[OAUTH-WG] Re: OAuth Digest, Vol 208, Issue 19

Karl McGuinness <me@karlmcguinness.com> Tue, 10 February 2026 00:21 UTC

Return-Path: <me@karlmcguinness.com>
X-Original-To: oauth@mail2.ietf.org
Delivered-To: oauth@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 7755DB46832E for <oauth@mail2.ietf.org>; Mon, 9 Feb 2026 16:21:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=karlmcguinness.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZC7gYemxBA2J for <oauth@mail2.ietf.org>; Mon, 9 Feb 2026 16:21:22 -0800 (PST)
Received: from mail-wm1-x336.google.com (mail-wm1-x336.google.com [IPv6:2a00:1450:4864:20::336]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 1DD21B468320 for <oauth@ietf.org>; Mon, 9 Feb 2026 16:21:22 -0800 (PST)
Received: by mail-wm1-x336.google.com with SMTP id 5b1f17b1804b1-4805ef35864so43013815e9.0 for <oauth@ietf.org>; Mon, 09 Feb 2026 16:21:22 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; t=1770682875; cv=none; d=google.com; s=arc-20240605; b=lxBcURuXVvmEBJ2+SRUu77QnatiICqB/lociqapuOp5rlMgoV9I2rosOYTvdHXv/Vp B/oY0WIn/JMNQvO/RYuGsaJz/Blj1V/VbfMkZ1UI/XzZpk/Ta9T5Vn3hlfNxwtcfYy/h bMaamGK2RcK7hi/DymnfxYH4fo5ab+r9DcxxEsKhInvZX2TKPpLhaMeONsWo9AIt0kFb dt5bJiy5g+3QMrlQZ1JLHAUY7tRFj3C5eRTOFLrMOgkoO8uM/jPgl+1XHBrQxxBpevCM I+bIF36FCkcvAKGxldF5oWu3TEGPPISa/kOHbUZ9xUBhrrfXI5uiJ8x/xYu/KEy4O8/7 Uf1g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20240605; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:dkim-signature; bh=hu03JRUjH1yWiZaSvhHLSYUzHwMeCt/jIRw5bhwwatQ=; fh=MD43wD4krF/RMxeaTZU16gwGJRgIhZlKH1M33xDH2no=; b=D/WbWuMqaM+0s2ERB/SFtBoDvPaCLgfj0aOEhr22lcdEb+mmlLcImdLrpKMqFm/orc xaco9KeiWfY/gVHQT9toRS8fdneP+I1aGEs2MBVn+YayhWBcZ4SvlKYU/9+CXlk5AG+p s+PzXy/FHstksCT5HRvGtfXNWRappkiu0FnFeENTVhie5DOGP4K6KOqR73zRJAYTIQWG Fi7I5R4QRRu0dcvgzYyaVpXwEZyJUy1u9Kr4jHxYYNFZEjJAET2Rv9+AGpNMsy/ve8Pf ti2F3Oli7Ot8+APwoVStRnFWcvOfARpb1RLAjD2IDGSQN/TH7eUHexza3QSOtaAwupwM B+vQ==; darn=ietf.org
ARC-Authentication-Results: i=1; mx.google.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=karlmcguinness.com; s=google; t=1770682875; x=1771287675; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=hu03JRUjH1yWiZaSvhHLSYUzHwMeCt/jIRw5bhwwatQ=; b=KkNNJPuTYEcKnpz3z1T8tgC+cEbSmVy01aFqpHs58ErHsipsQLO62emWGWQCO9apJV 3ywh4Ktv91EA9FQc8G58JQQGtKHgccIJSSi++cWvD1ZFmcupMbQoMIkkUpCA7+Mk6fdN 2bxr29pMkb1f1jqnMRSx+92BNeEit6DGEIZRPJLyM7AY6iMM2gBrNPVP7vl0dgmsOksr RtvJVqbdwYu1FrstgCS738RcI/7zZVxS+A6yI123HhkE1XNX0R8Z7Vgl92zXifnZ6rGr YSDcDZ1PxqQbWJN2X6yucspKP+E2EaKjj2jNb9SDhp987G/G9oqH2npHXBihrzoIJ0ns i6aQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1770682875; x=1771287675; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-gg:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=hu03JRUjH1yWiZaSvhHLSYUzHwMeCt/jIRw5bhwwatQ=; b=S88Joa0gvbwZfTR6a6xHEVKI0Luq9GLONaWm52i/njJHerUPBJJLYWkyRvckXbhfdt nVwFZRDRQFniXQIlzysuaojFZRpgGn72uOH7dUy0Gh4LWgRe86tK96gO3cxs0F0AQS9G Vvxw83+oABF7udabRq7E2K3UVBNCvLiJ54HIVKgWn3COeCLpCgDT6skup67dN9wSNYfg OMQkWyp2FYTxAy0yuIoWB/2WUl9KD7A1h3uAJlRalpI7R2KYtnPzbAhVVqCW5Wtqd7kr 8WNwceeH9EvVuZBt6J2iFhK41FNUZdL5mflKNvoRCB8iSpp59hS2j6RHWVjDHrMfU6qk ApZQ==
