[Openid-specs-ab] token_endpoint_auth_method Registration example error?

Justin Richer jricher at mitre.org
Wed Jan 23 17:28:02 UTC 2013


Not all clients can necessarily use all forms of auth that a server 
supports, so I see the two values as complimentary.

  -- Justin

On 01/23/2013 12:14 PM, Mike Jones wrote:
>
> The server expresses what the client should do in the discovery phase 
> – not during registration.  See the 
> “token_endpoint_auth_methods_supported” discovery result parameter in 
> http://openid.net/specs/openid-connect-discovery-1_0-12.html.
>
> -- Mike
>
> *From:*John Bradley [mailto:ve7jtb at ve7jtb.com]
> *Sent:* Wednesday, January 23, 2013 9:02 AM
> *To:* Justin Richer
> *Cc:* Mike Jones; openid-specs-ab at lists.openid.net
> *Subject:* Re: [Openid-specs-ab] token_endpoint_auth_method 
> Registration example error?
>
> Like discovery the response could be multi value.  However the client 
> souls only register one value if it wants to restrict what the server 
> accepts for that client_id.
>
> Sent from my iPhone
>
>
> On 2013-01-23, at 4:33 PM, Justin Richer <jricher at mitre.org 
> <mailto:jricher at mitre.org>> wrote:
>
>     But now that the server responds with the current configuration,
>     it's no longer just about client preference but also about the
>     server expressing to the client what it should do. So if a client
>     gets a client_secret, and the server is OK with it using basic,
>     post, or jwt with that secret, how can the server tell the client
>     this?
>
>     The simplest thing is to keep it a single value as it is now, but
>     that's (as always) a tradeoff between flexibility and complexity.
>
>      -- Justin
>
>     On 01/23/2013 11:28 AM, John Bradley wrote:
>
>         If you want a client to authenticate multiple ways just don't
>         register a prefrence.
>
>         This was intended to prevent IdP from accepting weaker methods
>         of authentication from attackers.   If you are not doing that
>         then the client should be able to use anything the server
>         supports.
>
>         Now if the client doesn't register a public key then some
>         methods will fail, but that is a client decision.
>
>         I think trying to say I only want to use 2 of the 5 available
>         methods is overkill.
>
>         The client should just pick the one it is going to use.
>
>         If it really needs two methods maybe it is really two clients
>         and somebody is fudging things a bit.
>
>         John B.
>
>         On 2013-01-23, at 4:18 PM, Justin Richer <jricher at mitre.org
>         <mailto:jricher at mitre.org>> wrote:
>
>
>
>         Actually come to think of it, why wouldn't a client be able to
>         do both client_secret_basic and client_secret_post to a server
>         that supports them? It's the same info presented in *almost*
>         the same way.
>
>         This combination may be the exceptional case, though, as the
>         other types (client_secret_jwt,private_key_jwt, or even "none"
>         that OIDC hasn't adopted yet) aren't particularly mutually
>         compatible.
>
>          -- Justin
>
>         On 01/23/2013 10:53 AM, Justin Richer wrote:
>
>             OK, thanks for catching that. I'll file a bug against
>             Oauth2 Dynreg as well (which has the same examples). John
>             is right that it is defined as a single value and the
>             examples are off.
>
>              -- Justin
>
>             On 01/23/2013 10:03 AM, Mike Jones wrote:
>
>                 That’s what I thought.  Thanks for confirming.
>
>                 -- Mike
>
>                 *From:*John Bradley [mailto:ve7jtb at ve7jtb.com]
>                 *Sent:* Wednesday, January 23, 2013 7:02 AM
>                 *To:* Mike Jones
>                 *Cc:* openid-specs-ab at lists.openid.net
>                 <mailto:openid-specs-ab at lists.openid.net>
>                 *Subject:* Re: [Openid-specs-ab]
>                 token_endpoint_auth_method Registration example error?
>
>                 The server may support multiple methods, but the
>                 client MUST only register one, so it shouldn't be
>                 multi value for simplicity.
>
>                 If you need two auth methods they should be different
>                 client_id.
>
>                 This is intended mostly to enhance security and
>                 prevent a server from taking client_secret_basic from
>                 an attacker when the real client is using private_key_jwt.
>
>                 John B.
>
>                 On 2013-01-23, at 9:07 AM, Mike Jones
>                 <Michael.Jones at microsoft.com
>                 <mailto:Michael.Jones at microsoft.com>> wrote:
>
>
>
>
>                 Registration contains the following definition:
>
>                 token_endpoint_auth_method
>
>                 OPTIONAL. Requested authentication method for the
>                 Token Endpoint. The options
>                 areclient_secret_post,client_secret_basic,client_secret_jwt,
>                 andprivate_key_jwt, as described in Section 2.2.1 of
>                 [OpenID.Messages]. Other Authentication methods may be
>                 defined by extension. If unspecified or omitted, the
>                 default isclient_secret_basicHTTP Basic Authentication
>                 Scheme as specified in Section 2.3.1 of [RFC6749].
>
>                 It later uses “token_endpoint_auth_method” in two
>                 example result values in this manner:
>
>                 "token_endpoint_auth_method":
>
>                    "client_secret_basic client_secret_post",
>
>                 This looks like a bug to me, since the string appears
>                 to be trying to contain multiple values.
>
>                 Thus, I’m changing the string used to just
>

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs-ab/attachments/20130123/676c1e10/attachment.html>


More information about the Openid-specs-ab mailing list