[Openid-specs-fapi] [OAUTH-WG] New Version Notification for draft-campbell-oauth-tls-client-auth-00.txt

Brian Campbell bcampbell at pingidentity.com
Sun Nov 13 21:21:03 UTC 2016


Yes, the intend is that the authentication method is determined by client
policy regardless of whether the client was dynamically registered or
statically configured or whatever. I can make that point more explicit in
future revisions of the draft.

On Sat, Nov 12, 2016 at 10:59 PM, Torsten Lodderstedt <
torsten at lodderstedt.net> wrote:

> I understand. My point is different: the text seems to assume everybody is
> using client registration, but that's not the case. I would like to point
> out it makes sense to explicitely state the assumption that it is
> determined by client policy (indepedent of the way this policy is
> established).
>
>
> Am 13.11.2016 um 14:24 schrieb Justin Richer:
>
> As part of the client’s registered data model. At least, based on how our
> own implementation works (where we support client_secret_basic,
> private_key_jwt, etc), that’s where we’d check to see if the client was
> supposed to be using TLS auth or not.
>
> We don’t let clients switch away from their registered auth mechanism.
>
>  — Justin
>
> On Nov 13, 2016, at 2:21 PM, Torsten Lodderstedt <torsten at lodderstedt.net>
> wrote:
>
> Justin,
>
> Am 13.11.2016 um 13:39 schrieb Justin Richer:
>
> Torsten, I believe this is intended to be triggered by the tls_client_auth
> value specified in §3.
>
>
> in the token request?
>
>
> Nit on that section, the field name for the client metadata in RFC7591 is
> token_endpoint_auth_method, the _supported version is from the
> corresponding discovery document.
>
>  — Justin
>
> Torsten.
>
> On Nov 13, 2016, at 12:31 PM, Torsten Lodderstedt <
> <torsten at lodderstedt.net>torsten at lodderstedt.net> wrote:
>
> Hi John and Brian,
>
> thanks for writting this draft.
>
> One question: how does the AS determine the authentication method is TLS
> authentication? I think you assume this is defined by the client-specific
> policy, independent of whether the client is registered automatically or
> manually. Would you mind to explicitely state this in the draft?
>
> best regards,
> Torsten.
>
> Am 11.10.2016 um 05:59 schrieb John Bradley:
>
> At the request of the OpenID Foundation Financial Services API Working
> group, Brian Campbell and I have documented
> mutual TLS client authentication.   This is something that lots of people
> do in practice though we have never had a spec for it.
>
> The Banks want to use it for some server to server API use cases being
> driven by new open banking regulation.
>
> The largest thing in the draft is the IANA registration of
> “tls_client_auth” Token Endpoint authentication method for use in
> Registration and discovery.
>
> The trust model is intentionally left open so that you could use a “common
> name” and a restricted list of CA or a direct lookup of the subject public
> key against a reregistered value,  or something in between.
>
> I hope that this is non controversial and the WG can adopt it quickly.
>
> Regards
> John B.
>
>
>
>
> Begin forwarded message:
>
> *From: * <internet-drafts at ietf.org>internet-drafts at ietf.org
> *Subject: **New Version Notification for
> draft-campbell-oauth-tls-client-auth-00.txt*
> *Date: *October 10, 2016 at 5:44:39 PM GMT-3
> *To: *"Brian Campbell" < <brian.d.campbell at gmail.com>
> brian.d.campbell at gmail.com>, "John Bradley" < <ve7jtb at ve7jtb.com>
> ve7jtb at ve7jtb.com>
>
>
> A new version of I-D, draft-campbell-oauth-tls-client-auth-00.txt
> has been successfully submitted by John Bradley and posted to the
> IETF repository.
>
> Name: draft-campbell-oauth-tls-client-auth
> Revision: 00
> Title: Mutual X.509 Transport Layer Security (TLS) Authentication for
> OAuth Clients
> Document date: 2016-10-10
> Group: Individual Submission
> Pages: 5
> URL:
> <https://www.ietf.org/internet-drafts/draft-campbell-oauth-tls-client-auth-00.txt>
> https://www.ietf.org/internet-drafts/draft-campbell-oauth-tls-client-
> auth-00.txt
> Status:
> <https://datatracker.ietf.org/doc/draft-campbell-oauth-tls-client-auth/>
> https://datatracker.ietf.org/doc/draft-campbell-oauth-tls-client-auth/
> Htmlized:
> <https://tools.ietf.org/html/draft-campbell-oauth-tls-client-auth-00>
> https://tools.ietf.org/html/draft-campbell-oauth-tls-client-auth-00
>
>
> Abstract:
>   This document describes X.509 certificates as OAuth client
>   credentials using Transport Layer Security (TLS) mutual
>   authentication as a mechanism for client authentication to the
>   authorization server's token endpoint.
>
>
>
>
> Please note that it may take a couple of minutes from the time of
> submission
> until the htmlized version and diff are available at tools.ietf.org.
>
> The IETF Secretariat
>
>
>
>
> _______________________________________________
> OAuth mailing listOAuth at ietf.orghttps://www.ietf.org/mailman/listinfo/oauth
>
>
> _______________________________________________
> OAuth mailing list
> OAuth at ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>
>
>
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs-fapi/attachments/20161113/6d92479d/attachment.html>


More information about the Openid-specs-fapi mailing list