Re: [OAUTH-WG] Token Mediating and session Information Backend For Frontend (TMI BFF)

Dominick Baier <dbaier@leastprivilege.com> Wed, 17 February 2021 08:27 UTC

Return-Path: <dbaier@leastprivilege.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 099BE3A17F8 for <oauth@ietfa.amsl.com>; Wed, 17 Feb 2021 00:27:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.896
X-Spam-Level:
X-Spam-Status: No, score=-1.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=leastprivilege-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tzJ1BGgAGYBs for <oauth@ietfa.amsl.com>; Wed, 17 Feb 2021 00:27:08 -0800 (PST)
Received: from mail-il1-x12f.google.com (mail-il1-x12f.google.com [IPv6:2607:f8b0:4864:20::12f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 655383A17F6 for <oauth@ietf.org>; Wed, 17 Feb 2021 00:27:08 -0800 (PST)
Received: by mail-il1-x12f.google.com with SMTP id p15so10570074ilq.8 for <oauth@ietf.org>; Wed, 17 Feb 2021 00:27:08 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=leastprivilege-com.20150623.gappssmtp.com; s=20150623; h=from:in-reply-to:references:mime-version:date:message-id:subject:to :cc; bh=dbSePIKpmTOlnKVHuBGZCCjDalfganB+BIs2o+Pl4zo=; b=ivjy3HUTCKtyOFSoW7N7kaxePzj4SG7xgWhLhB74lJuhgD+GpgeIVxOgUN0mjav6UF zCFXhm3E2ufoozYq/cHfzYPuj7o/88yFx6PMCckA+s0XSsnIdZDSE0VLLwgjkp6fOBSw Mp0LqHCKtjEmJgT8zWh8WnEL2n52nMihzLqor0/UJO+iQgM6ZVRKl4V9kbZguV4qS8Kx 2jwHKIwp/zLXL06feMlu+JGMlOFAN4DIVb+ON6N3+RHiOmn84ujKSXbSBK7MK/12/mez Lpf2FwMlxqbKgqrQaxI+yfrdXWawOgoJyP9YzvdIrb9BYgbEzdC3CcKpULMb71/CqnL4 4WNQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:in-reply-to:references:mime-version:date :message-id:subject:to:cc; bh=dbSePIKpmTOlnKVHuBGZCCjDalfganB+BIs2o+Pl4zo=; b=f8W1HtWytFPF6XyuOEmV7Ap5qFG38qJM53LgOMFXPaIIAD/dIcBky0alx2orwzz4Bq OFyCoM8vaDvVYy0+upv/jOca7XswaKl6XN05HEyb70PamhUVqSrDxiHT95L9A+ZjS7Tp 5us5Gm3oCIdPACGQ8yOfw0qonD6wu0gdSj2fVxtZZND/yIKWEhVpU3sAAWLWknhE44TE VYjyeCAyR4MJuujFIIku8UcUTEqkYJdAA3Pi/hwtwMSrHlfb+K03OWyKoC22ilg4nUpU Toyv1kr4uVvZhElxZiO5Sk6h/svEN3JPvSUmxoJT2HyZheovrNnfkF9bevY4fUT1DScI fu0A==
X-Gm-Message-State: AOAM531XbwLjcJlUKjeiXk+9DYHI0qs1yrbDg4VgDtuyp1ZG7e5r8fW5 zMVdA8VbYD4PmnqfvKznKrP2jheoneQunQjJGzEuOfu2LaGW
X-Google-Smtp-Source: ABdhPJztgpXem+xShD13lt4gNgl4oXJwRo5mHma1tHXrh8TWzm+XMm1v0Pk+qa3LJImuwrRfNg3TpWjtcMpuib8mpDw=
X-Received: by 2002:a92:d11:: with SMTP id 17mr21046670iln.57.1613550427429; Wed, 17 Feb 2021 00:27:07 -0800 (PST)
Received: from 1058052472880 named unknown by gmailapi.google.com with HTTPREST; Wed, 17 Feb 2021 00:27:06 -0800
From: Dominick Baier <dbaier@leastprivilege.com>
In-Reply-To: <CA+k3eCRzPuQPEMm6EB-xd58DeAB2MSBt_ywRxPOHhsECpg+zYA@mail.gmail.com>
References: <CO6PR18MB4052C85E4B5D5EE5E1DD357AAE899@CO6PR18MB4052.namprd18.prod.outlook.com> <5BE7C60F-84AB-431A-838F-D33459E551C6@lodderstedt.net> <CO6PR18MB4052CE7A7AFF1FAD39EDB90FAE899@CO6PR18MB4052.namprd18.prod.outlook.com> <16CA5346-48EF-4B29-8397-EE6312366C63@lodderstedt.net> <CA+k3eCRzPuQPEMm6EB-xd58DeAB2MSBt_ywRxPOHhsECpg+zYA@mail.gmail.com>
MIME-Version: 1.0
Date: Wed, 17 Feb 2021 00:27:06 -0800
Message-ID: <CAO7Ng+tkaBgyZEEzfcD7f1MiC2pWr7tuuX8+efEpstgaGfSk4w@mail.gmail.com>
To: Brian Campbell <bcampbell=40pingidentity.com@dmarc.ietf.org>, Torsten Lodderstedt <torsten@lodderstedt.net>
Cc: Vittorio Bertocci <vittorio.bertocci=40auth0.com@dmarc.ietf.org>, "oauth@ietf.org" <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000000df56105bb83fceb"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/rQbk0K2uCSOZA5yx4mpbXWSAU2g>
Subject: Re: [OAUTH-WG] Token Mediating and session Information Backend For Frontend (TMI BFF)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Feb 2021 08:27:10 -0000

Hey,

Tbh - I have a bit of a hard time to see why this requires a spec, if that
is all you are aiming at. Wouldn’t that be just an extension to the “OAuth
for web apps BCP?”.

All I can add here is - this approach would not work for any of our
customer. Because their real motivation is to implement a more and more
common security guideline these days - namely: “no JS-accessible tokens in
the browser” - but this document doesn’t cover this.

cheers
———
Dominick Baier

On 16. February 2021 at 22:01:37, Brian Campbell (
bcampbell=40pingidentity.com@dmarc.ietf.org) wrote:




On Mon, Feb 15, 2021 at 9:48 AM Torsten Lodderstedt <torsten@lodderstedt.net>
wrote:

> Thank you again for the explanation.
>
> I think your assumption about the overall flow should be described in the
> draft.
>

We did attempt to capture the assumptions in the draft but clearly could
have done a better job with it :)


>
> As I understand it now the core contribution of your proposal is to move
> refresh token management from frontend to backend. Is that correct?
>

 Taking that a bit further - the idea is that the backend takes on the
responsibilities of being a confidential client (client creds, token
acquisition, token management/persistence, etc.) to the external AS(s). And
TMI BFF describes a way for that backend to deliver access tokens to its
own frontend.

*CONFIDENTIALITY NOTICE: This email may contain confidential and privileged
material for the sole use of the intended recipient(s). Any review, use,
distribution or disclosure by others is strictly prohibited.  If you have
received this communication in error, please notify the sender immediately
by e-mail and delete the message and any file attachments from your
computer. Thank you.*_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth