[OAUTH-WG] Re: OAuth Digest, Vol 208, Issue 19
Atul Tulshibagwale <atul@sgnl.ai> Tue, 10 February 2026 01:21 UTC
Return-Path: <atul@sgnl.ai>
X-Original-To: oauth@mail2.ietf.org
Delivered-To: oauth@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id A46FAB46E4F7 for <oauth@mail2.ietf.org>; Mon, 9 Feb 2026 17:21:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=sgnl.ai
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gm3gq1z-YBQ9 for <oauth@mail2.ietf.org>; Mon, 9 Feb 2026 17:21:05 -0800 (PST)
Received: from mail-pg1-x534.google.com (mail-pg1-x534.google.com [IPv6:2607:f8b0:4864:20::534]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 14778B46E0E2 for <oauth@ietf.org>; Mon, 9 Feb 2026 17:20:47 -0800 (PST)
Received: by mail-pg1-x534.google.com with SMTP id 41be03b00d2f7-c0c24d0f4ceso1239465a12.1 for <oauth@ietf.org>; Mon, 09 Feb 2026 17:20:47 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; t=1770686441; cv=none; d=google.com; s=arc-20240605; b=fMDnLHwYtwaweNOrDLwU4Vw9RYgyACzFe2IWI8deqqAbBVTqnqE0li2kjosxL0lGFt rZFsxd/DidQpysORJ5QhOrzEDdAaSzkNUC+Acbhs/Nim1ZlMseEEcYLyyVgCKRpChzUJ TkBLV0cuoWbMToNwbzqYGe4gReQir7MNuIDsEwlU7ftGybNfqu0+rw4R9gLBUVv6htDn E9h9KAWBEcE0T35YKhMGBsGA8M+KpwKPK7cof5vfSvmhO+cuKRgPx+7tVqkxiOdbA/62 O1LU5V6gj4u8M8e+9Ekz9Xu5ToySKxOfG4rrYWWiQ3FVl4H+nmOzO/qcgZdvTxVi+nGj viCg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20240605; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:dkim-signature; bh=xbrvpKjVv1TBYa0vCW/8YsXdRw4ePNsLXa+2wZP7Juk=; fh=RfGhfxHTlvzANrSBdIuUtBnb/VgHTn1ayEiXaFqWpcA=; b=GgGU8uqhYcPBwVOJs6qkXSKUvvQbyhKHuo194TYh0JMNEEvARlAwn1s/KaIrRTbNE1 uFz66J1ulUmdeE0AmTRcDBovUIl6AVjjK9sbRKLkVcRY5Xg6SxXk5BQb24Y/A8VvWBkG YXnxHwuLw67S+JUSz3Fxfzb4DEzyhkD0uo3klosI2Jl4McwFEyDghmnMYp8+tv9D7PK7 0loLHSMUIrHsmoaWHvDmrPb+I2xuedf8AhYINrZiRt33lN8WJHgfR0QRfqM8l12kDDdu sp2WuJ/qhDHIb175uT/jj+aDZCCPjCsWGEr8FoNgn2Z7jS90PLY8xE426QENii31WPz5 itnQ==; darn=ietf.org
ARC-Authentication-Results: i=1; mx.google.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sgnl.ai; s=google; t=1770686441; x=1771291241; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=xbrvpKjVv1TBYa0vCW/8YsXdRw4ePNsLXa+2wZP7Juk=; b=IJJ/6/lIoOra7A8isO172X9C3PkINnDjsSS+PGIjbEJJYPX9hmqKaLl8kjarQIq/Wm HL4DXw0I59n2HB69dItfdv6czCcUiQ4Vw0tWDCaquiMcgbgUNi/Gb48HweaQ8o+hoFpN sP/XgitM5RGUezxODh+aLOsZ0FXEiYqjvE4yL58iISowyX29tuoON7iE7SbtdpKR5z6l KvW+vv+RFr4NoTUeDM/npRBO2uQFrfRqEaW590ED1q+yUTyhW8IR+yJzNPkPkU9SXW8w 0G9rzXY22BoP2HlHvZKCtbk40++o+uA4qLAAYuJchbmkUU0FluYr5Nh7Ft3dgWVKACp6 9ncw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1770686441; x=1771291241; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-gg:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=xbrvpKjVv1TBYa0vCW/8YsXdRw4ePNsLXa+2wZP7Juk=; b=mCoyjIAm6lDsRKyhUdS1FochjrjsYqU81vojMTNzYGHKQBnJcX/260Z9RbAkpWNO4A SGT+alH0CiqLWWPakx+5HAfRhCC1hzM2uAcaEk/6PKFBpzlFf1BpQH65D0eT5aUkccTG yjJ9/ieywnvkX8QJ0/4kKuNcpPcudoZnjz2djo+FSSR1oteWDSzXVKypbXhs7JuqYBnT /wLJUu+9Pf7jo8ZBKzUel1c5om3KyYUGKbyEsUHeorVP67YOviCYP4nfwQ5Ra0lE+vwk yGstwvONNsUHi97MsId/L2S6hs5ekfIyoFabcog7aPmMMZzhrI2hHKHG4u8aYG3+iTlW FQqA==
X-Forwarded-Encrypted: i=1; AJvYcCVfaVq50eUefMZamV7z+q34xCzYdD7QT7JT4XhnguxIB5US+j2K6rjw8EWntGBkzOuF+nseXA==@ietf.org
