[Openid-specs-ab] Question on access token w multiple audiences and multiple resource servers

Vladimir Dzhuvinov vladimir at connect2id.com
Wed Oct 18 08:21:49 UTC 2017


On 17/10/17 22:33, rich levinson via Openid-specs-ab wrote:
> Hi Linus,
>
> I agree there may be some issues introduced by Mutual TLS.
>
> However, in principle, access tokens are bearer tokens and there
> really is no
> implicit control on what entity is using the access token.
>
> For example, if the oauth client trusts RS-1 to deliver a service, then
> it should trust RS-1 to use the token to access RS-2.
>
> Possibly Mutual TLS could be extended to cover the RS-1<->RS-2 connection
> as well.
I don't see how mTLS could be extended to cover this scenario. When the
token is issued, it gets bound to the client's certificate. The RS-1 is
not present at this point, so I see no direct way to for the AS to add
secondary binding to the RS-1 certificate.

Did you look at token exchange?

(draft-ietf-oauth-token-exchange-09)


Vladimir

>   Thanks,
>   Rich
>
>
> On 10/17/2017 3:19 PM, Linus Lewandowski wrote:
>> Hi,
>>
>> This won't really be possible with Mutual TLS
>> <https://tools.ietf.org/id/draft-ietf-oauth-mtls-03.html
>> <https://urldefense.proofpoint.com/v2/url?u=https-3A__tools.ietf.org_id_draft-2Dietf-2Doauth-2Dmtls-2D03.html&d=DwMFaQ&c=RoP1YumCXCgaWHvlZYR8PQcxBKCX5YTpkKY057SbK10&r=nNxUKneeZofWTyt9qclOUTeEg29NkEkknFyDupoNiiA&m=tb9zOhjteWWIATXzVc3HJCrh6hqsYhws1Yn11x8GiBg&s=GTdDEw8rKcAS_akoL4N2C8PYXbN8wG3H4JtBMenjwjA&e=>>
>>
>> Without Mutual TLS, this means that RS-1 can impersonate your app
>> when talking to RS-2, and RS-2 when talking to RS-1. Not ideal from
>> the security POV.
>>
>> Regards,
>> Linus
>>
>> On Tue, Oct 17, 2017 at 9:04 PM rich levinson via Openid-specs-ab
>> <openid-specs-ab at lists.openid.net
>> <mailto:openid-specs-ab at lists.openid.net>> wrote:
>>
>>     Does anyone have guidance on validity of the following scenario?:
>>
>>         There is a Resource Server, RS-1, that, in order to provide
>> its service
>>         needs to also access a downstream Resource Server RS-2.
>>
>>         When the oauth client requests an access token, it is granted
>> an access token
>>         by the az-svr (that knows that both RS-1 and RS-2 must be
>> used) that
>>         contains 2 audiences: RS-1 and RS-2.
>>
>>         The oauth client uses the access token to access RS-1.
>>
>>         RS-1, in turn, uses the same access token to access RS-2.
>>
>>         The response is returned from RS-2 to RS-1.
>>         RS-1 combines the response from RS-2 w its own resp and
>>          returns the combined response to the oauth client.
>>
>>     Given that the token is a bearer token it seems to me there is no
>> reason why
>>     both the oauth client AND the RS-1 can't use the access token to
>> get what they
>>     need, w/o RS-1 having to register itself as a separate client and
>> get its own
>>     access token.
>>
>>     So, the question is whether this is a legitimate use case for a
>> resource server
>>     to access downstream services.
>>
>>       Thanks,
>>       Rich
>>
>>     _______________________________________________
>>     Openid-specs-ab mailing list
>>     Openid-specs-ab at lists.openid.net
>> <mailto:Openid-specs-ab at lists.openid.net>
>>     http://lists.openid.net/mailman/listinfo/openid-specs-ab
>> <https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openid.net_mailman_listinfo_openid-2Dspecs-2Dab&d=DwMFaQ&c=RoP1YumCXCgaWHvlZYR8PQcxBKCX5YTpkKY057SbK10&r=nNxUKneeZofWTyt9qclOUTeEg29NkEkknFyDupoNiiA&m=tb9zOhjteWWIATXzVc3HJCrh6hqsYhws1Yn11x8GiBg&s=6xTtGMr1rtCrSdJzSj_eq1FPnPRxDTIfb3jLJvIfKwY&e=>
>>
>
>
>
>
> _______________________________________________
> Openid-specs-ab mailing list
> Openid-specs-ab at lists.openid.net
> http://lists.openid.net/mailman/listinfo/openid-specs-ab

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs-ab/attachments/20171018/e4fe8abf/attachment-0001.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 3711 bytes
Desc: S/MIME Cryptographic Signature
URL: <http://lists.openid.net/pipermail/openid-specs-ab/attachments/20171018/e4fe8abf/attachment-0001.p7s>


More information about the Openid-specs-ab mailing list