<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<style type="text/css" style="display:none;"> P {margin-top:0;margin-bottom:0;} </style>
</head>
<body dir="ltr">
<div class="elementToProof" style="font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);">
<b>Collision Resistance</b><br>
I agree that it's probably wise to include guidance towards ensuring collision resistance for implementers in the base AuthZEN spec. I came across a similar
<a href="https://datatracker.ietf.org/doc/html/rfc9396#name-authorization-details-types" id="LPlnk693057" class="OWAAutoLink" title="https://datatracker.ietf.org/doc/html/rfc9396#name-authorization-details-types">
section in the OAuth RAR specification</a> recently which does a fairly good job at explaining this IMO (although I'm not a fan of URI's as namespaces.)<br>
<br>
After considering the GraphQL case I do agree it might be wise to give this profile a top-level namespace like 'http' instead. So then you'd get something like {"type": "http:route"} and {"type": "http:uri"} and {"action": "http:get"}<br>
That leaves API gateways free to model GraphQL calls as plain HTTP request using this profile or to use a (yet to be defined) GraphQL profile with action types like "graphql:query".<br>
<br>
</div>
<div class="elementToProof" style="font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);">
<b>What goes where</b></div>
<div class="elementToProof" style="font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);">
Looking at terminology alone it seems logical for me to put:<br>
- information from/about the Uniform <u>Resource</u> Identifier in the `<u>resource</u>` section</div>
<div class="elementToProof" style="font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);">
- the HTTP <u>method/verb</u> in the `<u>action</u>`section and</div>
<div class="elementToProof" style="font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);">
- the <u>subject</u> as extracted from e.g. the Authorization header in the `<u>subject</u>` section<br>
<br>
I'd personally say 'body' belongs in the `action` section as well since it's *what* your are PUTting or POSTing.<br>
<br>
Then you get a sentence like "As `mtrimpe`(subject) I `POST {"json":"string"}`(action) to `http://example.com/json-store`(resource)."<br>
<br>
Only the headers are a tough one. You can see it as metadata about the action but we're also parsing the Authorization header to populate the subject as well. Given that headers are now used for so many purposes I'd argue that makes most sense to put it in
the `context` section.<br>
<br>
Cheers, Michiel</div>
<div class="elementToProof" style="font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);">
<br>
</div>
<div id="appendonsend"></div>
<hr style="display: inline-block; width: 98%;">
<div dir="ltr" id="divRplyFwdMsg"><span style="font-family: Calibri, sans-serif; font-size: 11pt; color: rgb(0, 0, 0);"><b>From:</b> Openid-specs-authzen <openid-specs-authzen-bounces@lists.openid.net> on behalf of Michael Schwartz via Openid-specs-authzen
<openid-specs-authzen@lists.openid.net><br>
<b>Sent:</b> 23 January 2025 00:37<br>
<b>To:</b> AuthZEN Working Group List <openid-specs-authzen@lists.openid.net><br>
<b>Cc:</b> Michael Schwartz <mike@gluu.org><br>
<b>Subject:</b> Re: [Openid-specs-authzen] Comments on the Authzen API GW Profile</span>
<div> </div>
</div>
<div style="direction: ltr;">Here are some more comments about Omri's "AuthZEN REST API Gateway Profile proposal" we've been so heatedly discussing, described here:
<a href="https://hackmd.io/MTJPf_vzSmubctNtHis99g" id="OWA6ef01596-5c6c-e41d-cf1f-162d00b0cb55" class="OWAAutoLink" originalsrc="https://hackmd.io/MTJPf_vzSmubctNtHis99g" data-auth="Verified">
https://hackmd.io/MTJPf_vzSmubctNtHis99g</a> </div>
<div style="direction: ltr;"><br>
</div>
<div style="direction: ltr;">I know there is a time challenge around the interop, so I'll try to be brief. BTW, I very likely won't be at the meeting next week, so it would be great if we could have this conversation in the mailing list (or the OIDF Slack...). </div>
<div style="direction: ltr;"><br>
</div>
<div style="direction: ltr;">My first suggestion is that the "type" values should be collision resistant. For example, here are some types and what I might like better (just suggestions...)</div>
<div style="direction: ltr;"> - In the Subject, <b>type "user"</b>. What about: "OpenID Authzen API GW Profile 0.1 User", "OpenID::Authzen::API-GW::0.1::User", or
<a href="https://openid.net/authzen/types/User" id="OWA16835dd9-5773-ae79-a688-7bdc7f4db8c1" class="OWAAutoLink" originalsrc="https://openid.net/authzen/types/User" data-auth="Verified">
https://openid.net/authzen/types/User</a>" (today the best practice for OAuth scopes is to use a unique URI)</div>
<div style="direction: ltr;"> - In the Action, <b>type "GET"</b>, to "OpenID::Authzen::API-GW::GET" (or one of the other formats above)</div>
<div style="direction: ltr;"> - In the Resource,<b> "type": "route"</b>, --> "OpenID::Authzen::API-GW::0.1::Route" </div>
<div style="direction: ltr;"> - In the Context, the type is missing... maybe Contexts don't have types in Authzen... but I would define it anyway as something like "OpenID::Authzen::API-GW::0.1::Context". </div>
<div style="direction: ltr;"><br>
</div>
<div style="direction: ltr;">While you "could" put information anywhere, I find the organization of the request in the current proposal very confusing. I don't understand why half the data about the request is in the resource (like the params), but the other
half is in the Context (like the body). There is no clean explanation for that organization. I would like to suggest that an easy explanation might be to say the request itself is put in the resource -- url, headers, body. And all the information added by
the API GW -- time of day, network, etc. -- is in the Context. </div>
<div style="direction: ltr;"><br>
</div>
<div style="direction: ltr;">Having the Profile version in the type is also important. API GW plugin developers will write against a certain version, so if a PDP is expecting a different version, things may break.</div>
<div style="direction: ltr;"><br>
</div>