X-Gm-Message-State: AOJu0YyxxmgXDv6/07jO1fgJsuJfLr/dakCy0QtBUYxVrxq8q9+mDPb0 RO2++Dx/FkrfKBkCDz9JrH8mA0miaaeEqyF3qfrM1UUUJq4o12tFNrDlhAYfwodtAraZ2/nmdU/ bPszL6hVcy+m2iQHDnxUtwNnXnpJ7Ct6q8rkRjwjVHA==
X-Gm-Gg: AZuq6aL6GmceKlBL70GwqyaedxXfdDEdfyx8CaRnvUxvuvKahgLULSAmRoL/8FXw2I8 8kqI9H+Uop5cfUH+AXuVfRiUPk3d3M4x481igkfnmt89XOERR1lAOIROESe8dphTS4rofkCbTUH ir60Sg/LeJr8HHp3NlMsl1/cpSJUqw2lQ5Gn60W60u91CtWa4Te/TRrI1hbcqaZm0PnnPxwucld rJOl7Ov1GVorl5nXy/tCID69zVg1x/ofIa9FNwcEU3jBIU5SLjHto3sbtwtkPOnYtmVWVhmZ39a Zzt3r2CXOAGBhu6spPZKun3a/qWFgg3GbrW2d7s=
X-Received: by 2002:a05:6a20:d0a1:b0:364:783:8c0f with SMTP id adf61e73a8af0-393ad016a95mr12863119637.33.1770686440908; Mon, 09 Feb 2026 17:20:40 -0800 (PST)
MIME-Version: 1.0
References: <177064881569.2608.14701868528558862560@mail2.ietf.org> <CADo7KwaUWahs-0gO9-D=LHnzWZk08NOkU-Zaiq8T2-uoQFFPSQ@mail.gmail.com> <CAPVrLW2X2HNUZt3qV6u71Ns3sf3Z5OoBKQLV93fqGk3pXGrWdg@mail.gmail.com> <CADo7KwZgi59gS_V_S_BuiCrvYO3b7dhdy+M19kF88j6auBNp2A@mail.gmail.com>
In-Reply-To: <CADo7KwZgi59gS_V_S_BuiCrvYO3b7dhdy+M19kF88j6auBNp2A@mail.gmail.com>
From: Atul Tulshibagwale <atul@sgnl.ai>
Date: Mon, 09 Feb 2026 17:20:25 -0800
X-Gm-Features: AZwV_QipRhj35R7PqGKLT8v6GCbjW9qF33tjgtaQn_mjpamsGiPD9w71Vzf4bqU
Message-ID: <CANtBS9eiinWqXEodEnBDzVg7pnjt9V1KTWe8fc1PpteFxHL9vQ@mail.gmail.com>
To: Chris Keogh <christopher.keogh@gmail.com>
Content-Type: multipart/alternative; boundary="00000000000051b8bb064a6e10f7"
Message-ID-Hash: OP7K4FXPBKY6DKQURNNCLJFHXC7SFJJD
X-Message-ID-Hash: OP7K4FXPBKY6DKQURNNCLJFHXC7SFJJD
X-MailFrom: atul@sgnl.ai
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-oauth.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Karl McGuinness <me@karlmcguinness.com>, oauth@ietf.org
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [OAUTH-WG] Re: OAuth Digest, Vol 208, Issue 19
List-Id: OAUTH WG <oauth.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/_X1rTSOEQnCsSeCG-X06XfEUTsQ>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Owner: <mailto:oauth-owner@ietf.org>
List-Post: <mailto:oauth@ietf.org>
List-Subscribe: <mailto:oauth-join@ietf.org>
List-Unsubscribe: <mailto:oauth-leave@ietf.org>
Hi Chris, I want to understand your thoughts a bit better. It would really help to see a Mermaid diagram of it. You can create one here: https://mermaid.live Thanks, Atul On Mon, Feb 9, 2026 at 4:49 PM Chris Keogh <christopher.keogh@gmail.com> wrote: > No worries Karl, I thought as much but thought I'd pipe up anyway. > > Thanks 🙏🏼 > > On Tue, 10 Feb 2026 at 13:21, Karl McGuinness <me@karlmcguinness.com> > wrote: > >> @Chris, I think this topic might be more relevant to the OpenID Connect >> A/B working group (https://openid.net/wg/connect/) as it appears to be a >> SSO use case. The OpenID Native SSO spec ( >> https://openid.net/specs/openid-connect-native-sso-1_0.html) supports 1 >> type of flow and vendors such as Okta support Mobile to Web SSO >> https://developer.okta.com/docs/guides/native-to-web-sso/main/ using >> proprietary mechanism. There are a lot of security considerations/caveats >> with this type of flow that would be best answered in the OIDC WG. >> >> -Karl >> >> On Mon, Feb 9, 2026 at 1:17 PM Chris Keogh <christopher.keogh@gmail.com> >> wrote: >> >>> Hi there all, >>> >>> I'm dealing with a similar scenario that Tarun is highlighting and >>> thought I'd chime in to