X-Gm-Message-State: AOJu0YyIuU0+ndbDq4miv9/c2fVtwC07x6Fp/jVNjVLWtVLakjZSoxky hYyHRkNKALwG4N2uYtjTBVjJ6lOr6sqQxqKtMPU/RkYC5m/qrFovt7eDxCIYRQJXORjGInGb6r8 x7X2WNfzbL56+IOIhsEw4VRn5ruRavwWXUYZG4x2gnw==
X-Gm-Gg: AZuq6aIhVkcvppQPWLVMZVJx4r3z9hdlpnXxb7rNazryOahhPUAG2AHeQtzuvW2bNg3 QqV3mSGs9M9VJXcgCaPu0JP4QPQuPqg/WQWb/S/T6jsOnmIO/5FRrTbVlR/cHvQl1uD7nt6GDRT NawNerD2GZjxGMujGCWrfjezgUOKTmuk/e6gvGwooyCuB63uMhOyuQoOXgIGihUecffZfu0DCOR PrT4txwwzFjORVLfZIZmzA4MJ7oW5tO6H1h9KyBlgeGtRl1ftXD/IcPJCtMFJXfyEFSYPDfrDGN yE58B5gcWPb3ERJhCIuG0gRqQ9Lhggo2HQopXNlZKAwNLdy+usofBJdm9N3GHZgDWbTgPxW2HnQ jnWCT5g==
X-Received: by 2002:a05:600c:3b92:b0:480:68ed:1e70 with SMTP id 5b1f17b1804b1-48350835eecmr5867285e9.35.1770682875343; Mon, 09 Feb 2026 16:21:15 -0800 (PST)
MIME-Version: 1.0
References: <177064881569.2608.14701868528558862560@mail2.ietf.org> <CADo7KwaUWahs-0gO9-D=LHnzWZk08NOkU-Zaiq8T2-uoQFFPSQ@mail.gmail.com>
In-Reply-To: <CADo7KwaUWahs-0gO9-D=LHnzWZk08NOkU-Zaiq8T2-uoQFFPSQ@mail.gmail.com>
From: Karl McGuinness <me@karlmcguinness.com>
Date: Mon, 09 Feb 2026 16:21:03 -0800
X-Gm-Features: AZwV_QgRHlhKCd89ZFUfTSht5MChRlL44aUrfafSzN1AAjWt0QT-7UYQSdzt3l8
Message-ID: <CAPVrLW2X2HNUZt3qV6u71Ns3sf3Z5OoBKQLV93fqGk3pXGrWdg@mail.gmail.com>
To: Chris Keogh <christopher.keogh@gmail.com>
Content-Type: multipart/alternative; boundary="000000000000cb8342064a6d3bc7"
Message-ID-Hash: SC5IKVIGFTBDAFYCIYYJJDNNLUXKAZUE
X-Message-ID-Hash: SC5IKVIGFTBDAFYCIYYJJDNNLUXKAZUE
X-MailFrom: me@karlmcguinness.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-oauth.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: oauth@ietf.org
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [OAUTH-WG] Re: OAuth Digest, Vol 208, Issue 19
List-Id: OAUTH WG <oauth.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/qhHF6kQdQ5fZa89D8yp-Q5kquvs>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Owner: <mailto:oauth-owner@ietf.org>
List-Post: <mailto:oauth@ietf.org>
List-Subscribe: <mailto:oauth-join@ietf.org>
List-Unsubscribe: <mailto:oauth-leave@ietf.org>

@Chris, I think this topic might be more relevant to the OpenID Connect A/B
working group (https://openid.net/wg/connect/) as it appears to be a SSO
use case.  The OpenID Native SSO spec (
https://openid.net/specs/openid-connect-native-sso-1_0.html) supports 1
type of flow and vendors such as Okta support Mobile to Web SSO
https://developer.okta.com/docs/guides/native-to-web-sso/main/ using
proprietary mechanism.  There are a lot of security considerations/caveats
with this type of flow that would be best answered in the OIDC WG.

