[OpenID] OIDC federation using ID Tokens as OAuth2 grants
Cal Heldenbrand
cal at fbsdata.com
Wed Apr 22 18:47:03 UTC 2015
Hmm, that's interesting. A few things that I spotted as a little different:
* The issuer and subject are the same
* The issuer is not a URL as with ID Tokens. (Does this hint that it's
self-signed by the client? And if an OIDC Provider were to implement this,
it would hypothetically be the URL?)
* The audience is a URL, and not an OAuth2 client_id
Maybe I skipped something in reading the draft, but section 3.2
<https://tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-12#section-3.2> is
pretty vague and doesn't specify how the client credentials token should be
constructed.
Good find though Peter!
--Cal
<cal at fbsdata.com>
On Wed, Apr 22, 2015 at 11:34 AM, Peter Williams <home_pw at msn.com> wrote:
>
> http://www.cloudidentity.com/blog/2015/02/06/requesting-an-aad-token-with-a-certificate-without-adal/
>
> Someone posted google related info. Here is some that doesn't require one
> to use vendor specific libraries.
>
> Sign a jwt you construct, and attach a cert to help the std verify the
> signature. Present the signed blob as a bearer, seeking ti have the std
> swap it for azure signed blob. Azure will then send suitable logging
> information (to NSA as part of fedramp) to a cybersecututy scanning firm
> looking for pattern based signatures.
>
> The last part is not well known. I've no doubt google has the same "added
> value", as does yahoo and salesforce. It's all voluntary, note.
>
> Sent from my Windows Phone
> ------------------------------
> From: Cal Heldenbrand <cal at fbsdata.com>
> Sent: 4/15/2015 12:11 PM
> To: openid-general at lists.openid.net
> Subject: [OpenID] OIDC federation using ID Tokens as OAuth2 grants
>
> Hi everyone,
>
> I've been doing a lot of reading on OpenID Connect, and there's one area
> that I'm a little confused on -- federated identities. My curiosity was
> piqued from Page 225 of the book Advanced API Security
> <https://books.google.com/books?id=_-BPBAAAQBAJ&pg=PA225&lpg=PA225#v=onepage&q&f=false>.
> In particular, this quote:
>
> * ...you need to find a way to exchange the ID token received in OpenID
> Connect authentication for an OAuth access token, which is defined in the
> JWT grant types for the OAuth 2.0 specification. Once the web application
> receives the ID token ... it has to exchange it for an access token by
> talking to the OAuth authorization server. The authorization server must
> trust the OpenID Connect identity provider.*
>
> I realize this is a grey area between OIDC and OAuth2... but are there
> any spec documents that outline this trust relationship, and how it applies
> to ID Tokens in particular? (Also, are there any known implementations out
> there that actually use this?)
>
> I've read through the draft-ietf-oauth-jwt-bearer
> <https://tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-12>document, and
> it seems very close to what I was looking for. But the JWT format is a
> little different from an ID Token, and the audience is not in the format of
> a typical client_id. And, I was assuming Authorized Party (azp) would
> somehow fit into this flow.
>
> Any extra info on this would be very helpful!
>
> Thank you,
>
> --Cal
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-general/attachments/20150422/88620a3a/attachment.html>
More information about the general
mailing list