make it more concrete. >>> >>> We have a mobile application and a web application that both use the >>> same IdP/AS. The mobile client (public+PKCE) uses long lived refresh tokens >>> and only requires the user to log in once (via the system browser) to >>> retrieve the access/refresh token combination. From this point on the user >>> is considered signed in to the mobile application, but the session at the >>> IdP will quickly expire (and the session/auth cookie in the system browser >>> with it). >>> >>> We'd like to be able to embed web views within the mobile application >>> that are hosted by our web app without the user having to sign in again. >>> >>> I've been thinking about using something along the lines of Identity >>> chaining or JWT authorization (with DPoP) to retrieve one time use short >>> lived access tokens that can be used by the mobile client to query an >>> endpoint which signs the user in and returns the contents of the IdP >>> session cookies to the mobile application, which then injects the cookies >>> into an embedded browser (not the system browser) which then loads the web >>> view which goes through the standard auth code flow. >>> >>> As Tarun points out, it feels like there's a gap in the standards where >>> this kind of thing isn't really addressed. Potentially it's more of an OIDC >>> problem? >>> >>> >>> On Tue, 10 Feb 2026 at 03:54, <oauth-request@ietf.org> wrote: >>> >>>> Send OAuth mailing list submissions to >>>> oauth@ietf.org >>>> >>>> To subscribe or unsubscribe via email, send a message with subject or >>>> body 'help' to >>>> oauth-request@ietf.org >>>> >>>> You can reach the person managing the list at >>>> oauth-owner@ietf.org >>>> >>>> When replying, please edit your Subject line so it is more specific >>>> than "Re: Contents of OAuth digest..." >>>> >>>> Today's Topics: >>>> >>>> 1. Re: Feedback on ID-JAG same IdP prohibition - Application to >>>> Application Delegation >>>> (Pieter Kasselman) >>>> >>>> >>>> ---------------------------------------------------------------------- >>>> >>>> Message: 1 >>>> Date: Mon, 9 Feb 2026 14:53:14 +0000 >>>> From: Pieter Kasselman <pieter@defakto.security> >>>> Subject: [OAUTH-WG] Re: Feedback on ID-JAG same IdP prohibition - >>>> Application to Application Delegation >>>> To: Tarun Nanduri <tarunnanduri7@gmail.com> >>>> Cc: Brian Campbell <bcampbell=40pingidentity.com@dmarc.ietf.org>, >>>> oauth@ietf.org >>>> Message-ID: >>>> < >>>> CALtWOA1KWhq8diBTA9J52GcGqHNHQgEL+oWfJY9SJL_DPiqf0g@mail.gmail.com> >>>> Content-Type: multipart/alternative; >>>> boundary="0000000000000d50df064a654dc1" >>>> >>>> Hi Tarun, for the original use case you described, you may want to >>>> consider >>>> the transaction token spec [1]. >>>> >>>> It was specifically developed to allow authorization context, including >>>> user and workload/microservice identity information, to be passed >>>> between >>>> microservices within a domain, without having to pass around access >>>> tokens. >>>> >>>> Cheers >>>> >>>> Pieter >>>> >>>> [1] >>>> https://datatracker.ietf.org/doc/draft-ietf-oauth-transaction-tokens/07/ >>>> >>>> On Sun, Feb 8, 2026 at 8:02 AM Tarun Nanduri <tarunnanduri7@gmail.com> >>>> wrote: >>>> >>>> > Hi Pieter, Brian, Aaron, and the WG, >>>> > >>>> > Thanks for the feedback and for taking the time to look at this. I’ve >>>> been >>>> > thinking over the points about Section 8.3 and the general intent of >>>> ID-JAG. >>>> > >>>> > Stepping back from the specific spec for a second, it feels to me >>>> like we >>>> > have a bit of a gap in the OAuth/OIDC specifications. We’re >>>> essentially >>>> > looking for a standard way to do Directed Session Transfer, in >>>> environments >>>> > where shared cookies/SSO just aren't an option for security reasons. >>>> > >>>> > You pointed toward the Identity Chaining Across Domains draft as the >>>> > intended home for this, and I see the logic—since the AS in Domain A >>>> > generates the JWT grant, it handles the "identity proof" part of the >>>> > handover. >>>> > >>>> > But right now, if I want to move a user from App A to App B without a >>>> > fresh login, the options still feel a bit thin: >>>> > >>>> > - Standard SSO is off the table because of the "no-shared-cookie" >>>> > constraint. >>>> > - RFC 8693 is a great building block, but it’s mostly used for >>>> > service-to-service backend swaps. There isn't really a >>>> front-channel >>>> > "profile" for this (as RFC863 sends back a usable token rather >>>> than an >>>> > assertion). >>>> > - Identity Chaining, as Brian mentioned, is explicitly a >>>> specification >>>> > for cross-domain use. >>>> > >>>> > >>>> > It feels a bit ironic that the protocol makes "Cross-Domain" identity >>>> > transfers standardized via ID-JAG (as an OAuth native grant), but >>>> leaves >>>> > "Intra-Domain" delegation as a "roll-your-own" exercise. Without a >>>> standard >>>> > profile for this, people might just end up building non-standard hacks >>>> > which is exactly what we’re trying to avoid. >>>> > >>>> > I’m not trying to force a change to ID-JAG if the WG feels it’s the >>>> wrong >>>> > home, but I am curious: >>>> > >>>> > - Do we think this "Directed Session transfer" pattern is a gap >>>> worth >>>> > filling? >>>> > >>>> > It feels to me like there should be an "OAuth-native" way to do this >>>> that >>>> > has the right guardrails (audience binding, act claims, etc.) to make >>>> it >>>> > secure in a Zero Trust setup, but is as straightforward to implement >>>> as a >>>> > basic Auth Code grant. I’d love to hear if anyone else sees this gap, >>>> or if >>>> > there's a pattern I’m missing that doesn't involve a lot of custom >>>> "glue" >>>> > code. >>>> > >>>> > Best Regards, >>>> > Tarun Nanduri. >>>> > >>>> > On Thu, Feb 5, 2026 at 6:14 PM Pieter Kasselman >>>> <pieter@defakto.security> >>>> > wrote: >>>> > >>>> >> Hi Tarun >>>> >> >>>> >> I agree with Brain and Aaron that your use case can likely be >>>> addressed >>>> >> by the Identity and Authorization Chaining Across Domains draft [1]. >>>> You >>>> >> could always profile it further if needed. Is there a reason you >>>> would not >>>> >> be able to use that draft? >>>> >> >>>> >> Cheers >>>> >> >>>> >> Pieter >>>> >> >>>> >> [1] >>>> https://datatracker.ietf.org/doc/draft-ietf-oauth-identity-chaining/ >>>> >> >>>> >> On Wed, Feb 4, 2026 at 9:31 PM Brian Campbell <bcampbell= >>>> >> 40pingidentity.com@dmarc.ietf.org> wrote: >>>> >> >>>> >>> Hi Tarun, >>>> >>> >>>> >>> As Aaron mentioned there are less tightly profiled variations of >>>> this >>>> >>> general flow, like oauth-identity-chaining >>>> >>> < >>>> https://datatracker.ietf.org/doc/draft-ietf-oauth-identity-chaining/> >>>> >>> or rfc8693 <https://datatracker.ietf.org/doc/html/rfc8693> + >>>> rfc7523 >>>> >>> <https://datatracker.ietf.org/doc/html/rfc7523> together directly, >>>> that >>>> >>> don't have the same constraint regarding the IDP not issuing access >>>> tokens >>>> >>> in response to an ID-JAG it issued itself. Perhaps that might meet >>>> your >>>> >>> needs? Although those are intended for cross domain as well. >>>> Honestly, much >>>> >>> of this seems like more than is needed for a same idp / same domain >>>> case. >>>> >>> >>>> >>> On Tue, Feb 3, 2026 at 8:13 PM Tarun Nanduri < >>>> tarunnanduri7@gmail.com> >>>> >>> wrote: >>>> >>> >>>> >>>> Dear Aaron, >>>> >>>> >>>> >>>> I am awaiting your feedback on this. To summarize, >>>> >>>> >>>> >>>> When an Identity Provider (IdP) does not support Single Sign-On >>>> (SSO) >>>> >>>> due to the nature of the systems involved, and a user needs to >>>> transfer >>>> >>>> their session to another application without re-logging in, I feel >>>> ID-JAG >>>> >>>> offers a secure and seamless solution, providing a smooth user >>>> experience. >>>> >>>> >>>> >>>> The RFC, as stated in previous emails, explicitly prohibits using >>>> the >>>> >>>> specification within the same IdP. Considering the zero-trust model >>>> >>>> typically applied within the same IdP, are we open to modifying the >>>> >>>> specification to allow its implementation within such environments? >>>> >>>> >>>> >>>> Best Regards, >>>> >>>> Tarun Nanduri. >>>> >>>> >>>> >>>> On Fri, Dec 5, 2025 at 8:46 AM Tarun Nanduri < >>>> tarunnanduri7@gmail.com> >>>> >>>> wrote: >>>> >>>> >>>> >>>>> Hi Aaron, >>>> >>>>> >>>> >>>>> Thanks for the response, and pointing me to the Identity Chaining >>>> >>>>> draft. However, after looking at it, I don't think it applies to >>>> the >>>> >>>>> use-case I shared above (please feel free to correct here). It >>>> looks like >>>> >>>>> it's designed for cross-domain scenarios* whereas the use-case I >>>> >>>>> shared above has*, >>>> >>>>> >>>> >>>>> - Both the clients are in same trust domain >>>> >>>>> - We have single authorization server (it's the IdP too) >>>> >>>>> >>>> >>>>> The challenge we are trying to solve is, >>>> >>>>> >>>> >>>>> - Client A needs to transfer user session to client B >>>> >>>>> - WITHOUT Client A sharing its access token with client B >>>> >>>>> (security risk due to token exposure, invalid audience, >>>> unnecessary >>>> >>>>> privileges etc.) >>>> >>>>> - Both clients trust the same IdP >>>> >>>>> >>>> >>>>> This is why we're intending to use RFC8693, but it still requires >>>> >>>>> client A to send access token (after token exchange) to client B >>>> which >>>> >>>>> creates exposure we're trying to avoid. The ID-JAG pattern >>>> (cryptographic >>>> >>>>> proof of identity, not a usable token) would be perfect, except >>>> the >>>> >>>>> prohibition defined in section 8.3 of Identity Assertion draft: >>>> >>>>> 8.3. >>>> >>>>> < >>>> https://www.ietf.org/archive/id/draft-parecki-oauth-identity-assertion-authz-grant-05.html#section-8.3 >>>> >Cross-Domain >>>> >>>>> Use >>>> >>>>> < >>>> https://www.ietf.org/archive/id/draft-parecki-oauth-identity-assertion-authz-grant-05.html#name-cross-domain-use >>>> > >>>> >>>>> >>>> >>>>> This specification is intended for cross-domain uses where the >>>> Client, >>>> >>>>> Resource App, and Identity Provider are all in different trust >>>> domains. In >>>> >>>>> particular, the Identity Provider MUST NOT issue access tokens in >>>> >>>>> response to an ID-JAG it issued itself. Doing so could lead to >>>> >>>>> unintentional broadening of the scope of authorization. >>>> >>>>> My question remains, Can the section 8.3 prohibition be satisfied >>>> with >>>> >>>>> enough security controls (scope validation, replay prevention >>>> etc.) for >>>> >>>>> same IdP scenarios, or is it a hard limitation? >>>> >>>>> >>>> >>>>> Thanks and Regards, >>>> >>>>> Tarun Nanduri. >>>> >>>>> >>>> >>>>> >>>> >>>>> On Fri, Dec 5, 2025 at 1:53 AM Aaron Parecki <aaron@parecki.com> >>>> >>>>> wrote: >>>> >>>>> >>>> >>>>>> Hi Tarun, >>>> >>>>>> >>>> >>>>>> It sounds like what you are looking for is the parent draft of >>>> this >>>> >>>>>> draft, Identity and Authorization Chaining Across Domains: >>>> >>>>>> >>>> https://datatracker.ietf.org/doc/draft-ietf-oauth-identity-chaining/ >>>> >>>>>> >>>> >>>>>> The document that defines the ID-JAG, Identity Assertion >>>> >>>>>> Authorization Grant, is a special case of Identity Chaining >>>> where both the >>>> >>>>>> client and resource have a pre-existing relationship with the >>>> same IdP. So >>>> >>>>>> I don't view it as a limitation, it's actually an optimization >>>> when there >>>> >>>>>> is a common IdP. The Identity Chaining draft is the same as this >>>> draft >>>> >>>>>> except it doesn't specify the input token format or the reason >>>> why the >>>> >>>>>> client and resource trust the cross-domain JWT issuer. >>>> >>>>>> >>>> >>>>>> Aaron >>>> >>>>>> >>>> >>>>>> >>>> >>>>>> >>>> >>>>>> On Mon, Dec 1, 2025 at 8:11 AM Tarun Nanduri < >>>> tarunnanduri7@gmail.com> >>>> >>>>>> wrote: >>>> >>>>>> >>>> >>>>>>> Dear OAuth Working Group & Aaron, >>>> >>>>>>> >>>> >>>>>>> I would like to provide feedback on the OAuth Identity Assertion >>>> >>>>>>> Authorization Grant (ID-JAG) specification, specifically >>>> regarding >>>> >>>>>>> the prohibition against same-IdP usage. >>>> >>>>>>> >>>> >>>>>>> Use Case: >>>> >>>>>>> >>>> >>>>>>> In microservices architectures using the same IdP, there is a >>>> >>>>>>> legitimate need for service-to-service identity delegation >>>> WITHOUT >>>> >>>>>>> sharing access tokens directly: >>>> >>>>>>> >>>> >>>>>>> - Application A has a user-scoped token >>>> >>>>>>> - Application A needs to invoke Application B on behalf of user >>>> >>>>>>> - Sharing Token A with Application B creates security risks: >>>> >>>>>>> * Token exposure between services >>>> >>>>>>> * Replay attacks >>>> >>>>>>> * Over-privileged access >>>> >>>>>>> * Audience mismatch >>>> >>>>>>> >>>> >>>>>>> The Gap: >>>> >>>>>>> >>>> >>>>>>> ID-JAG's assertion pattern solves this perfectly: >>>> >>>>>>> - Application A creates a cryptographic identity assertion >>>> >>>>>>> - Assertion is audience-bound to Application B >>>> >>>>>>> - Application B exchanges assertion for its own token >>>> >>>>>>> - No credential sharing between services >>>> >>>>>>> >>>> >>>>>>> However, the same-IdP prohibition