Re: [OAUTH-WG] draft-ietf-oauth-access-token-jwt-08 question

Vittorio Bertocci <vittorio.bertocci@auth0.com> Sat, 19 September 2020 00:27 UTC

Return-Path: <vittorio.bertocci@auth0.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 674C53A11BC for <oauth@ietfa.amsl.com>; Fri, 18 Sep 2020 17:27:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.855
X-Spam-Level:
X-Spam-Status: No, score=-0.855 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, NORMAL_HTTP_TO_IP=0.001, NUMERIC_HTTP_ADDR=1.242, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=auth0.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id S5CbRGcNvAyo for <oauth@ietfa.amsl.com>; Fri, 18 Sep 2020 17:27:18 -0700 (PDT)
Received: from mail-pj1-x102f.google.com (mail-pj1-x102f.google.com [IPv6:2607:f8b0:4864:20::102f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3D08D3A1075 for <oauth@ietf.org>; Fri, 18 Sep 2020 17:27:05 -0700 (PDT)
Received: by mail-pj1-x102f.google.com with SMTP id gf14so3842356pjb.5 for <oauth@ietf.org>; Fri, 18 Sep 2020 17:27:05 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=auth0.com; s=google; h=from:to:subject:thread-topic:thread-index:date:message-id :references:in-reply-to:accept-language:content-language :mime-version; bh=AhVl0KqT0C3yrIFAjiJJTa9Eix2R1YHlBdiJPlGzV1M=; b=gbrQ+oKOVDuDTBfLaD9tGIwk4zbHZsiUjhlZdabBwyA1mVlMkMuh/GRSFx1Am8LKwd bWT1cz6JD4rJTrcwrWv7X/xCot6CTg8Bu+BKs/k+pBEs3jWbNSTei3ShLS1o3iILUPgT su2lXs5DtDC/ZSzzypgd97/9eioRtvZf0LMtHUSCZ8xV/L4jEYq6Mz4Lz7bWWtyqyShW 4ZIOVf5vs5KGtVx6n6gyUib7gjayowpXEQg7R6m4u22PWJuX7GHB9/dUM27rPuLZ3PYW hCfFAW5Ix+Wkdy0AcqTXxJ3VM2kloymUsldTvFuWw0jQ23p7MY+O9t53gcYKyGzX9RpD g+ag==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:subject:thread-topic:thread-index:date :message-id:references:in-reply-to:accept-language:content-language :mime-version; bh=AhVl0KqT0C3yrIFAjiJJTa9Eix2R1YHlBdiJPlGzV1M=; b=F1tTTsDYKyfgcNVCBtILeG0vJUi0DIO8Iw4qq1E0OS4CVSIqEKcuSmwWue3Ke/NJf3 O7G2sPFoqLdSaWLGs+5GaWZG/3b2YBxTGPEeSBcx4uoQoMvX/HHN1/kFBaEQxCCQ6Zab mFYfoBlaCw+SD5nconYRhOtfmowL/1L4epD0hW+jsPEWJPygb4rSuA/XPDCNzZ7rZ9W1 lJOiTdBECv1mfA8DYgG6KXNcxC7JyWQyFwmI8gCVlCJb7OBaQ+CmlTbDZPe3kPsZMPhb 6VdJzaYGWeg+s8eoXW1pp2RMsrT/sZREqpYKiaWnJK+8GmpqvfQljOUEqpWQ3VUjfWtq NnOQ==
X-Gm-Message-State: AOAM5338QppqVb8ezT+srSWgDFFm0CZlXtG4dzXIN3aw/WFOsMBzS1v7 ufGJNM1infHS2D1p+i2ZtVHMgA==
X-Google-Smtp-Source: ABdhPJwSSJvmBtAKSmidCVh/Vjk3cElSz2TcXLacR+tGDYOG5FkODBIHFpSnN//D+gFiIaHOlS5u6Q==
X-Received: by 2002:a17:902:7896:b029:d0:89f1:9e33 with SMTP id q22-20020a1709027896b02900d089f19e33mr35666232pll.15.1600475224477; Fri, 18 Sep 2020 17:27:04 -0700 (PDT)
Received: from MWHPR19MB1501.namprd19.prod.outlook.com ([2603:1036:120:1d::5]) by smtp.gmail.com with ESMTPSA id j144sm4718585pfd.106.2020.09.18.17.27.03 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Fri, 18 Sep 2020 17:27:04 -0700 (PDT)
From: Vittorio Bertocci <vittorio.bertocci@auth0.com>
To: Logan Widick <logan.widick@gmail.com>, "oauth@ietf.org" <oauth@ietf.org>
Thread-Topic: [OAUTH-WG] draft-ietf-oauth-access-token-jwt-08 question
Thread-Index: AWdVOGRZfCffrbDQDUZf8aHBptBej95xxmVl
X-MS-Exchange-MessageSentRepresentingType: 1
Date: Sat, 19 Sep 2020 00:27:00 +0000
Message-ID: <MWHPR19MB150101C01962881B13665C21AE3C0@MWHPR19MB1501.namprd19.prod.outlook.com>
References: <CAMmAzEJX=Y=seeDe5T_d8-rr+qAx98fa-9+Qyh3UmnEEZTSoBg@mail.gmail.com>
In-Reply-To: <CAMmAzEJX=Y=seeDe5T_d8-rr+qAx98fa-9+Qyh3UmnEEZTSoBg@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-Exchange-Organization-SCL: -1
X-MS-TNEF-Correlator:
X-MS-Exchange-Organization-RecordReviewCfmType: 0
Content-Type: multipart/alternative; boundary="_000_MWHPR19MB150101C01962881B13665C21AE3C0MWHPR19MB1501namp_"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/chm9AZeP9eeyet1kuyViJu0649Y>
Subject: Re: [OAUTH-WG] draft-ietf-oauth-access-token-jwt-08 question
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 19 Sep 2020 00:27:26 -0000

Hi Logan,
Thanks for the note.
The intent would be to present that information in the same way you would when querying a users/<id>, encoded in claims; hence groups would be a list of values representing  what groups the subject belongs to, rather than a list of full group definitions (with all the other members belonging to them, for example) which would go beyond the intended use of the information (supplying authorization information about the subject).
I tried to keep the language high level as I didn’t want to duplicate SCIM guidance, or inadvertently narrow down the options products have to implement this.  If you think this is too vague, we can try to be more specific.

From: OAuth <oauth-bounces@ietf.org> on behalf of Logan Widick <logan.widick@gmail.com>
Date: Wednesday, September 16, 2020 at 14:21
To: "oauth@ietf.org" <oauth@ietf.org>
Subject: [OAUTH-WG] draft-ietf-oauth-access-token-jwt-08 question


I took a look at Section 2.2.3.1<http://2.2.3.1>: Claims for Authorization Outside of Delegation Scenarios (https://tools.ietf.org/html/draft-ietf-oauth-access-token-jwt-08#section-2.2.3.1) and I do not understand what exactly the formats of the "roles", "groups", and "entitlements" claims will be.

Will the "roles" claim be an array of strings (role names, IDs, or links), an array of the "roles" objects from the SCIM User schema (pages 66-67 of RFC 7643), or something else?

Will the "groups" claim be an array of strings (group names, IDs, or links), an array of the "groups" objects from the SCIM User schema (pages 63-64 of RFC 7643), an array of SCIM Group schema objects (pages 69-70 of RFC 7643), or something else?

Will the "entitlements" claim be an array of strings (entitlement names, IDs, or links), an array of the "entitlements" objects from the SCIM User schema (pages 65-66 of RFC 7643), or something else?

Sincerely,

Logan Widick