[OAUTH-WG] Re: OAuth Digest, Vol 208, Issue 19
Chris Keogh <christopher.keogh@gmail.com> Tue, 10 February 2026 00:48 UTC
Return-Path: <christopher.keogh@gmail.com>
X-Original-To: oauth@mail2.ietf.org
Delivered-To: oauth@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 241B4B46ACCC for <oauth@mail2.ietf.org>; Mon, 9 Feb 2026 16:48:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HX5lE3Kkxa8y for <oauth@mail2.ietf.org>; Mon, 9 Feb 2026 16:48:49 -0800 (PST)
Received: from mail-yx1-xb12f.google.com (mail-yx1-xb12f.google.com [IPv6:2607:f8b0:4864:20::b12f]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id C3284B46ACC1 for <oauth@ietf.org>; Mon, 9 Feb 2026 16:48:49 -0800 (PST)
Received: by mail-yx1-xb12f.google.com with SMTP id 956f58d0204a3-64ae5f0777dso366810d50.3 for <oauth@ietf.org>; Mon, 09 Feb 2026 16:48:49 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; t=1770684523; cv=none; d=google.com; s=arc-20240605; b=cVHiHjqVLra9tWaxSYhd50GV933lnFzaZm9/1VRN5nbCZVk5bq9/sh6Lh8u2tzzKoi dePdYfhm4SlfvM8BO/HdW33W4uKVr7PWwUW8wLQ8YHSBXsRXNMlCVGRVuNQ7vhT38Nrh 7qIwRIagIbl+tahvoKHAWo14PbQIBC9Bo8ShECbXkZI4B1daT1mtEXvjAIBInDD7p9yp tFWfxw4turR19685U8ZnGFtLIIeTVxKNHTSdAhWfaOm5lp2b47XOFjaWyNFmCpY3KhO+ Y/XDmjXlsF99xxaIjaQH+PpLRAIHzkO/LQSTLOU/6sNrnvlhnoCYbyTNCUsri2l4T3Jd sXvg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20240605; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:dkim-signature; bh=00koAnsheDQN3yQQ/83Da2bCZT0V5qQM8Bx+m3TvNVM=; fh=uQWAI4w3Q4UfhL7PqaqaSBQ8cC1SBlmZSetLLmGoajU=; b=FtoLn2Aiikb5nNqA+resqBYvFhzh2rZTwp4ndGBVuPPNvNaicjJisvnUIENoLAravd p09eSEZ8HXAKVChIw8H3rXh/Goj8iT5U81Bw02yleS/wSq0+BBDs8kwv5TZAFHoNW98u kEUSYK/wOtxIoYfa+IQbKYUvf2y7s06syT3VLPnMTmb9qqFUvFPZtuaWMS21H5HaXJJO 0ww0Ag3GxgsRII22Uvh42QjX1K/TzbCxF8AS4HlkEdXcKUc9XV7BNOCgpPDLG8Xk0Mqt sLLNCGroveBr+R5cDMWJEYMI/YXUCAcoRhB33JvcIq3wwDYcDZRmOvM0nG4gMCthhgI4 Ez6Q==; darn=ietf.org
ARC-Authentication-Results: i=1; mx.google.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1770684523; x=1771289323; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=00koAnsheDQN3yQQ/83Da2bCZT0V5qQM8Bx+m3TvNVM=; b=Ch0iyRwtFRQK4EPRVB0dPiA+kBLfQUFfdEJOoWnPinr7nsgRmMrFEHyVnCVeO8gHe5 bQk/mVrfv8zh9ZvLCMc0I6ZcW3aty/kLCZVppEJF+L2sfq3jEEnuzoD5XlvU/OdKc77w BwDwehA32A+85paES4mo6tYi+kLh5YGoCz5He82Qdj6+8fH01K3uO1VW33WO9p+W/5wV WbdAlf4WbH+aISVZ776/H+Jn0TzgVcSjTCzbuLBbYfplvoSkzLVJ88x/YIEJQ5npTBBQ JK3PNg2AbUBuZ4UPBihLylt5XjVWJe01L1bD2CQMO5/pqd+42F2cEKJ9lwcoYtxGwoce o3uw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1770684523; x=1771289323; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-gg:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=00koAnsheDQN3yQQ/83Da2bCZT0V5qQM8Bx+m3TvNVM=; b=sfDoHJn1noGnMFWuW5yrpCP+OMelg2ptSebifbfiJD906SI6BS5i8Pn4Xw9xJiPwA2 J1uOTGAykvODMGqD53GNW7CkjuoLVtbYmfyTeMwX9HYus6RhkBMwGKmKjqnvHGdDk5SV FtippFxBtVDutJoTwixUJbvOvTMGRp/H9tvoZuQNLX5zmuKbVAkbGEvIxQNrh/vMIQyi i7/ItCJWq8CE0dtrR9HAH+vz8jl5rjUQPBDj2Hd+rKKWczflz4QlokB3VTOWbfSSQAvb y8zQMIQhVQbJl7llYo6mXMJmcxSEQSjBpOuy0cnVYihmDb/Cz72nsh0Qq6rCvg4Kj5fQ SfRQ==