<div style="direction: ltr;">I understand that optionality is the enemy of interoperability. But at this phase, I feel like this current proposal is too opinionated. IMHO, we want to invite the API GW community to come up with more innovative ideas for how
to add new subject, action, resource or context types. For example we need different actions and resources for GraphQL. So I'd like to see the proposal be more extensible, which always ends up being good for a spec. Maybe a vendor won't support every API GW
Profile feature (e.g. a GW may not support GraphQL). Then we're not saying there is one "right" way... we're giving a way to define different ways, and then when adoption becomes clear, we can promote or demote schemas. </div>
<div style="direction: ltr;"><br>
</div>
<div style="direction: ltr;">- Mike </div>
<div style="direction: ltr;"><br>
</div>
<br>
<div style="direction: ltr;">On Fri, Jan 17, 2025 at 1:42 AM Omri Gazitt via Openid-specs-authzen <<a href="mailto:openid-specs-authzen@lists.openid.net" id="OWA483ee2aa-f536-236c-ca0f-6a8e5ac04f15" class="OWAAutoLink">openid-specs-authzen@lists.openid.net</a>>
wrote:</div>
<blockquote style="margin: 0px 0px 0px 0.8ex; padding-left: 1ex; border-left: 1px solid rgb(204, 204, 204);">
<div style="direction: ltr;">Thank you Michael, Michiel, and Julio for your comments.</div>
<div style="direction: ltr;"><br>
</div>
<div style="direction: ltr;">I have been pondering this for the last couple of days and have come to the conclusion that we are trying to represent two separate scenarios in the same profile. </div>
<div style="direction: ltr;"><br>
</div>
<div style="direction: ltr;">Julio is exactly right on all counts:</div>
<ul style="direction: ltr;">
<li style="direction: ltr;">the proposal I reviewed in the meeting is meant for "medium-grained authz", but I agree that fine-grained authz is a valid scenario as well</li><li style="direction: ltr;">the question you're asking in "medium-grained authz" is "can this subject invoke the route represented by { HTTP method, HTTP route }"</li><li style="direction: ltr;">"route" is meant to be an OpenAPI path template, which is widely implemented by many HTTP frameworks / API gateways. These pieces of software typically make the matched route available in the request or in some developer-accessible
context</li></ul>
<div style="direction: ltr;">In the context of this scenario, I also agree that the JWT is uninteresting, and what you really as the subject is a claim inside the JWT. So I agree with the feedback from George, Julio, and Michael that we don't want the subject
to be of type "JWT". </div>
<div style="direction: ltr;"><br>
</div>
<div style="direction: ltr;">Julio, your memory is very good. We considered RFC 9493 as a way to represent subjects, but realized that we were conflating "format" (e.g. "JWT", "email", etc) and the "type" ("user", "identity", etc). </div>
<div style="direction: ltr;"><br>
</div>
<div style="direction: ltr;">Stepping back, I do think we can represent the two scenarios in a single profile.</div>
<div style="direction: ltr;"><br>
</div>
<div style="direction: ltr;">For the generic fine-grained authz scenario (where every field in the HTTP request information model is essentially an "attribute" that a policy can reason over), we want the API gateway to pass along most/all of the fields in the
HTTP request information model, and what is placed in the required fields isn't all that important. The PDP's policy will likely be written around the various properties in the information model (subject, action, resource, context) and not the required fields.</div>
<div style="direction: ltr;"><br>
</div>
<div style="direction: ltr;">For the medium-grained authz scenario, what we pick for the required fields actually matters more, because we are designing an authorization protocol for HTTP routes.</div>
<div style="direction: ltr;"><br>
</div>
<div style="direction: ltr;">The "default" mapping for this scenario feels to me like the following (in pseudo-code):</div>
<div style="direction: ltr;"><br>
</div>
<div style="direction: ltr; font-family: monospace;">{</div>
<div style="direction: ltr; font-family: monospace;"> "subject": {</div>
<div style="direction: ltr; font-family: monospace;"> "type": "user",</div>
<div style="direction: ltr; font-family: monospace;"> "id": "<decode_jwt(request.headers["authorization"]).sub>"</div>
<div style="direction: ltr; font-family: monospace;"> },</div>
<div style="direction: ltr; font-family: monospace;"> "action": {</div>
<div style="direction: ltr; font-family: monospace;"> "name": "<request.method>"</div>
<div style="direction: ltr; font-family: monospace;"> },</div>
<div style="direction: ltr; font-family: monospace;"> "resource": {</div>
<div style="direction: ltr; font-family: monospace;"> "type": "route", // or "uri" if "route" is not available</div>
<div style="direction: ltr; font-family: monospace;"> "id": "<request.route>", // or "uri" if "route" is not available</div>
<div style="direction: ltr; font-family: monospace;"> "properties": {</div>
<div style="direction: ltr; font-family: monospace;"> // uri components, path parameters, query (or query parameters if they get parsed)</div>
<div style="direction: ltr; font-family: monospace;"> },</div>
<div style="direction: ltr; font-family: monospace;"> "context": {</div>
<div style="direction: ltr; font-family: monospace;"> "headers": [],</div>
<div style="direction: ltr; font-family: monospace;"> "body": ...</div>
<div style="direction: ltr; font-family: monospace;"> }</div>
<div style="direction: ltr; font-family: monospace;"> }</div>
<div style="direction: ltr; font-family: monospace;">}</div>
<div style="direction: ltr;"><br>
</div>
<div style="direction: ltr;">For the fine-grained authz scenario, each API request (and its corresponding filter) essentially has its own contract with the PDP. What is most important for this scenario is a predictable way of mapping the HTTP request information
model into the AuthZEN information model. The PDP policy will lift whatever fields it wants out of the AuthZEN request, and use those fields in the policy.</div>
<div style="direction: ltr;"><br>
</div>
<div style="direction: ltr;">For example, if (as Michael suggests) the PDP really wants the encoded access token as the subject and will process whatever it wants to extract out of that, this is easy to do by writing a policy that extracts that field out of
