<div dir="auto"><div dir="ltr">I am also in favour of having "aud" value to be the command_endpoint URL. <div>That goes with BCM principles, per of ISO/IEC 9798 (David Basin, Cas Cremers, and and Simon</div>Meier ) <div><br></div><div>Basin, D., Cremers, C., Meier, S. (2913). <i>Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication. Journal of Computer Security - </i>Security and Trust Principles archive Volume 21 Issue 6, 817-846 (2013) <<a href="https://www.cs.ox.ac.uk/people/cas.cremers/downloads/papers/BCM2012-" target="_blank" rel="noreferrer">https://www.cs.ox.ac.uk/people/cas.cremers/downloads/papers/BCM2012-</a><br>iso9798.pdf> </div><div>State why it has to be like that and for a good reason. We should comply to it. </div><div><br></div><div>Best</div><div><br></div><div>Nat</div><div><br></div><div><br></div></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">2025年4月19日(土) 4:32 george--- via Openid-specs-ab <<a href="mailto:openid-specs-ab@lists.openid.net" target="_blank" rel="noreferrer">openid-specs-ab@lists.openid.net</a>>:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div dir="auto">I’m in favor of this proposal. I didn’t see anyone else respond on the list. I’m assuming that is the command_endpoint_url of the relying party and not the IDP.<div><br></div><div>Thanks,</div><div>George</div><div><br id="m_-3212010126734746434m_5511772252312366323lineBreakAtBeginningOfSignature"><div dir="ltr">--<div>George Fletcher</div><div>Practical Identity LLC</div></div><div dir="ltr"><br><blockquote type="cite">On Apr 17, 2025, at 10:49 AM, Dick Hardt via Openid-specs-ab <<a href="mailto:openid-specs-ab@lists.openid.net" target="_blank" rel="noreferrer">openid-specs-ab@lists.openid.net</a>> wrote:<br><br></blockquote></div><blockquote type="cite"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div>Hello!<br><br>We are working on a new specification, OpenID Provider Commands.The commands are a JWT that is similar to an ID Token that have the same "iss" and same verification, and share identity claims. The OP sends command tokens to an RP.<br><br>We want to ensure that a command token is not confused with an id token. <br> <br>Currently the spec has the same "aud" value in the command token as an id token -- the client_id value. <br><br>We are considering setting the "aud" value to be the command_endpoint URL and to set the "client_id" claim to be the client_id value.<br><br><a href="https://github.com/openid/openid-provider-commands" target="_blank" rel="noreferrer">https://github.com/openid/openid-provider-commands</a><br><br><a href="https://github.com/openid/openid-provider-commands/issues/4" target="_blank" rel="noreferrer">https://github.com/openid/openid-provider-commands/issues/4</a><br><br>Thanks in advance for your feedback and review!<br><br>/Dick</div></div></div></div></div>
<span>_______________________________________________</span><br><span>Openid-specs-ab mailing list</span><br><span><a href="mailto:Openid-specs-ab@lists.openid.net" target="_blank" rel="noreferrer">Openid-specs-ab@lists.openid.net</a></span><br><span><a href="https://lists.openid.net/mailman/listinfo/openid-specs-ab" target="_blank" rel="noreferrer">https://lists.openid.net/mailman/listinfo/openid-specs-ab</a></span><br></div></blockquote></div></div>_______________________________________________<br>
Openid-specs-ab mailing list<br>
<a href="mailto:Openid-specs-ab@lists.openid.net" target="_blank" rel="noreferrer">Openid-specs-ab@lists.openid.net</a><br>
<a href="https://lists.openid.net/mailman/listinfo/openid-specs-ab" rel="noreferrer noreferrer" target="_blank">https://lists.openid.net/mailman/listinfo/openid-specs-ab</a><br>
</blockquote></div></div>