postnikov <dima@postnikov.net> wrote:

> *This message originated outside your organization.*
>
> ------------------------------
>
> Couple of quick comments from me:
>
> 1) (Editorial) >In simple API authorization scenarios, an authorization
> server will statically determine what authentication technique
>
> In many scenarios, authorization servers will use *dynamic* decisioning
> to determine authentication techniques; it's just not exposed to the
> client in a way to make it actionable (which is why this specification's
> intent makes perfect sense).
>
> 2) Apart from authentication level, there might be other reasons why users
> might be forced to go through the authorization flow, for example,
> insufficient authorization / scopes / claims / etc.
>
> If there is a mechanism to let the client know, as a practitioner, i'd
> rather have the same approach for both authentication and authorization.
> There are a range of authorization policy engines in the market that could
> return "STEP UP is required" after looking at authentication, authorisation
> and many other real-time signals. It's just not standardized...
>
>
> On Sat, Oct 8, 2022 at 7:30 AM Pieter Kasselman <pieter.kasselman=
> 40microsoft.com@dmarc.ietf.org> wrote:
>
>> I am very supportive of this work and have been working through different
>> use cases to see whether it can satisfy the requirements that arise from
>> them.
>>
>>
>>
>> One observation from working through these uses cases is that as
>> customers move to Zero Trust architectures, we are seeing customers
>> adopting finer grained policy segmentation. Consequently customers are
>> planning to deploy segmented access control by data or action sensitivity,
>> within a service. This approach to policy design makes it more common for a
>> single service to depend on multiple authentication context values or
>> combinations of authentication context values.
>>
>>
>>
>> An example of this is a policy that has multiple acr values (e.g.
>> acr1=password, acr2=FIDO, acr3=selfie check, acr4=trusted network). A
>> customer may define a policy that requires different combinations of these
>> acr values, for example, a file server may requires password for general
>> access (e.g. acr1), FIDO authentication (acr2) or password access and being
>> on a trusted network to read sensitive data (acr 2 of (acr1 + acr 4), FIDO
>> authentication and password (acr1 + acr2) for accessing editing sensitive
>> documents and a real-time selfie check on top of FIDO and presence on a
>> trusted network  (acr1 + acr2 + acr3 + acr4) to initiate a sensitive
>> workflow (e.g. check-in code). Other variations of this includes database
>> access with different types of access requirement for certain rows
>> (row-level permissions) or columns (column level permissions) with
>> different combinations of acr values.
>>
>>
>>
>> I was curious if this type of scenario where multiple authentication
>> contexts and combinations of contexts are required is something others see
>> (or are beginning to see) as well?
>>
>>
>>
>> Cheers
>>
>>
>>
>> Pieter
>>
>>
>>
>> *From:* OAuth <oauth-bounces@ietf.org> *On Behalf Of *Rifaat Shekh-Yusef
>> *Sent:* Thursday, September 22, 2022 3:02 PM
>> *To:* oauth <oauth@ietf.org>
>> *Subject:* Re: [OAUTH-WG] WGLC for Step-up Authentication
>>
>>
>>
>> *Correction:*
>>
>>
>>
>> Please, review the document and provide your feedback on the mailing list
>> by *Oct 7th, 2022*.
>>
>>
>>
>> On Thu, Sep 22, 2022 at 9:52 AM Rifaat Shekh-Yusef <
>> rifaat.s.ietf@gmail.com> wrote:
>>
>> All,
>>
>>
>>
>> This is to start a *WG Last Call *for the *Step-up Authentication *
>> document:
>>
>> https://www.ietf.org/archive/id/draft-ietf-oauth-step-up-authn-challenge-03.html
>> <https://urldefense.com/v3/__https://nam06.safelinks.protection.outlook.com/?url=https*3A*2F*2Fwww.ietf.org*2Farchive*2Fid*2Fdraft-ietf-oauth-step-up-authn-challenge-03.html&data=05*7C01*7Cpieter.kasselman*40microsoft.com*7C0078f809101147bc978308da9ca32020*7C72f988bf86f141af91ab2d7cd011db47*7C1*7C0*7C637994521713812011*7CUnknown*7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0*3D*7C3000*7C*7C*7C&sdata=18sfemyWqYb06PvUA9eTLaq0ccDY14*2F6ETo58JpE*2FJQ*3D&reserved=0__;JSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUl!!PwKahg!537tJQfGj3Z_Yi2waywl1VPGyDs9818JE-M-KNFgPtoB0O26a7ksRvAYrPyzfKKXsMKCVblAomtRXj8$>
>>
>>
>> Please, review the document and provide your feedback on the mailing list
>> by *Sep 30th, 2022*.
>>
>> Regards,
>>  Rifaat & Hannes
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>> <https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/oauth__;!!PwKahg!537tJQfGj3Z_Yi2waywl1VPGyDs9818JE-M-KNFgPtoB0O26a7ksRvAYrPyzfKKXsMKCVblAbcE1GME$>
>>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>