-Karl

On Mon, Feb 9, 2026 at 1:17 PM Chris Keogh <christopher.keogh@gmail.com>
wrote:

> Hi there all,
>
> I'm dealing with a similar scenario that Tarun is highlighting and thought
> I'd chime in to make it more concrete.
>
> We have a mobile application and a web application that both use the same
> IdP/AS. The mobile client (public+PKCE) uses long lived refresh tokens and
> only requires the user to log in once (via the system browser) to retrieve
> the access/refresh token combination. From this point on the user is
> considered signed in to the mobile application, but the session at the IdP
> will quickly expire (and the session/auth cookie in the system browser with
> it).
>
> We'd like to be able to embed web views within the mobile application that
> are hosted by our web app without the user having to sign in again.
>
> I've been thinking about using something along the lines of Identity
> chaining or JWT authorization (with DPoP) to retrieve one time use short
> lived access tokens that can be used by the mobile client to query an
> endpoint which signs the user in and returns the contents of the IdP
> session cookies to the mobile application, which then injects the cookies
> into an embedded browser (not the system browser) which then loads the web
> view which goes through the standard auth code flow.
>
> As Tarun points out, it feels like there's a gap in the standards where
> this kind of thing isn't really addressed. Potentially it's more of an OIDC
> problem?
>
>
> On Tue, 10 Feb 2026 at 03:54, <oauth-request@ietf.org> wrote:
>
>> Send OAuth mailing list submissions to
>>         oauth@ietf.org
>>
>> To subscribe or unsubscribe via email, send a message with subject or
>> body 'help' to
>>         oauth-request@ietf.org
>>
>> You can reach the person managing the list at
>>         oauth-owner@ietf.org
>>
>> When replying, please edit your Subject line so it is more specific
>> than "Re: Contents of OAuth digest..."
>>
>> Today's Topics:
>>
>>    1. Re: Feedback on ID-JAG same IdP prohibition - Application to
>> Application Delegation
>>       (Pieter Kasselman)
>>
>>
>> ----------------------------------------------------------------------
>>
>> Message: 1
>> Date: Mon, 9 Feb 2026 14:53:14 +0000
>> From: Pieter Kasselman <pieter@defakto.security>
>> Subject: [OAUTH-WG] Re: Feedback on ID-JAG same IdP prohibition -
>>         Application to Application Delegation
>> To: Tarun Nanduri <tarunnanduri7@gmail.com>
>> Cc: Brian Campbell <bcampbell=40pingidentity.com@dmarc.ietf.org>,
>>         oauth@ietf.org
>> Message-ID:
>>         <
>> CALtWOA1KWhq8diBTA9J52GcGqHNHQgEL+oWfJY9SJL_DPiqf0g@mail.gmail.com>
>> Content-Type: multipart/alternative;
>>         boundary="0000000000000d50df064a654dc1"
>>
>> Hi Tarun, for the original use case you described, you may want to
>> consider
>> the transaction token spec [1].
>>
>> It was specifically developed to allow authorization context, including
>> user and workload/microservice identity information, to be passed between
>> microservices within a domain, without having to pass around access
>> tokens.
>>
>> Cheers
>>
>> Pieter
>>
>> [1]
>> https://datatracker.ietf.org/doc/draft-ietf-oauth-transaction-tokens/07/
>>
>> On Sun, Feb 8, 2026 at 8:02 AM Tarun Nanduri <tarunnanduri7@gmail.com>
>> wrote:
>>
>> > Hi Pieter, Brian, Aaron, and the WG,
>> >
>> > Thanks for the feedback and for taking the time to look at this. I’ve
>> been
>> > thinking over the points about Section 8.3 and the general intent of
>> ID-JAG.
>> >
>> > Stepping back from the specific spec for a second, it feels to me like
>> we
>> > have a bit of a gap in the OAuth/OIDC specifications. We’re essentially
>> > looking for a standard way to do Directed Session Transfer, in
>> environments
>> > where shared cookies/SSO just aren't an option for security reasons.