X-Gm-Message-State: AOJu0YxkPChdA0XecwwbpT6KG9X9vO6gcXo/w2vfL7yrVe/hS3SVO+Ae OlA8v5R+y2+jvtPtC5g/EGJB+xXS6SgGVtyYQSe5L3uh0y1lmhKCeQ1+81GIdd3PzEuAX8168jG pekzbrX6ZfqCUzoJwY8DyAPfLqyq/SFcKRAV9
X-Gm-Gg: AZuq6aJIRcDr/xF6e1QWpw+YXWUIMPWqEE18N+DTZ/BTNrqr4Fbl1zDBkD52n5Ws1VX QnhEZoYaOzyUsqT3aQuUzohjuH9MkYpZIdJNOZho3et7PktYbUyoN0W0HZw0NBvD/fm1+/kk+fG GdriCi8d5Pp8PFQt4hB1UakaQC3D6iY0KVyGLTSu6I80QfnvjPK/CYrWsMZV+KDEGDK2B7VFuw9 V+siF92dR1AR1bXM4VrIxhgQgfDxTFwFQn41ErEIobWSU90wEGNsA8tx0INRJdNElMEQzWbhyRl WQIuTydla9KcWf4XoLQ3JrvgtP0aKydmNlSsnsPn7A==
X-Received: by 2002:a05:690c:39c:b0:794:8afb:d0d5 with SMTP id 00721157ae682-7952ab57b0fmr245647127b3.53.1770684522892; Mon, 09 Feb 2026 16:48:42 -0800 (PST)
MIME-Version: 1.0
References: <177064881569.2608.14701868528558862560@mail2.ietf.org> <CADo7KwaUWahs-0gO9-D=LHnzWZk08NOkU-Zaiq8T2-uoQFFPSQ@mail.gmail.com> <CAPVrLW2X2HNUZt3qV6u71Ns3sf3Z5OoBKQLV93fqGk3pXGrWdg@mail.gmail.com>
In-Reply-To: <CAPVrLW2X2HNUZt3qV6u71Ns3sf3Z5OoBKQLV93fqGk3pXGrWdg@mail.gmail.com>
From: Chris Keogh <christopher.keogh@gmail.com>
Date: Tue, 10 Feb 2026 13:48:31 +1300
X-Gm-Features: AZwV_QhT9-NtS-I-oqf6EvCk3dAYJ6kcyxs1usg2uhD41Urh05lmBUgPnJM52Kw
Message-ID: <CADo7KwZgi59gS_V_S_BuiCrvYO3b7dhdy+M19kF88j6auBNp2A@mail.gmail.com>
To: Karl McGuinness <me@karlmcguinness.com>
Content-Type: multipart/alternative; boundary="000000000000ff0fec064a6d9d60"
Message-ID-Hash: 57RRST7GPOKUSEP6RKDPUE4TKLNU3YBR
X-Message-ID-Hash: 57RRST7GPOKUSEP6RKDPUE4TKLNU3YBR
X-MailFrom: christopher.keogh@gmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-oauth.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: oauth@ietf.org
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [OAUTH-WG] Re: OAuth Digest, Vol 208, Issue 19
List-Id: OAUTH WG <oauth.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/iemhzqm0DzEg40QrNHtFVHkzHtU>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Owner: <mailto:oauth-owner@ietf.org>
List-Post: <mailto:oauth@ietf.org>
List-Subscribe: <mailto:oauth-join@ietf.org>
List-Unsubscribe: <mailto:oauth-leave@ietf.org>
No worries Karl, I thought as much but thought I'd pipe up anyway. Thanks šš¼ On Tue, 10 Feb 2026 at 13:21, Karl McGuinness <me@karlmcguinness.com> wrote: > @Chris, I think this topic might be more relevant to the OpenID Connect > A/B working group (https://openid.net/wg/connect/) as it appears to be a > SSO use case. The OpenID Native SSO spec ( > https://openid.net/specs/openid-connect-native-sso-1_0.html) supports 1 > type of flow and vendors such as Okta support Mobile to Web SSO > https://developer.okta.com/docs/guides/native-to-web-sso/main/ using > proprietary mechanism. There are a lot of security considerations/caveats > with this type of flow that would be best answered in the OIDC WG. > > -Karl > > On Mon, Feb 9, 2026 at 1:17āÆPM Chris Keogh <christopher.keogh@gmail.com> > wrote: > >> Hi there all, >> >> I'm dealing with a similar scenario that Tarun is highlighting and >> thought I'd chime in to make it more concrete. >> >> We have a mobile application and a web application that both use the same >> IdP/AS. The mobile client (public+PKCE) uses long lived refresh tokens and >> only requires the user to log in once (via the system browser) to retrieve >> the access/refresh token combination. From this point on the user is >> considered signed in to the mobile application, but the session at the IdP >> will quickly expire (and the session/auth cookie in the system browser with >> it). >> >> We'd like to be able to embed web views within the mobile application >> that are hosted by our web app without the user having to sign in again. >> >> I've been thinking about using something along the lines of Identity >> chaining or JWT authorization (with DPoP) to retrieve one time use short >> lived access tokens that can be used by the mobile client to query an >> endpoint which signs the user in and returns the contents of the IdP >> session cookies to the mobile application, which then injects the cookies >> into an embedded browser (not the system browser) which then loads the web >> view which goes through the standard auth code flow. >> >> As Tarun points out, it feels like there's a gap in the standards where >> this kind of thing isn't really addressed. Potentially it's more of an OIDC >> problem? >> >> >> On Tue, 10 Feb 2026 at 03:54, <oauth-request@ietf.org> wrote: >> >>> Send OAuth mailing list submissions to >>> oauth@ietf.org >>> >>> To subscribe or unsubscribe via email, send a message with subject or >>> body 'help' to >>> oauth-request@ietf.org >>> >>> You can reach the person managing the list at >>> oauth-owner@ietf.org >>> >>> When replying, please edit your Subject line so it is more specific >>> than "Re: Contents of OAuth digest..." >>> >>> Today's Topics: >>> >>> 1. Re: Feedback on ID-JAG same IdP prohibition - Application to >>> Application Delegation >>> (Pieter Kasselman) >>> >>> >>> ---------------------------------------------------------------------- >>> >>> Message: 1 >>> Date: Mon, 9 Feb 2026 14:53:14 +0000 >>> From: Pieter Kasselman <pieter@defakto.security> >>> Subject: [OAUTH-WG] Re: Feedback on ID-JAG same IdP prohibition - >>> Application to Application Delegation >>> To: Tarun Nanduri <tarunnanduri7@gmail.com> >>> Cc: Brian Campbell <bcampbell=40pingidentity.com@dmarc.ietf.org>, >>> oauth@ietf.org >>> Message-ID: >>> < >>> CALtWOA1KWhq8diBTA9J52GcGqHNHQgEL+oWfJY9SJL_DPiqf0g@mail.gmail.com> >>> Content-Type: multipart/alternative; >>> boundary="0000000000000d50df064a654dc1" >>> >>> Hi Tarun, for the original use case you described, you may want to >>> consider >>> the transaction token spec [1]. >>> >>> It was specifically developed to allow authorization context, including >>> user and workload/microservice identity information, to be passed between >>> microservices within a domain, without having to pass around access >>> tokens. >>> >>> Cheers >>> >>> Pieter >>> >>> [1] >>> https://datatracker.ietf.org/doc/draft-ietf-oauth-transaction-tokens/07/ >>> >>> On Sun, Feb 8, 2026 at 8:02āÆAM Tarun Nanduri <tarunnanduri7@gmail.com> >>> wrote: >>> >>> > Hi Pieter, Brian, Aaron, and the WG, >>> > >>> > Thanks for the feedback and for taking the time to look at this. Iāve >>> been >>> > thinking over the points about Section 8.3 and the general intent of >>> ID-JAG. >>> > >>> > Stepping back from the specific spec for a second, it feels to me like >>> we >>> > have a bit of a gap in the OAuth/OIDC specifications. Weāre essentially >>> > looking for a standard way to do Directed Session Transfer, in >>> environments >>> > where shared cookies/SSO just aren't an option for security reasons. >>> > >>> > You pointed toward the Identity Chaining Across Domains draft as the >>> > intended home for this, and I see the logicāsince the AS in Domain A >>> > generates the JWT grant, it handles the "identity proof" part of the >>> > handover. >>> > >>> > But right now, if I want to move a user from App A to App B without a >>> > fresh login, the options still feel a bit thin: >>> > >>> > - Standard SSO is off the table because of the "no-shared-cookie" >>> > constraint. >>> > - RFC 8693 is a great building block, but itās mostly used for >>> > service-to-service backend swaps. There isn't really a front-channel >>> > "profile" for this (as RFC863 sends back a usable token rather than >>> an >>> > assertion). >>> > - Identity Chaining, as Brian mentioned, is explicitly a >>> specification >>> > for cross-domain use. >>> > >>> > >>> > It feels a bit ironic that the protocol makes "Cross-Domain" identity >>> > transfers standardized via ID-JAG (as an OAuth native grant), but >>> leaves >>> > "Intra-Domain" delegation as a "roll-your-own" exercise. Without a >>> standard >>> > profile for this, people might just end up building non-standard hacks >>> > which is exactly what weāre trying to avoid. >>> > >>> > Iām not trying to force a change to ID-JAG if the WG feels itās the >>> wrong >>> > home, but I am curious: >>> > >>> > - Do we think this "Directed Session transfer" pattern is a gap >>> worth >>> > filling? >>> > >>> > It feels to me like there should be an "OAuth-native" way to do this >>> that >>> > has the right guardrails (audience binding, act claims, etc.) to make >>> it >>> > secure in a Zero Trust setup, but is as straightforward to implement >>> as a >>> > basic Auth Code grant. Iād love to hear if anyone else sees this gap, >>> or if >>> > there's a pattern Iām missing that doesn't involve a lot of custom >>> "glue" >>> > code. >>> > >>> > Best Regards, >>> > Tarun Nanduri. >>> > >>> > On Thu, Feb 5, 2026 at 6:14āÆPM Pieter Kasselman >>> <pieter@defakto.security> >>> > wrote: >>> > >>> >> Hi Tarun >>> >> >>> >> I agree with Brain and Aaron that your use case can likely be >>> addressed >>> >> by the Identity and Authorization Chaining Across Domains draft [1]. >>> You >>> >> could always profile it further if needed. Is there a reason you >>> would not >>> >> be able to use that draft? >>> >> >>> >> Cheers >>> >> >>> >> Pieter >>> >> >>> >> [1] >>> https://datatracker.ietf.org/doc/draft-ietf-oauth-identity-chaining/ >>> >> >>> >> On Wed, Feb 4, 2026 at 9:31āÆPM Brian Campbell <bcampbell= >>> >> 40pingidentity.com@dmarc.ietf.org> wrote: >>> >> >>> >>> Hi Tarun, >>> >>> >>> >>> As Aaron mentioned there are less tightly profiled variations of this >>> >>> general flow, like oauth-identity-chaining >>> >>> < >>> https://datatracker.ietf.org/doc/draft-ietf-oauth-identity-chaining/> >>> >>> or rfc8693 <https://datatracker.ietf.org/doc/html/rfc8693> + rfc7523 >>> >>> <https://datatracker.ietf.org/doc/html/rfc7523> together directly, >>> that >>> >>> don't have the same constraint regarding the IDP not issuing access >>> tokens >>> >>> in response to an ID-JAG it issued itself. Perhaps that might meet >>> your >>> >>> needs? Although those are intended for cross domain as well. >>> Honestly, much >>> >>> of this seems like more than is needed for a same idp / same domain >>> case. >>> >>> >>> >>> On Tue, Feb 3, 2026 at 8:13āÆPM Tarun Nanduri < >>> tarunnanduri7@gmail.com> >>> >>> wrote: >>> >>> >>> >>>> Dear Aaron, >>> >>>> >>> >>>> I am awaiting your feedback on this. To summarize, >>> >>>> >>> >>>> When an Identity Provider (IdP) does not support Single Sign-On >>> (SSO) >>> >>>> due to the nature of the systems involved, and a user needs to >>> transfer >>> >>>> their session to another application without re-logging in, I feel >>> ID-JAG >>> >>>> offers a secure and seamless solution, providing a smooth user >>> experience. >>> >>>> >>> >>>> The RFC, as stated in previous emails, explicitly prohibits using >>> the >>> >>>> specification within the same IdP. Considering the zero-trust model >>> >>>> typically applied within the same IdP, are we open to modifying the >>> >>>> specification to allow its implementation within such environments? >>> >>>> >>> >>>> Best Regards, >>> >>>> Tarun Nanduri. >>> >>>> >>> >>>> On Fri, Dec 5, 2025 at 8:46āÆAM Tarun Nanduri < >>> tarunnanduri7@gmail.com> >>> >>>> wrote: >>> >>>> >>> >>>>> Hi Aaron, >>> >>>>> >>> >>>>> Thanks for the response, and pointing me to the Identity Chaining >>> >>>>> draft. However, after looking at it, I don't think it applies to >>> the >>> >>>>> use-case I shared above (please feel free to correct here). It >>> looks like >>> >>>>> it's designed for cross-domain scenarios* whereas the use-case I >>> >>>>> shared above has*, >>> >>>>> >>> >>>>> - Both the clients are in same trust domain >>> >>>>> - We have single authorization server (it's the IdP too) >>> >>>>> >>> >>>>> The challenge we are trying to solve is, >>> >>>>> >>> >>>>> - Client A needs to transfer user session to client B >>> >>>>> - WITHOUT Client A sharing its access token with client B >>> >>>>> (security risk due to token exposure, invalid audience, >>> unnecessary >>> >>>>> privileges etc.) >>> >>>>> - Both clients trust the same IdP >>> >>>>> >>> >>>>> This is why we're intending to use RFC8693, but it still requires >>> >>>>> client A to send access token (after token exchange) to client B >>> which >>> >>>>> creates exposure we're trying to avoid. The ID-JAG pattern >>> (cryptographic >>> >>>>> proof of identity, not a usable token) would be perfect, except the >>> >>>>> prohibition defined in section 8.3 of Identity Assertion draft: >>> >>>>> 8.3. >>> >>>>> < >>> https://www.ietf.org/archive/id/draft-parecki-oauth-identity-assertion-authz-grant-05.html#section-8.3 >>> >Cross-Domain >>> >>>>> Use >>> >>>>> < >>> https://www.ietf.org/archive/id/draft-parecki-oauth-identity-assertion-authz-grant-05.html#name-cross-domain-use >>> > >>> >>>>> >>> >>>>> This specification is intended for cross-domain uses where the >>> Client, >>> >>>>> Resource App, and Identity Provider are all in different trust >>> domains. In >>> >>>>> particular, the Identity Provider MUST NOT issue access tokens in >>> >>>>> response to an ID-JAG it issued itself. Doing so could lead to >>> >>>>> unintentional broadening of the scope of authorization. >>> >>>>> My question remains, Can the section 8.3 prohibition be satisfied >>> with >>> >>>>> enough security controls (scope validation, replay prevention >>> etc.) for >>> >>>>> same IdP scenarios, or is it a hard limitation? >>> >>>>> >>> >>>>> Thanks and Regards, >>> >>>>> Tarun Nanduri. >>> >>>>> >>> >>>>> >>> >>>>> On Fri, Dec 5, 2025 at 1:53āÆAM Aaron Parecki <aaron@parecki.com> >>> >>>>> wrote: >>> >>>>> >>> >>>>>> Hi Tarun, >>> >>>>>> >>> >>>>>> It sounds like what you are looking for is the parent draft of >>> this >>> >>>>>> draft, Identity and Authorization Chaining Across Domains: >>> >>>>>> >>> https://datatracker.ietf.org/doc/draft-ietf-oauth-identity-chaining/ >>> >>>>>> >>> >>>>>> The document that defines the ID-JAG, Identity Assertion >>> >>>>>> Authorization Grant, is a special case of Identity Chaining where >>> both the >>> >>>>>> client and resource have a pre-existing relationship with the >>> same IdP. So >>> >>>>>> I don't view it as a limitation, it's actually an optimization >>> when there >>> >>>>>> is a common IdP. The Identity Chaining draft is the same as this >>> draft >>> >>>>>> except it doesn't specify the input token format or the reason >>> why the >>> >>>>>> client and resource trust the cross-domain JWT issuer. >>> >>>>>> >>> >>>>>> Aaron >>> >>>>>> >>> >>>>>> >>> >>>>>> >>> >>>>>> On Mon, Dec 1, 2025 at 8:11āÆAM Tarun Nanduri < >>> tarunnanduri7@gmail.com> >>> >>>>>> wrote: >>> >>>>>> >>> >>>>>>> Dear OAuth Working Group & Aaron, >>> >>>>>>> >>> >>>>>>> I would like to provide feedback on the OAuth Identity Assertion >>> >>>>>>> Authorization Grant (ID-JAG) specification, specifically >>> regarding >>> >>>>>>> the prohibition against same-IdP usage. >>> >>>>>>> >>> >>>>>>> Use Case: >>> >>>>>>> >>> >>>>>>> In microservices architectures using the same IdP, there is a >>> >>>>>>> legitimate need for service-to-service identity delegation >>> WITHOUT >>> >>>>>>> sharing access tokens directly: >>> >>>>>>> >>> >>>>>>> - Application A has a user-scoped token >>> >>>>>>> - Application A needs to invoke Application B on behalf of user >>> >>>>>>> - Sharing Token A with Application B creates security risks: >>> >>>>>>> * Token exposure between services >>> >>>>>>> * Replay attacks >>> >>>>>>> * Over-privileged access >>> >>>>>>> * Audience mismatch >>> >>>>>>> >>> >>>>>>> The Gap: >>> >>>>>>> >>> >>>>>>> ID-JAG's assertion pattern solves this perfectly: >>> >>>>>>> - Application A creates a cryptographic identity assertion >>> >>>>>>> - Assertion is audience-bound to Application B >>> >>>>>>> - Application B exchanges assertion for its own token >>> >>>>>>> - No credential sharing