[Openid-specs-ab] JWT Access Token <> ID Token mixups

George Fletcher gffletch at aol.com
Wed Oct 4 01:40:10 UTC 2017


I don't think so because it's a hint. If that user doesn't want to sign 
in, they can often switch to a different user.

On 10/3/17 12:35 PM, Phil Hunt wrote:
> Isn’t there an audience issue here?
>
> Phil
>
> Oracle Corporation, Identity Cloud Services Architect
> @independentid
> www.independentid.com <http://www.independentid.com>
> phil.hunt at oracle.com <mailto:phil.hunt at oracle.com>
>
>> On Oct 2, 2017, at 8:10 AM, George Fletcher via Openid-specs-ab 
>> <openid-specs-ab at lists.openid.net 
>> <mailto:openid-specs-ab at lists.openid.net>> wrote:
>>
>> If the JWT was issued by the same OP/AS it's being presented to as an 
>> id_token_hint, and the OP can securely determine the user from the 
>> access token then I don't think there are any security issues in this 
>> flow. The biggest issue might be that the valid access token is now 
>> flowing through the browser and hence is subject to a 
>> man-in-the-browser capture and replay attack.
>>
>> Thanks,
>> George
>>
>> On 10/2/17 10:31 AM, Filip Skokan wrote:
>>> Original question was purely concerned about the OPs accepting a JWT 
>>> formatted access tokens in places where ID Token is expected, e.g. 
>>> id_token_hint for authorization or logout request.
>>>
>>> Is that something to be concerned about?
>>>
>>> Best,
>>> *Filip Skokan*
>>>
>>> On Mon, Oct 2, 2017 at 4:28 PM, George Fletcher <gffletch at aol.com 
>>> <mailto:gffletch at aol.com>> wrote:
>>>
>>>     In the cases you've run across... do they really use the
>>>     id_token as an access_token? or rather as a bootstrap token into
>>>     new refresh/access tokens? Given that in most cases id_tokens do
>>>     not contain scopes it seems weird to use them as access tokens
>>>     (the different between authentication and authorization).
>>>
>>>     Thanks,
>>>     George
>>>
>>>
>>>     On 10/2/17 3:02 AM, Dominick Baier via Openid-specs-ab wrote:
>>>>     We’ve come across a number of implementations that promote the
>>>>     use of id_tokens as access tokens e.g. Microsoft Azure AD
>>>>     (B2C), Google and Auth0.
>>>>
>>>>     Every time we argue with e.g. Microsoft - they say “we did our
>>>>     own threat modelling and its fine”. So maybe the spec should be
>>>>     very explicit about why this is not allowed or when exactly
>>>>     this is OK or not.
>>>>
>>>>     There is a long thread here:
>>>>     https://github.com/IdentityServer/IdentityServer3/issues/2015
>>>>     <https://urldefense.proofpoint.com/v2/url?u=https-3A__github.com_IdentityServer_IdentityServer3_issues_2015&d=DwMDaQ&c=RoP1YumCXCgaWHvlZYR8PQcxBKCX5YTpkKY057SbK10&r=JBm5biRrKugCH0FkITSeGJxPEivzjWwlNKe4C_lLIGk&m=mdDV8XhVQVLAfkuK-l3w8eRNsa67if9SJfSkAbg0sbc&s=V9Wy-oAo8x7-kicEYAtUPei6HGA6mPbfnp1j3iLfNrA&e=>
>>>>
>>>>
>>>>     -------
>>>>     Dominick Baier
>>>>
>>>>     On 29. September 2017 at 07:56:56, Filip Skokan via
>>>>     Openid-specs-ab (openid-specs-ab at lists.openid.net
>>>>     <mailto:openid-specs-ab at lists.openid.net>) wrote:
>>>>
>>>>>     Hello everyone,
>>>>>
>>>>>     I'm certain you've came across authorization servers issuing
>>>>>     JWT-formatted Access Tokens by now. Most frequently these are
>>>>>     following the JWT profile just like an ID Token does, opening
>>>>>     up the possibility an Access Token is a perfect ID Token
>>>>>     lookalike and can be used i.e. as id_token_hint.
>>>>>
>>>>>       * Is this a valid concern?
>>>>>       * Shouldn't the JWT "typ" header parameter be used to strong
>>>>>         type the ID Token (similar to SETs secevent+jwt)?
>>>>>       * Any other way ID Tokens could have a unique required
>>>>>         claims making it possible to differentiate between JWT
>>>>>         Access Tokens and ID Tokens?
>>>>>
>>>>>     If not part of the specs, should the OPs supporting JWT access
>>>>>     tokens be at least recommended to push unique claims to their
>>>>>     JWTs to be able to distinguish between the different JWT uses?
>>>>>
>>>>>     Penny for your thoughts.
>>>>>
>>>>>     Best Regards,
>>>>>     *Filip Skokan*
>>>>>     _______________________________________________
>>>>>     Openid-specs-ab mailing list
>>>>>     Openid-specs-ab at lists.openid.net
>>>>>     <mailto:Openid-specs-ab at lists.openid.net>
>>>>>     http://lists.openid.net/mailman/listinfo/openid-specs-ab
>>>>>     <https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openid.net_mailman_listinfo_openid-2Dspecs-2Dab&d=DwMDaQ&c=RoP1YumCXCgaWHvlZYR8PQcxBKCX5YTpkKY057SbK10&r=JBm5biRrKugCH0FkITSeGJxPEivzjWwlNKe4C_lLIGk&m=mdDV8XhVQVLAfkuK-l3w8eRNsa67if9SJfSkAbg0sbc&s=RVKEhccvJuz61dc-swlMFWP7QMKR5NpjgXqoEvTEyFc&e=>
>>>>>
>>>>
>>>>
>>>>     _______________________________________________
>>>>     Openid-specs-ab mailing list
>>>>     Openid-specs-ab at lists.openid.net
>>>>     <mailto:Openid-specs-ab at lists.openid.net>
>>>>     http://lists.openid.net/mailman/listinfo/openid-specs-ab
>>>>     <https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openid.net_mailman_listinfo_openid-2Dspecs-2Dab&d=DwMDaQ&c=RoP1YumCXCgaWHvlZYR8PQcxBKCX5YTpkKY057SbK10&r=JBm5biRrKugCH0FkITSeGJxPEivzjWwlNKe4C_lLIGk&m=mdDV8XhVQVLAfkuK-l3w8eRNsa67if9SJfSkAbg0sbc&s=RVKEhccvJuz61dc-swlMFWP7QMKR5NpjgXqoEvTEyFc&e=>
>>>
>>>
>> _______________________________________________
>> Openid-specs-ab mailing list
>> Openid-specs-ab at lists.openid.net 
>> <mailto:Openid-specs-ab at lists.openid.net>
>> https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openid.net_mailman_listinfo_openid-2Dspecs-2Dab&d=DwICAg&c=RoP1YumCXCgaWHvlZYR8PQcxBKCX5YTpkKY057SbK10&r=JBm5biRrKugCH0FkITSeGJxPEivzjWwlNKe4C_lLIGk&m=mdDV8XhVQVLAfkuK-l3w8eRNsa67if9SJfSkAbg0sbc&s=RVKEhccvJuz61dc-swlMFWP7QMKR5NpjgXqoEvTEyFc&e= 
>>

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs-ab/attachments/20171003/4860da39/attachment.html>


More information about the Openid-specs-ab mailing list