>> >
>> > You pointed toward the Identity Chaining Across Domains draft as the
>> > intended home for this, and I see the logic—since the AS in Domain A
>> > generates the JWT grant, it handles the "identity proof" part of the
>> > handover.
>> >
>> > But right now, if I want to move a user from App A to App B without a
>> > fresh login, the options still feel a bit thin:
>> >
>> >    - Standard SSO is off the table because of the "no-shared-cookie"
>> >    constraint.
>> >    - RFC 8693 is a great building block, but it’s mostly used for
>> >    service-to-service backend swaps. There isn't really a front-channel
>> >    "profile" for this (as RFC863 sends back a usable token rather than
>> an
>> >    assertion).
>> >    - Identity Chaining, as Brian mentioned, is explicitly a
>> specification
>> >    for cross-domain use.
>> >
>> >
>> > It feels a bit ironic that the protocol makes "Cross-Domain" identity
>> > transfers standardized via ID-JAG (as an OAuth native grant), but leaves
>> > "Intra-Domain" delegation as a "roll-your-own" exercise. Without a
>> standard
>> > profile for this, people might just end up building non-standard hacks
>> > which is exactly what we’re trying to avoid.
>> >
>> > I’m not trying to force a change to ID-JAG if the WG feels it’s the
>> wrong
>> > home, but I am curious:
>> >
>> >    - Do we think this "Directed Session transfer" pattern is a gap worth
>> >    filling?
>> >
>> > It feels to me like there should be an "OAuth-native" way to do this
>> that
>> > has the right guardrails (audience binding, act claims, etc.) to make it
>> > secure in a Zero Trust setup, but is as straightforward to implement as
>> a
>> > basic Auth Code grant. I’d love to hear if anyone else sees this gap,
>> or if
>> > there's a pattern I’m missing that doesn't involve a lot of custom
>> "glue"
>> > code.
>> >
>> > Best Regards,
>> > Tarun Nanduri.
>> >
>> > On Thu, Feb 5, 2026 at 6:14 PM Pieter Kasselman <pieter@defakto.security
>> >
>> > wrote:
>> >
>> >> Hi Tarun
>> >>
>> >> I agree with Brain and Aaron that your use case can likely be addressed
>> >> by the Identity and Authorization Chaining Across Domains draft [1].
>> You
>> >> could always profile it further if needed. Is there a reason you would
>> not
>> >> be able to use that draft?
>> >>
>> >> Cheers
>> >>
>> >> Pieter
>> >>
>> >> [1]
>> https://datatracker.ietf.org/doc/draft-ietf-oauth-identity-chaining/
>> >>
>> >> On Wed, Feb 4, 2026 at 9:31 PM Brian Campbell <bcampbell=
>> >> 40pingidentity.com@dmarc.ietf.org> wrote:
>> >>
>> >>> Hi Tarun,
>> >>>
>> >>> As Aaron mentioned there are less tightly profiled variations of this
>> >>> general flow, like oauth-identity-chaining
>> >>> <https://datatracker.ietf.org/doc/draft-ietf-oauth-identity-chaining/
>> >
>> >>> or rfc8693 <https://datatracker.ietf.org/doc/html/rfc8693> + rfc7523
>> >>> <https://datatracker.ietf.org/doc/html/rfc7523> together directly,
>> that
>> >>> don't have the same constraint regarding the IDP not issuing access
>> tokens
>> >>> in response to an ID-JAG it issued itself. Perhaps that might meet
>> your
>> >>> needs? Although those are intended for cross domain as well.
>> Honestly, much
>> >>> of this seems like more than is needed for a same idp / same domain
>> case.
>> >>>
>> >>> On Tue, Feb 3, 2026 at 8:13 PM Tarun Nanduri <tarunnanduri7@gmail.com
>> >
>> >>> wrote:
>> >>>
>> >>>> Dear Aaron,
>> >>>>
>> >>>> I am awaiting your feedback on this. To summarize,
>> >>>>
>> >>>> When an Identity Provider (IdP) does not support Single Sign-On (SSO)
>> >>>> due to the nature of the systems involved, and a user needs to
>> transfer
>> >>>> their session to another application without re-logging in, I feel
>> ID-JAG
>> >>>> offers a secure and seamless solution, providing a smooth user
>> experience.
>> >>>>
>> >>>> The RFC, as stated in previous emails, explicitly prohibits using the
>> >>>> specification within the same IdP. Considering the zero-trust model
>> >>>> typically applied within the same IdP, are we open to modifying the
>> >>>> specification to allow its implementation within such environments?
>> >>>>
>> >>>> Best Regards,
>> >>>> Tarun Nanduri.
>> >>>>
>> >>>> On Fri, Dec 5, 2025 at 8:46 AM Tarun Nanduri <
>> tarunnanduri7@gmail.com>
>> >>>> wrote:
>> >>>>
>> >>>>> Hi Aaron,
>> >>>>>
>> >>>>> Thanks for the response, and pointing me to the Identity Chaining
>> >>>>> draft. However, after looking at it, I don't think it applies to the
>> >>>>> use-case I shared above (please feel free to correct here). It
>> looks like
>> >>>>> it's designed for cross-domain scenarios* whereas the use-case I
>> >>>>> shared above has*,
>> >>>>>
>> >>>>>    - Both the clients are in same trust domain
>> >>>>>    - We have single authorization server (it's the IdP too)
>> >>>>>
>> >>>>> The challenge we are trying to solve is,
>> >>>>>
>> >>>>>    - Client A needs to transfer user session to client B
>> >>>>>    - WITHOUT Client A sharing its access token with client B
>> >>>>>    (security risk due to token exposure, invalid audience,
>> unnecessary
>> >>>>>    privileges etc.)
>> >>>>>    - Both clients trust the same IdP
>> >>>>>
>> >>>>> This is why we're intending to use RFC8693, but it still requires
>> >>>>> client A to send access token (after token exchange) to client B
>> which
>> >>>>> creates exposure we're trying to avoid. The ID-JAG pattern
>> (cryptographic
>> >>>>> proof of identity, not a usable token) would be perfect, except the
>> >>>>> prohibition defined in section 8.3 of Identity Assertion draft:
>> >>>>> 8.3.
>> >>>>> <
>> https://www.ietf.org/archive/id/draft-parecki-oauth-identity-assertion-authz-grant-05.html#section-8.3
>> >Cross-Domain
>> >>>>> Use
>> >>>>> <
>> https://www.ietf.org/archive/id/draft-parecki-oauth-identity-assertion-authz-grant-05.html#name-cross-domain-use
>> >
>> >>>>>
>> >>>>> This specification is intended for cross-domain uses where the
>> Client,
>> >>>>> Resource App, and Identity Provider are all in different trust
>> domains. In
>> >>>>> particular, the Identity Provider MUST NOT issue access tokens in
>> >>>>> response to an ID-JAG it issued itself. Doing so could lead to
>> >>>>> unintentional broadening of the scope of authorization.
>> >>>>> My question remains, Can the section 8.3 prohibition be satisfied
>> with
>> >>>>> enough security controls (scope validation, replay prevention etc.)
>> for
>> >>>>> same IdP scenarios, or is it a hard limitation?
>> >>>>>
>> >>>>> Thanks and Regards,
>> >>>>> Tarun Nanduri.
>> >>>>>
>> >>>>>
>> >>>>> On Fri, Dec 5, 2025 at 1:53 AM Aaron Parecki <aaron@parecki.com>
>> >>>>> wrote:
>> >>>>>
>> >>>>>> Hi Tarun,
>> >>>>>>
>> >>>>>> It sounds like what you are looking for is the parent draft of this
>> >>>>>> draft, Identity and Authorization Chaining Across Domains:
>> >>>>>>
>> https://datatracker.ietf.org/doc/draft-ietf-oauth-identity-chaining/
>> >>>>>>
>> >>>>>> The document that defines the ID-JAG, Identity Assertion
>> >>>>>> Authorization Grant, is a special case of Identity Chaining where
>> both the
>> >>>>>> client and resource have a pre-existing relationship with the same
>> IdP. So
>> >>>>>> I don't view it as a limitation, it's actually an optimization
>> when there
>> >>>>>> is a common IdP. The Identity Chaining draft is the same as this
>> draft
>> >>>>>> except it doesn't specify the input token format or the reason why
>> the
>> >>>>>> client and resource trust the cross-domain JWT issuer.
>> >>>>>>
>> >>>>>> Aaron
>> >>>>>>
>> >>>>>>
>> >>>>>>
>> >>>>>> On Mon, Dec 1, 2025 at 8:11 AM Tarun Nanduri <
>> tarunnanduri7@gmail.com>
>> >>>>>> wrote:
>> >>>>>>
>> >>>>>>> Dear OAuth Working Group & Aaron,
>> >>>>>>>
>> >>>>>>> I would like to provide feedback on the OAuth Identity Assertion
>> >>>>>>> Authorization Grant (ID-JAG) specification, specifically regarding
>> >>>>>>> the prohibition against same-IdP usage.