<span style="font-family: monospace;">context.headers["Authorization"]</span>. </div>
<div style="direction: ltr;"><br>
</div>
<div style="direction: ltr;">Therefore, it stands to reason that the mapping sketched out above would work for the (more constrained) medium-grained authz scenario, and the (less constrained) fine-grained authz scenario.</div>
<br>
<div style="direction: ltr;">On Wed, Jan 15, 2025 at 7:28 AM Julio Auto De Medeiros (BLOOMBERG/ 731 LEX) via Openid-specs-authzen <<a href="mailto:openid-specs-authzen@lists.openid.net" id="OWA2bcf9990-8b3b-1110-2a5c-dbcdbc2b2509" class="OWAAutoLink">openid-specs-authzen@lists.openid.net</a>>
wrote:</div>
<blockquote style="margin: 0px 0px 0px 0.8ex; padding-left: 1ex; border-left: 1px solid rgb(204, 204, 204);">
<div style="white-space: pre-wrap; font-family: Arial, "BB.Proportional"; font-size: 9.75pt; color: rgb(0, 0, 0);">
A couple of thoughts: </div>
<div style="font-family: Arial, "BB.Proportional"; font-size: 9.75pt; color: rgb(0, 0, 0);">
<br>
</div>
<div style="white-space: pre-wrap; font-family: Arial, "BB.Proportional"; font-size: 9.75pt; color: rgb(0, 0, 0);">
1. On the matter of "/api/v1/pets/{id}", my understanding was that no replacement/rewriting was being proposed. Authorizing on that would have the meaning of "principal can POST on some pet" (non-pet-ID-specific). The pet-specific authorization would only happen
later, at the actual API provider. In other words, the API gateway would only perform "medium-grained" (as Omri put it) authorization, and the API provider would do fine-grained authorization. I also understood that it didn't mean that API gateways weren't
allowed do fine-grained authorization, but more of a question of picking the example/use case to include in the profile.</div>
<div style="font-family: Arial, "BB.Proportional"; font-size: 9.75pt; color: rgb(0, 0, 0);">
<br>
</div>
<div style="white-space: pre-wrap; font-family: Arial, "BB.Proportional"; font-size: 9.75pt; color: rgb(0, 0, 0);">
2. George (IIRC) had a good point on the JWT subject 'type', in that previously the authzen spec evoked differences between type and "format". Subject types would be things "user", "group", "workload", I reckon. So, in that spirit, perhaps the example in the
profile would better read:<br>
{ </div>
<div style="white-space: pre-wrap; font-family: Arial, "BB.Proportional"; font-size: 9.75pt; color: rgb(0, 0, 0);">
"subject": {</div>
<div style="white-space: pre-wrap; font-family: Arial, "BB.Proportional"; font-size: 9.75pt; color: rgb(0, 0, 0);">
"type": "user",</div>
<div style="white-space: pre-wrap; font-family: Arial, "BB.Proportional"; font-size: 9.75pt; color: rgb(0, 0, 0);">
"id": {</div>
<div style="white-space: pre-wrap; font-family: Arial, "BB.Proportional"; font-size: 9.75pt; color: rgb(0, 0, 0);">
"format" : "JWT",</div>
<div style="white-space: pre-wrap; font-family: Arial, "BB.Proportional"; font-size: 9.75pt; color: rgb(0, 0, 0);">
"jwt": "eyJhb..."</div>
<div style="white-space: pre-wrap; font-family: Arial, "BB.Proportional"; font-size: 9.75pt; color: rgb(0, 0, 0);">
}</div>
<div style="white-space: pre-wrap; font-family: Arial, "BB.Proportional"; font-size: 9.75pt; color: rgb(0, 0, 0);">
}</div>
<div style="white-space: pre-wrap; font-family: Arial, "BB.Proportional"; font-size: 9.75pt; color: rgb(0, 0, 0);">
}</div>
<div style="font-family: Arial, "BB.Proportional"; font-size: 9.75pt; color: rgb(0, 0, 0);">
<br>
</div>
<div style="white-space: pre-wrap; font-family: Arial, "BB.Proportional"; font-size: 9.75pt; color: rgb(0, 0, 0);">
Having that said, I'm of the opinion that the JWT doesn't belong in the subject at all, but rather in the context. Conceptually, I think the subject identifier is of the format 'email' and its value is '<a href="mailto:john.doe@acmecorp.com" id="OWA2196c9ee-ae0e-35e8-58eb-082dd8ab989c" class="OWAAutoLink">john.doe@acmecorp.com</a>',
the JWT being sent in the 'context' mostly to allow for identity validation. But I understand the concern with giving the gateway the "burden" of deserializing the JWT to extract the subject ID.<br>
<br>
</div>
<div style="white-space: pre-wrap; font-family: "Courier New", Courier, "BB.FixedWidth"; font-size: 9.75pt; color: rgb(0, 0, 0);">
From: <a href="mailto:openid-specs-authzen@lists.openid.net" id="OWA1fc70314-f50b-da88-b420-a8abee6370d4" class="OWAAutoLink">
openid-specs-authzen@lists.openid.net</a> At: 01/15/25 04:33:30 UTC-5:00</div>
<div style="white-space: pre-wrap; font-family: "Courier New", Courier, "BB.FixedWidth"; font-size: 9.75pt; color: rgb(0, 0, 0);">
To: <a href="mailto:openid-specs-authzen@lists.openid.net" id="OWA6b336038-a9d8-0dc8-0dfb-ea138ceffb23" class="OWAAutoLink">
openid-specs-authzen@lists.openid.net</a><br>
Cc: <a href="mailto:Michiel.Trimpe@VNG.NL" id="OWAbcdcadfc-d6dd-2d6b-15a9-eaae5ff9f244" class="OWAAutoLink">
Michiel.Trimpe@VNG.NL</a><br>
Subject: Re: [Openid-specs-authzen] Comments on the Authzen API GW Profile</div>
<div style="font-family: "Courier New", Courier, "BB.FixedWidth"; font-size: 9.75pt; color: rgb(0, 0, 0);">
<br>
</div>
<div style="background-color: white;">
<blockquote>
<div style="font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);">
Hi Michael,</div>
<div style="font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);">
<br>
</div>
<div style="font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);">
Please see my responses in-line.</div>
<div style="font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);">
<br>
</div>
<div style="font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);">
Cheers, Michiel</div>
<div id="x_m_6217921018588231553m_7740259539453125901m_7377079112566041071m_119951681576229217m_-8975110352418948720appendonsend">
</div>
<hr style="display: inline-block; width: 98%;">
<div dir="ltr" id="x_m_6217921018588231553m_7740259539453125901m_7377079112566041071m_119951681576229217m_-8975110352418948720divRplyFwdMsg">
<span style="font-family: Calibri, sans-serif; font-size: 11pt; color: rgb(0, 0, 0);"><b>From:</b> Openid-specs-authzen <<a href="mailto:openid-specs-authzen-bounces@lists.openid.net" id="OWAc6ca2f99-50b8-643a-1638-4337dd73d416" class="OWAAutoLink">openid-specs-authzen-bounces@lists.openid.net</a>>
