Re: [OAUTH-WG] self-issued access tokens

toshio9.ito@toshiba.co.jp Fri, 01 October 2021 01:14 UTC

Return-Path: <toshio9.ito@toshiba.co.jp>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 013483A0B68 for <oauth@ietfa.amsl.com>; Thu, 30 Sep 2021 18:14:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id N7TySrfMYSCZ for <oauth@ietfa.amsl.com>; Thu, 30 Sep 2021 18:14:54 -0700 (PDT)
Received: from mo-csw.securemx.jp (mo-csw1115.securemx.jp [210.130.202.157]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5F5533A0B51 for <oauth@ietf.org>; Thu, 30 Sep 2021 18:14:47 -0700 (PDT)
Received: by mo-csw.securemx.jp (mx-mo-csw1115) id 1911EMcj029372; Fri, 1 Oct 2021 10:14:22 +0900
X-Iguazu-Qid: 2wHHa7GsP30pgC08yX
X-Iguazu-QSIG: v=2; s=0; t=1633050861; q=2wHHa7GsP30pgC08yX; m=T17WMpiyyrbKFgzgPMDfU96RlUbFDpRp0fTPECvPfAA=
Received: from imx12-a.toshiba.co.jp (imx12-a.toshiba.co.jp [61.202.160.135]) by relay.securemx.jp (mx-mr1110) id 1911EIcq016022 (version=TLSv1.2 cipher=AES128-GCM-SHA256 bits=128 verify=NOT); Fri, 1 Oct 2021 10:14:20 +0900
Received: from enc02.toshiba.co.jp (enc02.toshiba.co.jp [61.202.160.51]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by imx12-a.toshiba.co.jp (Postfix) with ESMTPS id CAFD2100110; Fri, 1 Oct 2021 10:14:18 +0900 (JST)
Received: from hop101.toshiba.co.jp ([133.199.85.107]) by enc02.toshiba.co.jp with ESMTP id 1911EI3s029015; Fri, 1 Oct 2021 10:14:18 +0900
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=hYw9ZqR+n4kopMZY9H1mlmmFyrblGx2+gZlVIAGX84+l8Wxn9okUtSqaiTcJWWFkTHvdDZqoLAiFZ16ZLaZlgnysxOJgMdNtfzUfds0e1vac5I47J7J9tl8BnFGzUtgZxtZBKyM45Goqaxryo/rxaxbc2P94YqGCiVZsRePxVtb3SnXEvtjT+t+6bX1gHb+KK26a44UDqAUHUu+DI26xTar06E/OWfAUtoh9J2FmlJsi38ZpuOkNOI57tsyw6f8M24E29gBqtCRpzJKSSkLpwGL8Y6WjAke5iFVYTRg8kypYILrD3JRFQcXE41flfPSylIYNSRyTqyFokt3MBwjSJQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=D1VRYsGfGxcQ5YPDs/NqaDcDxw2RbJd7Zrhh3lTFHXg=; b=IFzzJte0VF6Gyaw7eJdwk6lB/RVU4nGJSLfy8DHM00+6KfMfeLf0x4EmUIId5/bDPGOkVA6jgyX4mz3cdgTQxlSErHpsJbXIT34dxXChnDm35+gSCDtkPWdRTKOQF2bGVj+wZc0qxtST2qzCQgaVxxOg1hmbmlngJvFPz+INge21txBU5rCp6JSf32RB9tGbyq+Yw8RMVyS1MO0+ZX0xyjkaR2vF/TOU0ZGsQq7VdbLbMXAdzFPQeivkaBN7yG/3gMahI0FQZJ2EpbimGFrZCi2XfxeF0ukUFVtuKF5qVtAfgxMGJiM0HT0IA+eOK+6xM2VuC0RnR5toTysVw0Dn1A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=toshiba.co.jp; dmarc=pass action=none header.from=toshiba.co.jp; dkim=pass header.d=toshiba.co.jp; arc=none
From: toshio9.ito@toshiba.co.jp
To: fotiou@aueb.gr, fett@danielfett.de
CC: oauth@ietf.org
Thread-Topic: [OAUTH-WG] self-issued access tokens
Thread-Index: Ade01Nk+d5eF4L5tTXCgjU67TgIDjwAc7pmAAB+fWwAAJootgA==
Date: Fri, 01 Oct 2021 01:13:57 +0000
X-TSB-HOP: ON
Message-ID: <TYCPR01MB5678F7AD40604E1082B42557E5AB9@TYCPR01MB5678.jpnprd01.prod.outlook.com>
References: <TYCPR01MB567859999FB3350D6A1C63E5E5A99@TYCPR01MB5678.jpnprd01.prod.outlook.com> <581ea93b-ab52-e4e2-ec53-c776060e99d1@danielfett.de> <09C675DC-1DC8-4860-A4DD-CE70B1FD5577@aueb.gr>
In-Reply-To: <09C675DC-1DC8-4860-A4DD-CE70B1FD5577@aueb.gr>
Accept-Language: ja-JP, en-US
Content-Language: ja-JP
authentication-results: aueb.gr; dkim=none (message not signed) header.d=none;aueb.gr; dmarc=none action=none header.from=toshiba.co.jp;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: fa594c9e-bf9a-4b79-b0a5-08d98478be44
x-ms-traffictypediagnostic: TYAPR01MB3997:
x-microsoft-antispam-prvs: <TYAPR01MB3997790A526AA5DD05AACB25E5AB9@TYAPR01MB3997.jpnprd01.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:TYCPR01MB5678.jpnprd01.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(366004)(52536014)(26005)(508600001)(64756008)(966005)(66556008)(4326008)(71200400001)(33656002)(186003)(122000001)(38100700002)(316002)(55016002)(9686003)(5660300002)(110136005)(66946007)(66476007)(66446008)(2906002)(53546011)(38070700005)(83380400001)(8936002)(7696005)(86362001)(76116006)(6506007)(8676002); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="iso-2022-jp"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: TYCPR01MB5678.jpnprd01.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: fa594c9e-bf9a-4b79-b0a5-08d98478be44
X-MS-Exchange-CrossTenant-originalarrivaltime: 01 Oct 2021 01:13:57.1645 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: f109924e-fb71-4ba0-b2cc-65dcdf6fbe4f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: dah2ObNQ1bqOqJ8rrurqj9Ns6co7yq/A9agHk8K79TpIsxJXx+NwGXHsZoRykQ8xE2Ljh0NV5gNJqMI8olmm1+Gx5c4j++PYnoBHfnyd9tI=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: TYAPR01MB3997
X-OriginatorOrg: toshiba.co.jp
MSSCP.TransferMailToMossAgent: 103
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/cMn1EoIEzzaG5xoxlLopqA4Utkk>
Subject: Re: [OAUTH-WG] self-issued access tokens
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Oct 2021 01:14:59 -0000

Thanks Nikos,

It sounds interesting to use Verifiable Credentials in this scenario. I'll read
the paper.


Toshio Ito

-----Original Message-----
From: OAuth <oauth-bounces@ietf.org> On Behalf Of Nikos Fotiou
Sent: Thursday, September 30, 2021 3:48 PM
To: Daniel Fett <fett@danielfett.de>
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] self-issued access tokens

FYI, this is exactly what we are doing in [1] to manage Verifiable Credentials using OAuth2.0. The AS issues a verifiable credential that stays (for long time) in the client. The client uses DPoP to prove ownership of the credential. We just started a new project funded by essif [2] that will further develop this idea and provide implementations.

Best,
Nikos

[1] N. Fotiou, V.A. Siris, G.C. Polyzos, "Capability-based access control for multi-tenant systems using Oauth 2.0 and Verifiable Credentials," Proc. 30th International Conference on Computer Communications and Networks (ICCCN), Athens, Greece, July 2021 (https://mm.aueb.gr/publications/0a8b37c5-c814-4056-88a7-19556221728c.pdf)
[2]https://essif-lab.eu
--
Nikos Fotiou - http://pages.cs.aueb.gr/~fotiou Researcher - Mobile Multimedia Laboratory Athens University of Economics and Business https://mm.aueb.gr

> On 29 Sep 2021, at 6:42 PM, Daniel Fett <fett@danielfett.de> wrote:
> 
> That very much sounds like a static string as the access token plus DPoP.
> 
> -Daniel
> 
> Am 29.09.21 um 03:54 schrieb toshio9.ito@toshiba.co.jp:
>> Hi OAuth folks,
>> 
>> I have a question. Is there (or was there) any standardizing effort 
>> for "self-issued access tokens"?
>> 
>> Self-issued access tokens are mentioned in a blog post by P. 
>> Siriwardena in 2014 [*1]. It's an Access Token issued by the Client and sent to the Resource Server.
>> The token is basically a signed document (e.g. JWT) by the private 
>> key of the Client. The Resource Server verifies the token with the 
>> public key, which is provisioned in the RS in advance.
>> 
>> I think self-issued access tokens are handy replacement for Client 
>> Credentials Grant flow in simple deployments, where it's not so 
>> necessary to separate AS and RS. In fact, Google supports this type 
>> of authentication for some services [*2][*3]. I'm wondering if there 
>> are any other services supporting self-signed access tokens.
>> 
>> Any comments are welcome.
>> 
>> [*1]: 
>> https://wso2.com/library/blog-post/2014/10/blog-post-self-issued-acce
>> ss-tokens/
>> 
>> [*2]: 
>> https://developers.google.com/identity/protocols/oauth2/service-accou
>> nt#jwt-auth
>> 
>> [*3]: 
>> https://google.aip.dev/auth/4111
>> 
>> 
>> -------------
>> Toshio Ito
>> Research and Development Center
>> Toshiba Corporation
>> 
>> 
>> 
>> _______________________________________________
>> OAuth mailing list
>> 
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
> 
> 
> --
> 
> https://danielfett.de
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth