[Openid-specs-ab] OIDC Session Management and third party cookie blocking
Nicole Roy
nroy at internet2.edu
Tue Aug 9 18:39:27 UTC 2022
My concern would be that a browser employing “Intelligent Tracking Prevention” would see the POST of the SID as tracking and prevent it. Of course, doing so breaks all sorts of other things, but the browser people don’t seem to care about that at the moment.
Nicole Roy
Internet2/InCommon
> On Aug 2, 2022, at 4:30 PM, Jake Feasel via Openid-specs-ab <openid-specs-ab at lists.openid.net> wrote:
>
> This topic has been raised before, but based on the traffic from this list it seems to not be going anywhere. I would like to revive it.
>
> I had a quick talk at Identiverse this year covering the OIDC Session Management draft spec, in particular my take on the upcoming "Cookiepocalypse" and how it will render the current draft completely obsolete. You can see my slides here: https://docs.google.com/presentation/d/1uU3KvK6ayTpjB2OEmrSqQnUdJDPSdfxxetJrks1czvI/edit#slide=id.g11aa5093f19_0_63 <https://docs.google.com/presentation/d/1uU3KvK6ayTpjB2OEmrSqQnUdJDPSdfxxetJrks1czvI/edit#slide=id.g11aa5093f19_0_63>
>
[snip]
> The OP will include the "sid" claim (as defined in the Front and Back-channel logout drafts) as a claim in the id_token used in an auth_code grant. This "sid" value will be included in a POST request to the "token" endpoint on the OP on a periodic basis (likely prompted from user activity within the RP). It would like something like so (note the absence of a cookie in this request):
>
> POST /token HTTP/1.1
> Host: server.example.com <http://server.example.com/>
> Content-Type: application/x-www-form-urlencoded
> Authorization: Basic czZCaGRSa3F0MzpnWDFmQmF0M2JW
>
> grant_type=session_check&sid=1234xyz
>
> The response code from this could be a 401 if the sid is not associated with a valid OP session, or 200 if it is. The response body in the case of a 200 could include a new id_token with updated session claims (to provide better context for when the session expires or if other important details about the session change).
>
[snip]
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs-ab/attachments/20220809/dd8cc1d8/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: Message signed with OpenPGP
URL: <http://lists.openid.net/pipermail/openid-specs-ab/attachments/20220809/dd8cc1d8/attachment.asc>
More information about the Openid-specs-ab
mailing list