on behalf of Michael Schwartz via Openid-specs-authzen <<a href="mailto:openid-specs-authzen@lists.openid.net" id="OWAc3d98771-36b3-a9f3-f4d3-439a60822619" class="OWAAutoLink">openid-specs-authzen@lists.openid.net</a>><br>
<b>Sent:</b> 15 January 2025 02:51<br>
<b>To:</b> AuthZEN Working Group List <<a href="mailto:openid-specs-authzen@lists.openid.net" id="OWAb4a62c22-4e25-2866-dc20-0adb017448ef" class="OWAAutoLink">openid-specs-authzen@lists.openid.net</a>><br>
<b>Cc:</b> Michael Schwartz <<a href="mailto:mike@gluu.org" id="OWA6f27776d-fd09-c3ce-7aa2-f06a91e52338" class="OWAAutoLink">mike@gluu.org</a>><br>
<b>Subject:</b> [Openid-specs-authzen] Comments on the Authzen API GW Profile</span>
<div> </div>
</div>
<div style="direction: ltr; font-family: Arial, "BB.Proportional"; font-size: 9.75pt; color: black;">
Here is the feedback on the discussion about the API GW authzen profile that I also posted on OpenID Authzen Slack for the official mailing list record: </div>
<div style="direction: ltr; font-family: Arial, "BB.Proportional"; font-size: 9.75pt; color: black;">
<br>
</div>
<div style="direction: ltr; font-family: Arial, "BB.Proportional"; font-size: 9.75pt; color: black;">
1. IMHO, the Resource type should be "HTTP_Request" not "path" -- there is always way more to an API proxy decision than just a path. And the path itself is not even enough to uniquely identify a resource. The entitlement request is to perform an HTTP Request
with a certain method and context--not to just access a certain path.<br>
<br>
</div>
<div style="direction: ltr; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);">
<span style="background-color: rgb(255, 255, 0);">> I spent quite a bit of time pondering the alternatives and given that we are looking for common identifier for a resource in the context of HTTP REST request; the Uniform Resource Identifier (a.k.a. `uri`)
does really seem like the optimal fit.</span></div>
<div style="direction: ltr; font-family: Arial, "BB.Proportional"; font-size: 9.75pt; color: black;">
<br>
2. We can define a minimum required schema but allow room for extension. I guess what I'm wondering is if we can reduce the scope of this profile more.</div>
<div style="direction: ltr; font-family: Arial, "BB.Proportional"; font-size: 9.75pt; color: black;">
<br>
</div>
<div style="direction: ltr; font-family: Arial, "BB.Proportional"; font-size: 9.75pt; color: black;">
3. A URL may include schema, host, port, path, query, and fragment. Also, I wonder if the host should allow for policies based on the domain, i.e. for
<a href="http://google.com/" id="x_m_6217921018588231553m_7740259539453125901m_7377079112566041071m_119951681576229217m_-8975110352418948720OWA795e2991-0ed0-a4d2-6657-fb1b346c4cae" class="OWAAutoLink" originalsrc="http://google.com/" data-auth="Verified">
google.com</a> domain do this.. for <a href="http://gmail.com/" id="x_m_6217921018588231553m_7740259539453125901m_7377079112566041071m_119951681576229217m_-8975110352418948720OWA1ecc0585-6234-534d-2177-e4aeb60289c8" class="OWAAutoLink" originalsrc="http://gmail.com/" data-auth="Verified">
gmail.com</a> domain... do something else.</div>
<div style="direction: ltr; font-family: Arial, "BB.Proportional"; font-size: 9.75pt; color: black;">
<span style="background-color: rgb(255, 255, 0);"><br>
> That can be done using a simple "eq '<a href="http://google.com/" id="OWA589110c5-3203-8ac5-aa97-4d3a53cadb7d" class="OWAAutoLink" originalsrc="http://google.com/" data-auth="Verified">google.com</a>' or endsWith '.<a href="http://google.com/" id="OWAb450102c-3280-29f6-12c3-3e1978a8dd66" class="OWAAutoLink" originalsrc="http://google.com/" data-auth="Verified">google.com</a>'"
expression right? Determining what's colloquially understood as "the domain" requires an up-to-date TLD list to disambiguate e.g. "smtp.local" hostnames which are perfectly valid as well.</span></div>
<div style="direction: ltr; font-family: Arial, "BB.Proportional"; font-size: 9.75pt; color: black;">
<br>
4. The HTTP request includes url , headers, body . These are all things the developer is sending from Postman in the request. IMHO, Context should be for data that is external to the resource, like the time of day, which you don't send in the Postman request.<br>
<br>
</div>
<div style="direction: ltr; font-family: Arial, "BB.Proportional"; font-size: 9.75pt; color: black;">
<span style="background-color: rgb(255, 255, 0);">> From my perspective the Subject, Action and Resource is the information model of the authorization request. In the Dutch standard we'll also recommend implementers to define their AuthZEN information model
up to the same standard of quality as their domain model. That includes defining syntax, semantics, constraints and relations for everything in their domain specific AuthZEN information model.</span></div>
<div style="direction: ltr; font-family: Arial, "BB.Proportional"; font-size: 9.75pt; color: black;">
<span style="background-color: rgb(255, 255, 0);">When viewed from that perspective the "raw JWT" token or "raw X509 certificate" feel more like an implementation detail. That is why I suggested moving them to context.<br>
For headers I can also make a case that they're properties describing/annotating the action that you intend to take (e.g. Accept headers request specific the type of content you wish to GET) so that it would make sense to include them in the `action` instead.</span></div>
<div style="direction: ltr; font-family: Arial, "BB.Proportional"; font-size: 9.75pt; color: black;">
<br>
</div>
<div style="direction: ltr; font-family: Arial, "BB.Proportional"; font-size: 9.75pt; color: black;">
5. It's unclear why the sample shows the route as ".../pets/{id}". The request would be for an exact path3. It may seem trivial, but we don't want to define any kind of replacement or regex syntax here.</div>
<div style="direction: ltr; font-family: Arial, "BB.Proportional"; font-size: 9.75pt; color: black;">
<br>
</div>
<div style="direction: ltr; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, Calibri, Helvetica, sans-serif;">
<span style="font-size: 9.75pt; color: black; background-color: rgb(255, 255, 0);">> Route here refers to the something like "path templates" concept as described in e.g.