>> >>>>>>>
>> >>>>>>> Use Case:
>> >>>>>>>
>> >>>>>>> In microservices architectures using the same IdP, there is a
>> >>>>>>> legitimate need for service-to-service identity delegation WITHOUT
>> >>>>>>> sharing access tokens directly:
>> >>>>>>>
>> >>>>>>> - Application A has a user-scoped token
>> >>>>>>> - Application A needs to invoke Application B on behalf of user
>> >>>>>>> - Sharing Token A with Application B creates security risks:
>> >>>>>>>   * Token exposure between services
>> >>>>>>>   * Replay attacks
>> >>>>>>>   * Over-privileged access
>> >>>>>>>   * Audience mismatch
>> >>>>>>>
>> >>>>>>> The Gap:
>> >>>>>>>
>> >>>>>>> ID-JAG's assertion pattern solves this perfectly:
>> >>>>>>> - Application A creates a cryptographic identity assertion
>> >>>>>>> - Assertion is audience-bound to Application B
>> >>>>>>> - Application B exchanges assertion for its own token
>> >>>>>>> - No credential sharing between services
>> >>>>>>>
>> >>>>>>> However, the same-IdP prohibition prevents this legitimate use
>> case.
>> >>>>>>>
>> >>>>>>> Suggestion:
>> >>>>>>>
>> >>>>>>> Consider either:
>> >>>>>>> 1. Removing the same-IdP prohibition with appropriate security
>> >>>>>>> guidance
>> >>>>>>> 2. Adding an exception for service-to-service delegation scenarios
>> >>>>>>> 3. Providing guidance on how to achieve this pattern within the
>> same
>> >>>>>>> IdP
>> >>>>>>>
>> >>>>>>> RFC 8693 (Token Exchange) doesn't fully address this use case as
>> it
>> >>>>>>> requires sending the actual token (subject_token), which is what
>> >>>>>>> we're
>> >>>>>>> trying to avoid.
>> >>>>>>>
>> >>>>>>> Security Considerations:
>> >>>>>>>
>> >>>>>>> With zero-trust validation, same-IdP assertions can be just as
>> secure
>> >>>>>>> as cross-IdP:
>> >>>>>>> - Validate assertion issuer is authorized
>> >>>>>>> - Apply fresh authorization policy evaluation
>> >>>>>>> - Enforce audience restrictions
>> >>>>>>> - Use short-lived assertions
>> >>>>>>> - Implement scope intersection, not broadening
>> >>>>>>>
>> >>>>>>> Would appreciate the working group's consideration of this use
>> case.
>> >>>>>>>
>> >>>>>>> Best regards,
>> >>>>>>> Tarun Nanduri.
>> >>>>>>>
>> >>>>>> _______________________________________________
>> >>>> OAuth mailing list -- oauth@ietf.org
>> >>>> To unsubscribe send an email to oauth-leave@ietf.org
>> >>>>
>> >>>
>> >>> *CONFIDENTIALITY NOTICE: This email may contain confidential and
>> >>> privileged material for the sole use of the intended recipient(s). Any
>> >>> review, use, distribution or disclosure by others is strictly
>> prohibited.
>> >>> If you have received this communication in error, please notify the
>> sender
>> >>> immediately by e-mail and delete the message and any file attachments
>> from
>> >>> your computer. Thank you.*
>> >>> _______________________________________________
>> >>> OAuth mailing list -- oauth@ietf.org
>> >>> To unsubscribe send an email to oauth-leave@ietf.org
>> >>>
>> >>
>> -------------- next part --------------
>> A message part incompatible with plain text digests has been removed ...
>> Name: not available
>> Type: text/html
>> Size: 16713 bytes
>> Desc: not available
>>
>> ------------------------------
>>
>> Subject: Digest Footer
>>
>> _______________________________________________
>> OAuth mailing list -- oauth@ietf.org
>> To unsubscribe send an email to oauth-leave@ietf.org
>>
>>
>> ------------------------------
>>
>> End of OAuth Digest, Vol 208, Issue 19
>> **************************************
>>
>
>
> --
> Chris Keogh
> _______________________________________________
> OAuth mailing list -- oauth@ietf.org
> To unsubscribe send an email to oauth-leave@ietf.org
>