[Openid-specs-mobile-profile] [Async JWT Profile] draft-oauth-versatile-jwt-profile-01

nicolas.aillery at orange.com nicolas.aillery at orange.com
Wed Mar 29 13:46:56 UTC 2017


Hi James,

  Thanks for the review.

   Here are my comments:


1.       This doesn't define general async capabilities for the /token endpoint. It defines async for the one specific case of swapping a JWT for an access token.

--[Nicolas]-- The goal of this spec is to propose an async extension to the JWT Bearer grant type defined in RFC7523. This will cover the GSMA needs. We could also define a generic way to offer async capabilities to /token, extending the RFC6749 (OAuth 2.0). This would entail 3 specifications: "Async /token", then "Async JWT profile" (the current draft), then "server-to-server Connect profile". I'd like the advice of the working group on these approaches. On my side, both are Ok.



2.       Separate grant_type values indicating poll & push support would be better than one ...jwt-bearer:versatile value. The client needs to know the difference to know whether or not to include a client_notification_token (and whether or not it needs to be listening for notifications). The AS needs to know the difference to respond correctly. Separate values allow the AS to indicate support for poll, push, both, or neither by listing 0, 1 or both separate values in grant_types_supported in its metadata.

--[Nicolas]-- OK to support 3 grant-types: 'push' and 'poll' in the first request then 'polling' in the polling request. I think the grant_type 'both' is not necessary. I'll update the draft.



3.       A POSTed notification doesn't have an HTTP status code to distinguish success and error; both are JSON objects. The spec should explicitly state that the absence or presence of an "error" member in the JSON object distinguishes these cases.

[Nicolas]-- Neither CIBA nor UserQuestioning have a status code in notifications. In UQ, it was present in the first drafts and removed on working group's request. I suggest to use no 'status', except if the working group changes its mind.



4.       The properties required for a transaction_id are not clear, and I suspect they are quite different for the poll & push cases. Can it be a counter (1,2,3,...)? Can it repeat after the "expires_in" time? In the polling case, transaction_id acts as a bearer token; it would be better renamed poll_token. In the push case, it can probably be ignored as the client can use client_notification_token to link request & notification.

--[Nicolas]-- A counter could be OK, but as Client authentication is optional in RFC7523, it's better to have a random transaction_id with good entropy and no repeatition. I'll update the draft to mention it. As the client_notification_token is chosen by the Client, it's good to keep the transaction_id so that there can be entropy in the notification even when the Client enforces low security in its client_notification_token.



5.       Is it okay for a client to always use the same client_notification_token with a given AS (basically treat it as the AS's password)? Probably yes, just not recommended due to revocation implications.

--[Nicolas]-- It's Ok but not recommended for a Client to reuse the client_notification_token. Can you detail what you mean by "revocation implications", not sure to understand?



6.       Need IANA registrations for client_notification_token, transaction_id (or whatever it is renamed to), authorization_pending, slow_down, and the other error codes if existing ones cannot be reused

--[Nicolas]-- Ok for "client_notification_token", "transaction_id" and the "invalid_transaction_id" error. Other errors come from "draft-ietf-oauth-device-flow-05", shall we refer to this draft?

Regards,

Nicolas


De : Manger, James [mailto:James.H.Manger at team.telstra.com]
Envoyé : mercredi 29 mars 2017 03:42
À : AILLERY Nicolas IMT/OLPS; openid-specs-mobile-profile at lists.openid.net
Objet : RE: [Openid-specs-mobile-profile] [Async JWT Profile] draft-oauth-versatile-jwt-profile-01

Hi Nicolas,

A couple of comments on the Async JWT Profile:


1.       This doesn't define general async capabilities for the /token endpoint. It defines async for the one specific case of swapping a JWT for an access token.

2.       Separate grant_type values indicating poll & push support would be better than one ...jwt-bearer:versatile value. The client needs to know the difference to know whether or not to include a client_notification_token (and whether or not it needs to be listening for notifications). The AS needs to know the difference to respond correctly. Separate values allow the AS to indicate support for poll, push, both, or neither by listing 0, 1 or both separate values in grant_types_supported in its metadata.

3.       A POSTed notification doesn't have an HTTP status code to distinguish success and error; both are JSON objects. The spec should explicitly state that the absence or presence of an "error" member in the JSON object distinguishes these cases.

4.       The properties required for a transaction_id are not clear, and I suspect they are quite different for the poll & push cases. Can it be a counter (1,2,3,...)? Can it repeat after the "expires_in" time? In the polling case, transaction_id acts as a bearer token; it would be better renamed poll_token. In the push case, it can probably be ignored as the client can use client_notification_token to link request & notification.

5.       Is it okay for a client to always use the same client_notification_token with a given AS (basically treat it as the AS's password)? Probably yes, just not recommended due to revocation implications.

6.       Need IANA registrations for client_notification_token, transaction_id (or whatever it is renamed to), authorization_pending, slow_down, and the other error codes if existing ones cannot be reused

--
James Manger

From: Openid-specs-mobile-profile [mailto:openid-specs-mobile-profile-bounces at lists.openid.net] On Behalf Of nicolas.aillery at orange.com<mailto:nicolas.aillery at orange.com>
Sent: Wednesday, 29 March 2017 12:44 AM
To: openid-specs-mobile-profile at lists.openid.net<mailto:openid-specs-mobile-profile at lists.openid.net>
Subject: [Openid-specs-mobile-profile] [Async JWT Profile] draft-oauth-versatile-jwt-profile-01

Hello everybody,

   Please find in attachment a first draft of a JWT Assertion profile enabling both synchronous and asynchronous interactions.

   Your review will be welcome,

Regards,

Nicolas

_________________________________________________________________________________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs-mobile-profile/attachments/20170329/62d6949a/attachment-0001.html>


More information about the Openid-specs-mobile-profile mailing list