between services >>> >>>>>>> >>> >>>>>>> However, the same-IdP prohibition prevents this legitimate use >>> case. >>> >>>>>>> >>> >>>>>>> Suggestion: >>> >>>>>>> >>> >>>>>>> Consider either: >>> >>>>>>> 1. Removing the same-IdP prohibition with appropriate security >>> >>>>>>> guidance >>> >>>>>>> 2. Adding an exception for service-to-service delegation >>> scenarios >>> >>>>>>> 3. Providing guidance on how to achieve this pattern within the >>> same >>> >>>>>>> IdP >>> >>>>>>> >>> >>>>>>> RFC 8693 (Token Exchange) doesn't fully address this use case as >>> it >>> >>>>>>> requires sending the actual token (subject_token), which is what >>> >>>>>>> we're >>> >>>>>>> trying to avoid. >>> >>>>>>> >>> >>>>>>> Security Considerations: >>> >>>>>>> >>> >>>>>>> With zero-trust validation, same-IdP assertions can be just as >>> secure >>> >>>>>>> as cross-IdP: >>> >>>>>>> - Validate assertion issuer is authorized >>> >>>>>>> - Apply fresh authorization policy evaluation >>> >>>>>>> - Enforce audience restrictions >>> >>>>>>> - Use short-lived assertions >>> >>>>>>> - Implement scope intersection, not broadening >>> >>>>>>> >>> >>>>>>> Would appreciate the working group's consideration of this use >>> case. >>> >>>>>>> >>> >>>>>>> Best regards, >>> >>>>>>> Tarun Nanduri. >>> >>>>>>> >>> >>>>>> _______________________________________________ >>> >>>> OAuth mailing list -- oauth@ietf.org >>> >>>> To unsubscribe send an email to oauth-leave@ietf.org >>> >>>> >>> >>> >>> >>> *CONFIDENTIALITY NOTICE: This email may contain confidential and >>> >>> privileged material for the sole use of the intended recipient(s). >>> Any >>> >>> review, use, distribution or disclosure by others is strictly >>> prohibited. >>> >>> If you have received this communication in error, please notify the >>> sender >>> >>> immediately by e-mail and delete the message and any file >>> attachments from >>> >>> your computer. Thank you.* >>> >>> _______________________________________________ >>> >>> OAuth mailing list -- oauth@ietf.org >>> >>> To unsubscribe send an email to oauth-leave@ietf.org >>> >>> >>> >> >>> -------------- next part -------------- >>> A message part incompatible with plain text digests has been removed ... >>> Name: not available >>> Type: text/html >>> Size: 16713 bytes >>> Desc: not available >>> >>> ------------------------------ >>> >>> Subject: Digest Footer >>> >>> _______________________________________________ >>> OAuth mailing list -- oauth@ietf.org >>> To unsubscribe send an email to oauth-leave@ietf.org >>> >>> >>> ------------------------------ >>> >>> End of OAuth Digest, Vol 208, Issue 19 >>> ************************************** >>> >> >> >> -- >> Chris Keogh >> _______________________________________________ >> OAuth mailing list -- oauth@ietf.org >> To unsubscribe send an email to oauth-leave@ietf.org >> > -- Chris Keogh
- [OAUTH-WG] Re: OAuth Digest, Vol 208, Issue 19 Chris Keogh
- [OAUTH-WG] Re: OAuth Digest, Vol 208, Issue 19 Karl McGuinness
- [OAUTH-WG] Re: OAuth Digest, Vol 208, Issue 19 Chris Keogh
- [OAUTH-WG] Re: OAuth Digest, Vol 208, Issue 19 Atul Tulshibagwale