</span><span style="font-size: 12pt; color: rgb(0, 0, 0); background-color: rgb(255, 255, 0);"><a href="https://swagger.io/specification/#paths-object" id="x_m_6217921018588231553m_7740259539453125901m_7377079112566041071m_119951681576229217m_-8975110352418948720OWA48cc550a-3204-8c09-77ab-91c1a4b8275e" class="OWAAutoLink" originalsrc="https://swagger.io/specification/#paths-object" data-auth="Verified">https://swagger.io/specification/#paths-object</a> or
the router concept from SPA's like you e.g. <a href="https://www.w3schools.com/react/react_router.asp" id="x_m_6217921018588231553m_7740259539453125901m_7377079112566041071m_119951681576229217m_-8975110352418948720OWAfcf896d9-49d2-d342-0184-826481b314eb" class="OWAAutoLink" originalsrc="https://www.w3schools.com/react/react_router.asp" data-auth="Verified">
https://www.w3schools.com/react/react_router.asp</a></span></div>
<div style="direction: ltr; font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, Calibri, Helvetica, sans-serif; font-size: 9.75pt; color: black;">
<span style="background-color: rgb(255, 255, 0);">That's what you will generally want to base your policies on if they're available. </span></div>
<div style="direction: ltr; font-family: Arial, "BB.Proportional"; font-size: 9.75pt; color: black;">
<br>
6. For the resource id (or the subject id), why not make it a hash of the properties? That way it will be unique, and represent the totality of the request. It's really quick and easy for the API gateway to generate a sha-256 hash.</div>
<div style="direction: ltr; font-family: Arial, "BB.Proportional"; font-size: 9.75pt; color: black;">
<span style="background-color: rgb(255, 255, 0);">> What value would that add over leaving it empty then? Consistent JSON hashing is also surprisingly difficult as
<a href="https://www.rfc-editor.org/rfc/rfc7159.html#section-1" id="x_m_6217921018588231553m_7740259539453125901m_7377079112566041071m_119951681576229217m_-8975110352418948720LPlnk845435" class="OWAAutoLink" originalsrc="https://www.rfc-editor.org/rfc/rfc7159.html#section-1" data-auth="Verified">
JSON objects are specified to be unordered</a> .</span></div>
<div style="direction: ltr; font-family: Arial, "BB.Proportional"; font-size: 9.75pt; color: black;">
<br>
7. I really don't like the subject sent as "JWT" with the value as the id. At a minimum, you should use the fingerprint of the token, and not the token itself. Perhaps it would be better to send client claims in the subject properties, like client_id, scopes,
and allow for extension for customers who have custom access token claims?</div>
<div style="direction: ltr; font-family: Arial, "BB.Proportional"; font-size: 9.75pt; color: black;">
<span style="background-color: rgb(255, 255, 0);">> I agree with this for the same reason I gave on #4.<br>
For me it still feels logical to define it as the value of 'sub' in the JWT token by default and provide the additional JWT parameters in the `subject.properties` to disambiguate that further if needed. That same pattern can then also be applied to X509/mTLS
since they also have a Subject field that is generally enough but sometimes needs additional properties to be provided.</span></div>
<div style="direction: ltr; font-family: Arial, "BB.Proportional"; font-size: 9.75pt; color: black;">
<span style="background-color: rgb(255, 255, 0);">I can also think of lots of counter examples though. An API gateway that resolves several different authentication patterns to the same identity probably wouldn't too happy to be forced to have a subject type
for each authentication pattern.</span></div>
<div style="direction: ltr; font-family: Arial, "BB.Proportional"; font-size: 9.75pt; color: black;">
<span style="background-color: rgb(255, 255, 0);"><br>
</span></div>
<div style="direction: ltr; font-family: Arial, "BB.Proportional"; font-size: 9.75pt; color: black;">
8 .For the resource... what about something like this:</div>
<div style="direction: ltr; font-family: Arial, "BB.Proportional"; font-size: 9.75pt; color: black;">
<br>
"type": "AuthZen::HTTP_REQUEST",<br>
"id": "31d342599750a22f90a1d6b3d765549231e6b3091530f8f813e2f754e9d62422",<br>
"properties": {<br>
"header": {<br>
"Accept": "application/json",<br>
"User-Agent": "AuthzenClient/1.0",<br>
"Host": "<a href="http://www.acme.com/" id="x_m_6217921018588231553m_7740259539453125901m_7377079112566041071m_119951681576229217m_-8975110352418948720OWA488468d0-fae3-4b3d-5f3d-778e26540ef8" class="OWAAutoLink" originalsrc="http://www.acme.com/" data-auth="Verified">www.acme.com</a>",<br>
"Content-Type": "multipart/form-data"<br>
},<br>
"url": {<br>
"scheme": "https",<br>
"host": "www",<br>
"domain": "<a href="http://acme.com/" id="x_m_6217921018588231553m_7740259539453125901m_7377079112566041071m_119951681576229217m_-8975110352418948720OWA08158ac8-4665-7ec4-fbd4-7754b56512e5" class="OWAAutoLink" originalsrc="http://acme.com/" data-auth="Verified">acme.com</a>",<br>
"port": 443,<br>
"path": "/protected",<br>
"query": "query": {<br>
"param1": "value"<br>
}<br>
"fragment": "TOC"<br>
},<br>
"body": {<br>
"form1": {<br>
"field1": "value1",<br>
"field2": "value2"<br>
}<br>
}<br>
}<br>
<br>
<br>
</div>
<div style="direction: ltr; font-family: Arial, "BB.Proportional"; font-size: 9.75pt; color: black;">
--------------------------------------</div>
