Re: [OAUTH-WG] OAuth 2.0 Token Exchange: An STS for the REST of Us

nov matake <matake@gmail.com> Mon, 21 December 2015 06:32 UTC

Return-Path: <matake@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 757C01A89C4 for <oauth@ietfa.amsl.com>; Sun, 20 Dec 2015 22:32:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.155
X-Spam-Level:
X-Spam-Status: No, score=0.155 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, FRT_BELOW2=2.154, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XKhYXwgFF4-O for <oauth@ietfa.amsl.com>; Sun, 20 Dec 2015 22:32:05 -0800 (PST)
Received: from mail-pa0-x233.google.com (mail-pa0-x233.google.com [IPv6:2607:f8b0:400e:c03::233]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 762151A89B9 for <oauth@ietf.org>; Sun, 20 Dec 2015 22:32:05 -0800 (PST)
Received: by mail-pa0-x233.google.com with SMTP id wq6so94446441pac.1 for <oauth@ietf.org>; Sun, 20 Dec 2015 22:32:05 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=content-type:mime-version:subject:from:in-reply-to:date:cc :message-id:references:to; bh=iFxYBUxfy2kzlwPkWzZdhrAYMd70E1uhKXnWde6D3A4=; b=E6pcf/l2T25sRhrrOEvlC0hJDhCq6DnJA8U25MnwXjpKbWC89cJOgWQztpAzMKx5CH Kn30eIpRFoOdvyYcvjzkLHFGo93N8OWa/piTbBe9AxbJhw06xv8HZUZUPJ6SJOaOUAYf WKMP0PYSEFYnm7wKGngnxlgCtEkqB8AURGSPM2EVGE77Hr6PLmYE7UG+O0GVGEK1lUXF JRlmE8/6kF3GaD3IoK5z1E8tzzGfXvDz0+dNRTpMqfEltf+5gcE8EhXrh78BKwATnY3a qj9iW/LoNrgkiQUNVkgNA+2iGbizS2F81H3pht4zRKPffnZBG/f95PNEVu7LIrLnjnxL 3Eww==
X-Received: by 10.66.100.163 with SMTP id ez3mr24739582pab.5.1450679525119; Sun, 20 Dec 2015 22:32:05 -0800 (PST)
Received: from tovan.intra.gree-office.net ([27.110.57.140]) by smtp.gmail.com with ESMTPSA id e74sm29314428pfb.91.2015.12.20.22.32.03 (version=TLSv1/SSLv3 cipher=OTHER); Sun, 20 Dec 2015 22:32:04 -0800 (PST)
Content-Type: multipart/alternative; boundary="Apple-Mail=_6F0CC499-1DE4-45C1-960F-1056FEF7BE22"
Mime-Version: 1.0 (Mac OS X Mail 9.2 \(3112\))
From: nov matake <matake@gmail.com>
In-Reply-To: <BY2PR03MB442F1857A7B1936D83F18DCF5ED0@BY2PR03MB442.namprd03.prod.outlook.com>
Date: Mon, 21 Dec 2015 15:32:02 +0900
Message-Id: <B47840DC-D6C6-4F94-B866-7C302A2B7940@gmail.com>
References: <BY2PR03MB442F1857A7B1936D83F18DCF5ED0@BY2PR03MB442.namprd03.prod.outlook.com>
To: Mike Jones <Michael.Jones@microsoft.com>
X-Mailer: Apple Mail (2.3112)
Archived-At: <http://mailarchive.ietf.org/arch/msg/oauth/zrcl8jv7aWGs2y0ytF3ePC1KTG0>
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth 2.0 Token Exchange: An STS for the REST of Us
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 21 Dec 2015 06:32:07 -0000

Hi Mike,

I’m planning to use Token Exchange spec for a use-case described bewlow.

1. a native app obtains an access_token & an id_token from an IdP
2. the native app passes the id_token to its own backend component
3. the backend component obtains an access token from the IdP using the id_token via token exchange

In this use-case, the IdP will issue an id_token like below gist.
https://gist.github.com/nov/d760b78c5cce8248b308

In the gist, “cnf” and “scopes" claim comes from OpenID Connect ACDC discussed in the NAPPS WG.
https://bitbucket.org/openid/napps/src/c22a2adb3f66f7a34fb599285720498782390f7d/draft-acdc-01.txt?at=default&fileviewer=file-view-default

And now I realized ACDC defines “scopes” claim and Token Exchange defines “scp”.
In my case, the first id_token will includes “scopes” claim, and the access token issued to the client's backend component includes “scp” claim.
It’s theoretically OK, but I prefer those two claims have the same name…

nov

> On Dec 14, 2015, at 17:05, Mike Jones <Michael.Jones@microsoft.com> wrote:
> 
> I’m happy to report that a substantially revised OAuth 2.0 Token Exchange draft has been published that enables a broad range of use cases, while still remaining as simple as possible.  This draft unifies the approaches taken in the previous working group draft and draft-campbell-oauth-sts, incorporating working group input from the in-person discussions in Prague and mailing list discussions.  Thanks to all for your interest in and contributions to OAuth Token Exchange!  Brian Campbell deserves special recognition for doing much of the editing heavy lifting for this draft.
>  
> The core functionality remains token type independent.  That said, new claims are also defined to enable representation of delegation actors in JSON Web Tokens (JWTs).  Equivalent claims could be defined for other token types by other specifications.
>  
> See the Document History section for a summary of the changes made.  Please check it out!
>  
> The specification is available at:
> ·       http://tools.ietf.org/html/draft-ietf-oauth-token-exchange-03 <http://tools.ietf.org/html/draft-ietf-oauth-token-exchange-03>
>  
> An HTML-formatted version is also available at:
> ·       http://self-issued.info/docs/draft-ietf-oauth-token-exchange-03.html <http://self-issued.info/docs/draft-ietf-oauth-token-exchange-03.html>
>  
>                                                           -- Mike
>  
> P.S.  This note was also posted at http://self-issued.info/?p=1509 <http://self-issued.info/?p=1509> and as @selfissued <https://twitter.com/selfissued>.
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org <mailto:OAuth@ietf.org>
> https://www.ietf.org/mailman/listinfo/oauth <https://www.ietf.org/mailman/listinfo/oauth>