Re: [OAUTH-WG] JWT - scope claim missing

John Bradley <ve7jtb@ve7jtb.com> Thu, 28 February 2013 16:58 UTC

Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4F31C21F8C08 for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 08:58:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.598
X-Spam-Level:
X-Spam-Status: No, score=-3.598 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id StWkK-aanb7i for <oauth@ietfa.amsl.com>; Thu, 28 Feb 2013 08:58:48 -0800 (PST)
Received: from mail-pb0-f45.google.com (mail-pb0-f45.google.com [209.85.160.45]) by ietfa.amsl.com (Postfix) with ESMTP id C188721F8A09 for <oauth@ietf.org>; Thu, 28 Feb 2013 08:58:48 -0800 (PST)
Received: by mail-pb0-f45.google.com with SMTP id ro8so1181799pbb.18 for <oauth@ietf.org>; Thu, 28 Feb 2013 08:58:48 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=x-received:content-type:mime-version:subject:from:in-reply-to:date :cc:message-id:references:to:x-mailer:x-gm-message-state; bh=hk3crOGbvC6Nsy71SR2vv93kllcVyVjGmEvwLwUtAkk=; b=M31hkgpBeNCHjNAjkzWS43orQA5T9F2r/YlnpSI04NTL/tStn/72dGAHn3fbzJHSkr bBpwPYJOjDUYeup2AuwU/VXLaMDzy2mXIf0+lHmfZmKfAkQ3LiYvcf/l2yNE8ouZl3qO 241xD2LwZJl69E4FhOq9Lrq+1mPZPlLAyNI6x6pkgoeZ7H5q+bPWpFBMjeUtqdJSF9jd BoUfqFBXzFWM1cvvrSQT1tXgoB4GtKdjbUSiKgtkGIVOccsd5hBgmbzItC4yzi79t7+p J3QcuVyhA6b/aJ2Mw2wT/QVqCzeg1WBaXKqEwCQCNb2J4+l6g6WLnXcN2Mh4Ex/ntOAr /Dpw==
X-Received: by 10.68.194.37 with SMTP id ht5mr9783166pbc.194.1362070727850; Thu, 28 Feb 2013 08:58:47 -0800 (PST)
Received: from [192.168.41.99] (ip-64-134-220-138.public.wayport.net. [64.134.220.138]) by mx.google.com with ESMTPS id t6sm9820423paz.11.2013.02.28.08.58.44 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 28 Feb 2013 08:58:46 -0800 (PST)
Content-Type: multipart/signed; boundary="Apple-Mail=_71F7F8CC-D00C-4DAE-89A1-EBE7F79F3E78"; protocol="application/pkcs7-signature"; micalg="sha1"
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <CA+k3eCREgN+6z+U=jjJcPo0nZVR0GWn5zXeecZRO+rg=xd-gZg@mail.gmail.com>
Date: Thu, 28 Feb 2013 08:58:42 -0800
Message-Id: <A2375FE9-946F-46B3-9356-0709DD56BD4A@ve7jtb.com>
References: <0EC2404F-E3C5-4AD1-88B4-E74AA0394DD9@gmx.net> <C75E4871-E907-4EF7-BAF0-9D1A172D581B@ve7jtb.com> <CA6A6425-D0CE-469F-B51E-9F296DA8041C@oracle.com> <CA+k3eCREgN+6z+U=jjJcPo0nZVR0GWn5zXeecZRO+rg=xd-gZg@mail.gmail.com>
To: Brian Campbell <bcampbell@pingidentity.com>
X-Mailer: Apple Mail (2.1499)
X-Gm-Message-State: ALoCoQnQ2uI3veQZGvWQhX6IDfGEq8+/oG+d1tyvno+TU3obOsGCjL502kqauoJjncE/zdZPD4x4
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] JWT - scope claim missing
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Feb 2013 16:58:56 -0000

Yes, defining scope in JWT is the wrong place.   JWT needs to stick to the security claims needed to process JWT.

I also don't know how far you get requiring a specific authorization format for JWT, some AS will wan to use a opaque reference, some might want to use a user claim or role claim, others may use scopes,  combining scopes and claims is also possible.

Right now it is up to a AS RS pair to agree on how to communicate authorization.   I don't want MAC to be more restrictive than bearer when it comes to authorization between AS and RS.

Hannes wanted to know why JWT didn't define scope.  The simple answer is that it is out of scope for JWT itself.   It might be defined in a OAuth access token profile for JWT but it should not be specific to MAC.

John B.
On 2013-02-28, at 8:44 AM, Brian Campbell <bcampbell@pingidentity.com> wrote:

> I think John's point was more that scope is something rather specific to an OAuth access token and, while JWT is can be used to represent an access token, it's not the only application of JWT. The 'standard' claims in JWT are those that are believed (right or wrong) to be widely applicable across different applications of JWT. One could argue about it but scope is probably not one of those.
> 
> It would probably make sense to try and build a profile of JWT specifically for OAuth access tokens (though I suspect there are some turtles and dragons in there), which might be the appropriate place to define/register a scope claim.
> 
> 
> On Thu, Feb 28, 2013 at 9:24 AM, Phil Hunt <phil.hunt@oracle.com> wrote:
> Are you advocating TWO systems? That seems like a bad choice.
> 
> I would rather fix scope than go to a two system approach.
> 
> Phil
> 
> Sent from my phone.
> 
> On 2013-02-28, at 8:17, John Bradley <ve7jtb@ve7jtb.com> wrote:
> 
> > While scope is one method that a AS could communicate authorization to a RS, it is not the only or perhaps even the most likely one.
> > Using scope requires a relatively tight binding between the RS and AS,  UMA uses a different mechanism that describes finer grained operations.
> > The AS may include roles, user, or other more abstract claims that the the client may (god help them) pass on to EXCML for processing.
> >
> > While having a scopes claim is possible, like any other claim it is not part of the JWT core security processing claims, and needs to be defined by extension.
> >
> > John B.
> > On 2013-02-28, at 2:29 AM, Hannes Tschofenig <hannes.tschofenig@gmx.net> wrote:
> >
> >> Hi Mike,
> >>
> >> when I worked on the MAC specification I noticed that the JWT does not have a claim for the scope. I believe that this would be needed to allow the resource server to verify whether the scope the authorization server authorized is indeed what the client is asking for.
> >>
> >> Ciao
> >> Hannes
> >>
> >> _______________________________________________
> >> OAuth mailing list
> >> OAuth@ietf.org
> >> https://www.ietf.org/mailman/listinfo/oauth
> >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>