<div style="direction: ltr; font-family: Arial, "BB.Proportional"; font-size: 9.75pt; color: black;">
Michael Schwartz</div>
<div style="direction: ltr; font-family: Arial, "BB.Proportional"; font-size: 9.75pt; color: black;">
Glue</div>
<div style="direction: ltr; font-family: Arial, "BB.Proportional"; font-size: 9.75pt; color: black;">
Founder/CEO</div>
<div style="direction: ltr; font-family: Arial, "BB.Proportional"; font-size: 9.75pt; color: black;">
<a href="mailto:mike@gluu.org" id="x_m_6217921018588231553m_7740259539453125901m_7377079112566041071m_119951681576229217m_-8975110352418948720OWAadc3d9f8-f348-21e7-677b-cde32aade5b4" class="OWAAutoLink">mike@gluu.org</a></div>
<div style="direction: ltr; font-family: Arial, "BB.Proportional"; font-size: 9.75pt; color: black;">
<a href="https://www.linkedin.com/in/nynymike" id="x_m_6217921018588231553m_7740259539453125901m_7377079112566041071m_119951681576229217m_-8975110352418948720OWA04568d1d-dc8d-6790-113f-d19b363c704e" class="OWAAutoLink" originalsrc="https://www.linkedin.com/in/nynymike" data-auth="Verified">https://www.linkedin.com/in/nynymike</a></div>
<div style="font-family: Arial, "BB.Proportional"; font-size: 9.75pt; color: black;">
<br>
</div>
<div style="font-family: Arial, "BB.Proportional"; font-size: 10px; color: black;">
<img src="data:text/html;base64,<!DOCTYPE html> <html dir=ltr xmlns=http://www.w3.org/1999/xhtml translate=no> <head> <meta charset=utf-8> <meta http-equiv=X-UA-Compatible content="IE=edge"> <meta http-equiv=pragma content=no-cache> <meta name=viewport content="width=device-width,initial-scale=1,user-scalable=0"> <meta name=google value=notranslate> <meta name=format-detection content="telephone=no"> <meta name=scriptVer content=20250110003.23> <meta name=hashedPath content=hashed-v1> <meta name=physicalRing content=WW> <meta name=environment content=Prod> <meta name=bootFlights content=fwk-analytics-addons,dev-offlineMultiAccountDB,cal-widgets-upn-validation,auth-cacheTokenForMetaOsHub,auth-useAuthTokenClaimsForMetaOsHub,auth-codeChallenge,cal-widgets-disableWidgets,auth-msaljs-landingpage,shellmultiorigin:394927,cal-perf-eventsinstartupdata:525492,fwk-skipnavbardataonhosted:503140,cal-perf-useassumeoffset:522141,fwk-cssperfcf:502033,cal-perf-eventsinofflinestartupdata:549998,acct-add-account-e1-improvement:515788,auth-cachetokenformetaoshub:579266,cal-perf-eventsinstartupdatabyviewtype:542451,bootflightbusinessuser:698035,workerasyncload:634921,auth-msaljs-places:657523,auth-useauthtokenclaimsformetaoshub:653460,acctstartdataowav2:700801,auth-msaljs-places-sessionstorage:656411,cal-store-navbardata:683809,auth-msaljs-sessionstoreascachelocation:670740> <meta name=cdnUrl content=//res.public.onecdn.static.microsoft/> <meta name=backupCdnUrl content=//res.cdn.office.net/> <meta name=cdnContainer content=owamail/> <meta name=devCdnUrl content=> <meta name=ariaUrl content=> <meta name=webServerForest content=eurprd08> <meta name=webServerClique content=CLEURPRD08VIE05> <meta name=compactAriaUrl content=> <meta name=wcssFrameUrl content=https://webshell.suite.office.com> <meta name=wcssFrameUrls content={'DefaultUrl':'https://webshell.suite.office.com','WwdbUrl':'https://wwdb.webshell.suite.office.com','EudbUrl':'https://eudb.webshell.suite.office.com'}> <meta name=scriptPath content=scripts/> <meta name=owaIsAuthenticated content={{IsAuthenticated}}> <meta name=jsTimestamp content=1737644158064> <meta name=publicUrl content=https://outlook.office.com> <meta name=aadAuthorityUrl content=https://login.microsoftonline.com/> <meta name=businessCanonicalHostName content=outlook.office365.com> <meta name=isRPSAuthCookiePresent content=False> <link rel=preconnect href=//res.public.onecdn.static.microsoft/ crossorigin=anonymous> <link rel=preconnect href=https://login.microsoftonline.com/ crossorigin=use-credentials> <link rel="shortcut icon" href=/mail/favicon.ico type=image/x-icon> <link rel=apple-touch-icon href=//res.public.onecdn.static.microsoft/assets/mail/pwa/v1/pngs/apple-touch-icon.png> <noscript>JavaScript must be enabled.</noscript> <title>Outlook</title><link integrity="sha256-7b6EknKJVGlxzExRHGAod+/iYk+F9xQre/aNtMDy5d8=" rel="preload" href="//res.public.onecdn.static.microsoft/owamail/hashed-v1/scripts/owa.mail.runtime.1eb1e703.js" as="script" crossorigin="anonymous"/><link integrity="sha256-KoKhNqxdGhSHgcAk79z7lCqvs1iJxG9dvyzuUfobcbU=" rel="preload" href="//res.public.onecdn.static.microsoft/owamail/hashed-v1/scripts/owa.mailindex.df50e829.js" as="script" crossorigin="anonymous"/> <style>@font-face{font-family:FabricMDL2Icons;src:url('//res.public.onecdn.static.microsoft/owamail/20250110003.23/resources/fonts/o365icons-mdl2.woff') format('woff');font-weight:400;font-style:normal}@font-face{font-family:office365icons;src:url('//res.public.onecdn.static.microsoft/owamail/20250110003.23/resources/fonts/office365icons.woff?') format('woff');font-weight:400;font-style:normal}#loadingScreen{position:fixed;top:0;bottom:0;left:0;right:0;background-color:#fff}#loadingLogo{position:fixed;top:calc(50vh - 90px);left:calc(50vw - 90px);width:180px;height:180px}#MSLogo{position:fixed;bottom:36px;left:calc(50vw - 50px)}.dark #loadingScreen{background-color:#333}.darkNew #loadingScreen{background-color:#1f1f1f}</style> <script nonce=BVx5VtREtr8qL7ZcyoV01Q==>try{!function(){if("localStorage"in window){var e="UsersNormalizedTheme",t=window.localStorage,a=t.getItem("olk-"+e)||t.getItem(e);a&&/\.dark$/.test(a)&&document.documentElement.classList.add("dark"),a&&/\.dark\.new$/.test(a)&&document.documentElement.classList.add("darkNew");var n=t.getItem("PwaTheme");if(n){var o=document.getElementsByName("theme-color");o&&o.length&&o[0].setAttribute("content",n)}}}()}catch(e){}</script> <script nonce=BVx5VtREtr8qL7ZcyoV01Q==>function logError(n,o,e,r,a,i){window.owaErrorHandler?window.owaErrorHandler(n,o,e,r,a,i):window.owaBackfilledErrors.push(arguments)}function hashChangeHandler(){window.owaLocationHash=window.location?window.location.hash:void 0}window.FabricConfig={fontBaseUrl:null},window.owaBackfilledErrors=[],window.onerror=logError,"onunhandledrejection"in window&&window.addEventListener("unhandledrejection",(function(n){var o=n&&n.reason||"[no reason given]";o instanceof Error?logError("Unhandled Rejection: "+o,"",0,0,o):o.responseErrorMessage&&o.callstackAtRequest&&o instanceof Response?logError(o.responseErrorMessage,"",void 0,void 0,void 0,o.callstackAtRequest):logError("Unhandled Rejection: "+("string"==typeof o?o:JSON.stringify(o)))})),window.onload=function(){var n=self.location;!self.Owa&&n&&void 0!==n.search&&-1==n.search.indexOf("gulp")&&-1==n.search.indexOf("branch")&&(-1==n.search.indexOf("bO=2")?n.search+=(n.search?"&":"?")+"bO=2":n.assign("/owa/auth/frowny.aspx?bret=fail&esrc=IndexPageIncomplete&app=Mail&bO=2"))},hashChangeHandler(),window.addEventListener("hashchange",hashChangeHandler)</script> <link integrity="sha256-dg6BuoHxYV+tRp+/RoMPEBDfoz4E5Aq8mHV1IQNduy8=" rel="preload" href="//res.public.onecdn.static.microsoft/owamail/hashed-v1/scripts/owa.85331.m.2506b1da.js" as="script" crossorigin="anonymous"/><link integrity="sha256-8owKuxurYbFUdtaEAHVSd4ZTJgM/UPsf4pFSjnfpG74=" rel="preload" href="//res.public.onecdn.static.microsoft/owamail/hashed-v1/scripts/owa.AppBoot.m.3525a4d3.css" as="style" crossorigin="anonymous"/><link integrity="sha256-JHmvovVFzxLLLRECF18m7rQbINYmiAMfu9j82iPHc2A=" rel="preload" href="//res.public.onecdn.static.microsoft/owamail/hashed-v1/scripts/owa.AppBoot.m.8ce26a94.js" as="script" crossorigin="anonymous"/><link integrity="sha256-sBPf/buJl1FrLlqN2p92Qk3XM50wqoGDTDyOOqJDLsY=" rel="preload" href="//res.public.onecdn.static.microsoft/owamail/hashed-v1/scripts/owa.25147.m.a9a004f7.js" as="script" crossorigin="anonymous"/><link integrity="sha256-U2AfziS8yALmn+39LXXOQd2tGELTy3Mup8AjD8vDJx0=" rel="preload" href="//res.public.onecdn.static.microsoft/owamail/hashed-v1/scripts/owa.61348.m.d63777b1.js" as="script" crossorigin="anonymous"/><link integrity="sha256-Gc9oK+ObKaetKgoFrnRd89j14XWVWwOKnqSG/crXX84=" rel="preload" href="//res.public.onecdn.static.microsoft/owamail/hashed-v1/scripts/owa.2069.m.3abbfb6d.js" as="script" crossorigin="anonymous"/><link integrity="sha256-zRW/yEKAjgyi/hvgwhfgUufL9AufFbF2GxVU7avXzMg=" rel="preload" href="//res.public.onecdn.static.microsoft/owamail/hashed-v1/scripts/owa.MsalAuth.m.9e8fae5a.js" as="script" crossorigin="anonymous"/><script integrity="sha256-7b6EknKJVGlxzExRHGAod+/iYk+F9xQre/aNtMDy5d8=" src="//res.public.onecdn.static.microsoft/owamail/hashed-v1/scripts/owa.mail.runtime.1eb1e703.js" crossorigin="anonymous"></script><script integrity="sha256-KoKhNqxdGhSHgcAk79z7lCqvs1iJxG9dvyzuUfobcbU=" src="//res.public.onecdn.static.microsoft/owamail/hashed-v1/scripts/owa.mailindex.df50e829.js" crossorigin="anonymous"></script></head> <body role=application class="ms-font-s disableTextSelection ms-Fabric--isFocusHidden"> <div id=app></div> <div id=loadingScreen> <div id=loadingLogo dir=ltr> <style>:root{--s:180px;--envW:130px;--envH:71px;--calW:118px;--sqW:calc(var(--calW) / 3);--sqH:37px;--calHH:20px;--calH:calc(var(--sqH) * 3 + var(--calHH));--calY:calc(var(--calH) + 20px);--calYExt:calc(var(--calH) - 80px);--calYOverExt:calc(var(--calH) - 92px);--flapS:96px;--flapH:calc(0.55 * var(--envH));--flapScaleY:calc(var(--flapH) / var(--flapWidth));--dur:5s}#container{width:var(--s);height:var(--s);animation:bounce var(--dur) infinite}@keyframes bounce{0%,100%,12.5%,32.5%,76.1%{transform:translateY(0)}22.5%,86%{transform:translateY(7px)}}#logo{height:179px;width:130px;overflow:hidden;margin-top:-59px;margin-left:25px}#containerShadow{position:relative;top:120px;left:25px;width:var(--envW);height:var(--envH);border-radius:0 0 7px 7px;box-shadow:rgba(0,0,0,.25) 0 4px 5px;animation:shadow-fade var(--dur) infinite}@keyframes shadow-fade{0%,100%,21.2%,80%{opacity:0}47%,70%{opacity:1}}#flapContainer{width:var(--envW);margin-top:179px}#ef{width:var(--envW);height:var(--envH);border-radius:0 0 7px 7px;overflow:hidden;margin-top:-41px}#ef>.l{width:287px;height:var(--envH);background:#28a8ea;transform:translate(-153px,-70px) rotate(28deg)}#ef>.r{width:287px;height:var(--envH);background:#1490df;transform:translate(-120px,63px) rotate(-28deg)}#eb{width:var(--envW);height:40px;background:#123b6d;margin-top:-70px}#cal{display:flex;flex-wrap:wrap;width:var(--calW);height:var(--calH);border-radius:7px;overflow:hidden;margin:0 auto;margin-top:-306px;animation:cal-bounce var(--dur) infinite;animation-timing-function:cubic-bezier(0,0.5,0,1);transform:translateY(var(--calYExt)) scaleY(1)}@keyframes cal-bounce{0%,100%,16.5%,76.1%{transform:translateY(var(--calY)) scaleY(1)}28%{transform:translateY(var(--calYOverExt)) scaleY(1)}31%{transform:translateY(var(--calYExt)) scaleY(1.05)}33%{transform:translateY(var(--calYExt)) scaleY(.96)}34%,68.5%{transform:translateY(var(--calYExt)) scaleY(1)}68.5%{animation-timing-function:cubic-bezier(0.66,-0.16,1,-0.29)}}#cal>.t{width:var(--calW);height:calc(var(--calHH) + 1px);margin-bottom:-1px;background:#0358a7}#cal>.r{display:flex;width:var(--calW);height:var(--sqH)}.s{width:var(--sqW);height:calc(var(--sqH) + 1px)}.s1{background:#0078d4}.s2{background:#28a8ea}.s3{background:#50d9ff}.s4{background:#0364b8}.s5{background:#14447d}#openedFlap{width:var(--envW);height:107px;animation:opened-flap-swing var(--dur) infinite;animation-timing-function:cubic-bezier(0.32,0,0.67,0);transform-origin:top;transform:translateY(-68px) rotate3d(1,0,0,-180deg)}@keyframes opened-flap-swing{0%,100%,14.5%,76%{transform:translateY(-68px) rotate3d(1,0,0,-90deg)}16.5%,74%{transform:translateY(-68px) rotate3d(1,0,0,-180deg)}}#closedFlap{width:var(--envW);animation:closed-flap-swing var(--dur) infinite;animation-timing-function:cubic-bezier(0.32,0,0.67,0);transform-origin:top;transform:translateY(calc(-1 * var(--envH))) rotate3d(1,0,0,90deg)}@keyframes closed-flap-swing{0%,100%,77%,8.5%{transform:translateY(calc(-1 * var(--envH))) rotate3d(1,0,0,0)}14.5%,76%{transform:translateY(calc(-1 * var(--envH))) rotate3d(1,0,0,90deg)}}#fmask{width:var(--envW);height:107px;overflow:hidden}.flapTriangle{width:var(--flapS);height:var(--flapS);background:#50d9ff;margin:-48px auto 0 auto;border-radius:7px;transform:scaleY(.6) rotate(45deg)}#openedFlap .flapTriangle{background:#123b6d}#closedFlap .flapTriangle{background:#50d9ff}</style> <div id=container> <div id=containerShadow></div> <div id=logo> <div id=flapContainer> <div id=openedFlap> <div id=fmask><div class=flapTriangle></div></div> </div> <div id=cal> <div class=t></div> <div class=r> <div class="s s1"></div> <div class="s s2"></div> <div class="s s3"></div> </div> <div class=r> <div class="s s4"></div> <div class="s s1"></div> <div class="s s2"></div> </div> <div class=r> <div class="s s5"></div> <div class="s s4"></div> <div class="s s1"></div> </div> </div> </div> <div id=eb></div> <div id=ef> <div class=r></div> <div class=l></div> </div> <div id=closedFlap> <div id=fmask><div class=flapTriangle></div></div> </div> </div> </div> </div> <img src=//res.public.onecdn.static.microsoft/assets/framework/microsoft.svg id=MSLogo alt=Microsoft> </div> </body> </html> "></div>
<hr>
<div style="font-family: "Sans Serif"; font-size: 10px; color: rgb(128, 128, 128);">
<b>CONFIDENTIALITY NOTICE</b></div>
<div style="font-family: "Sans Serif"; font-size: 10px; color: rgb(128, 128, 128);">
This message may contain confidential or legally privileged information.<br>
If you are not the intended recipient, please immediately advise the sender by reply e-mail that you received this message, and delete this e-mail from your system.<br>
Thank you for your cooperation</div>
<div style="margin: 14px 14px 14px 0px; padding-top: 4px; border-top: 1px dotted black;">
</div>
<pre><div style="font-size: 9.75pt; color: black;">--
Openid-specs-authzen mailing list
<a href="mailto:Openid-specs-authzen@lists.openid.net" id="OWA71487311-c426-c71f-946b-fe18261945ca" class="OWAAutoLink">Openid-specs-authzen@lists.openid.net</a>
<a href="https://lists.openid.net/mailman/listinfo/openid-specs-authzen" id="OWAe44556b2-dd24-4fa8-8d38-65e1c8fc0d81" class="OWAAutoLink" originalsrc="https://lists.openid.net/mailman/listinfo/openid-specs-authzen" data-auth="Verified">https://lists.openid.net/mailman/listinfo/openid-specs-authzen</a>
</div></pre>
</blockquote>
<div style="font-family: Arial, "BB.Proportional"; font-size: 9.75pt; color: black;">
<br>
</div>
</div>
--<br>
Openid-specs-authzen mailing list<br>
<a href="mailto:Openid-specs-authzen@lists.openid.net" id="OWA421a7e78-377e-671a-22ec-13f5e4333ac8" class="OWAAutoLink">Openid-specs-authzen@lists.openid.net</a><br>
<a href="https://lists.openid.net/mailman/listinfo/openid-specs-authzen" id="OWA204f9895-f328-a7fc-1325-dd5b3d268dfb" class="OWAAutoLink" originalsrc="https://lists.openid.net/mailman/listinfo/openid-specs-authzen" data-auth="Verified">https://lists.openid.net/mailman/listinfo/openid-specs-authzen</a><br>
</blockquote>
--<br>
Openid-specs-authzen mailing list<br>
<a href="mailto:Openid-specs-authzen@lists.openid.net" id="OWA97a44c04-f191-e6e0-9648-765e692dce81" class="OWAAutoLink">Openid-specs-authzen@lists.openid.net</a><br>
<a href="https://lists.openid.net/mailman/listinfo/openid-specs-authzen" id="OWA8d99992e-e2f0-6346-112d-1bc900679540" class="OWAAutoLink" originalsrc="https://lists.openid.net/mailman/listinfo/openid-specs-authzen" data-auth="Verified">https://lists.openid.net/mailman/listinfo/openid-specs-authzen</a><br>
</blockquote>
<br>
<div style="font-size: 10px;"><img src="https://github.com/GluuFederation/docs-gluu-server-prod/blob/master/docs/source/small_logo.png?raw=true"></div>
<hr>
<div style="font-family: "Sans Serif"; font-size: 10px; color: rgb(128, 128, 128);">
<b>CONFIDENTIALITY NOTICE</b></div>
<span style="font-family: Sans Serif; font-size: 10px; color: rgb(128, 128, 128);">This message may contain confidential or legally privileged information.<br>
If you are not the intended recipient, please immediately advise the sender by reply e-mail that you received this message, and delete this e-mail from your system.<br>
Thank you for your cooperation</span><br>
</body>
</html>