[Openid-specs-ab] OpenID Connect: Explicitly typed ID tokens and UserInfo

Vladimir Dzhuvinov vladimir at connect2id.com
Tue Mar 29 15:19:10 UTC 2022


The classic OIDC appears to be no longer the hot topic here, but I want 
to inform the WG that after resisting pressure from users for some time 
we recently started supporting explicitly typed ID tokens and UserInfo 
JWTs, the rationale being the prevention of mix ups in applications with 
many types of JWTs floating around, plus making it easier for code and 
people to determine the JWT purpose by simply examining the "typ" (type) 
header and not having to analyze the claims structure.

By explicit JWT typing I mean use of the optional "typ" header in a JWT, 
something the JWT profile for access tokens for instance uses (and other 
OAuth related specs that carry JWTs).

|{ "kid" : "1", "alg" : "RS256", "typ" : "id_token+jwt" }|

|{ "kid" : "1", "alg" : "RS256", "typ" : "userinfo+jwt" }|


I know this is non-standard and may likely break existing validation 
code and client libraries. If you have thoughts or feedback about this 
typing, good or bad, I'd love to hear it.

Vladimir

-- 
Vladimir Dzhuvinov
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs-ab/attachments/20220329/84f8e6f7/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 4007 bytes
Desc: S/MIME Cryptographic Signature
URL: <http://lists.openid.net/pipermail/openid-specs-ab/attachments/20220329/84f8e6f7/attachment.p7s>


More information about the Openid-specs-ab mailing list