prevents this legitimate use >>>> case. >>>> >>>>>>> >>>> >>>>>>> Suggestion: >>>> >>>>>>> >>>> >>>>>>> Consider either: >>>> >>>>>>> 1. Removing the same-IdP prohibition with appropriate security >>>> >>>>>>> guidance >>>> >>>>>>> 2. Adding an exception for service-to-service delegation >>>> scenarios >>>> >>>>>>> 3. Providing guidance on how to achieve this pattern within the >>>> same >>>> >>>>>>> IdP >>>> >>>>>>> >>>> >>>>>>> RFC 8693 (Token Exchange) doesn't fully address this use case >>>> as it >>>> >>>>>>> requires sending the actual token (subject_token), which is what >>>> >>>>>>> we're >>>> >>>>>>> trying to avoid. >>>> >>>>>>> >>>> >>>>>>> Security Considerations: >>>> >>>>>>> >>>> >>>>>>> With zero-trust validation, same-IdP assertions can be just as >>>> secure >>>> >>>>>>> as cross-IdP: >>>> >>>>>>> - Validate assertion issuer is authorized >>>> >>>>>>> - Apply fresh authorization policy evaluation >>>> >>>>>>> - Enforce audience restrictions >>>> >>>>>>> - Use short-lived assertions >>>> >>>>>>> - Implement scope intersection, not broadening >>>> >>>>>>> >>>> >>>>>>> Would appreciate the working group's consideration of this use >>>> case. >>>> >>>>>>> >>>> >>>>>>> Best regards, >>>> >>>>>>> Tarun Nanduri. >>>> >>>>>>> >>>> >>>>>> _______________________________________________ >>>> >>>> OAuth mailing list -- oauth@ietf.org >>>> >>>> To unsubscribe send an email to oauth-leave@ietf.org >>>> >>>> >>>> >>> >>>> >>> *CONFIDENTIALITY NOTICE: This email may contain confidential and >>>> >>> privileged material for the sole use of the intended recipient(s). >>>> Any >>>> >>> review, use, distribution or disclosure by others is strictly >>>> prohibited. >>>> >>> If you have received this communication in error, please notify the >>>> sender >>>> >>> immediately by e-mail and delete the message and any file >>>> attachments from >>>> >>> your computer. Thank you.* >>>> >>> _______________________________________________ >>>> >>> OAuth mailing list -- oauth@ietf.org >>>> >>> To unsubscribe send an email to oauth-leave@ietf.org >>>> >>> >>>> >> >>>> -------------- next part -------------- >>>> A message part incompatible with plain text digests has been removed ... >>>> Name: not available >>>> Type: text/html >>>> Size: 16713 bytes >>>> Desc: not available >>>> >>>> ------------------------------ >>>> >>>> Subject: Digest Footer >>>> >>>> _______________________________________________ >>>> OAuth mailing list -- oauth@ietf.org >>>> To unsubscribe send an email to oauth-leave@ietf.org >>>> >>>> >>>> ------------------------------ >>>> >>>> End of OAuth Digest, Vol 208, Issue 19 >>>> ************************************** >>>> >>> >>> >>> -- >>> Chris Keogh >>> _______________________________________________ >>> OAuth mailing list -- oauth@ietf.org >>> To unsubscribe send an email to oauth-leave@ietf.org >>> >> > > -- > Chris Keogh > _______________________________________________ > OAuth mailing list -- oauth@ietf.org > To unsubscribe send an email to oauth-leave@ietf.org >
- [OAUTH-WG] Re: OAuth Digest, Vol 208, Issue 19 Chris Keogh
- [OAUTH-WG] Re: OAuth Digest, Vol 208, Issue 19 Karl McGuinness
- [OAUTH-WG] Re: OAuth Digest, Vol 208, Issue 19 Chris Keogh
- [OAUTH-WG] Re: OAuth Digest, Vol 208, Issue 19 Atul Tulshibagwale