[Openid-specs-fapi] Fwd: New Version Notification for draft-campbell-oauth-tls-client-auth-00.txt
Nat Sakimura
nat at sakimura.org
Tue Oct 11 04:19:09 UTC 2016
Thanks!
Now the ball is in my court to apply the changes and do the draft split
...
Nat
On 2016-10-11 11:58, Preibisch, Sascha H via Openid-specs-fapi wrote:
> +1
>
> From: Openid-specs-fapi <openid-specs-fapi-bounces at lists.openid.net> on behalf of John Bradley via Openid-specs-fapi <openid-specs-fapi at lists.openid.net>
> Reply-To: John Bradley <ve7jtb at ve7jtb.com>, Financial API Working Group List <openid-specs-fapi at lists.openid.net>
> Date: Monday, October 10, 2016 at 1:59 PM
> To: OAuth WG <oauth at ietf.org>
> Cc: Nat Sakimura via Openid-specs-fapi <openid-specs-fapi at lists.openid.net>
> Subject: [Openid-specs-fapi] Fwd: New Version Notification for draft-campbell-oauth-tls-client-auth-00.txt
>
> At the request of the OpenID Foundation Financial Services API Working group, Brian Campbell and I have documented
> mutual TLS client authentication. This is something that lots of people do in practice though we have never had a spec for it.
>
> The Banks want to use it for some server to server API use cases being driven by new open banking regulation.
>
> The largest thing in the draft is the IANA registration of "tls_client_auth" Token Endpoint authentication method for use in Registration and discovery.
>
> The trust model is intentionally left open so that you could use a "common name" and a restricted list of CA or a direct lookup of the subject public key against a reregistered value, or something in between.
>
> I hope that this is non controversial and the WG can adopt it quickly.
>
> Regards
> John B.
>
>> Begin forwarded message:
>>
>> FROM: internet-drafts at ietf.org
>>
>> SUBJECT: NEW VERSION NOTIFICATION FOR DRAFT-CAMPBELL-OAUTH-TLS-CLIENT-AUTH-00.TXT
>>
>> DATE: October 10, 2016 at 5:44:39 PM GMT-3
>>
>> TO: "Brian Campbell" <brian.d.campbell at gmail.com>, "John Bradley" <ve7jtb at ve7jtb.com>
>>
>> A new version of I-D, draft-campbell-oauth-tls-client-auth-00.txt
>> has been successfully submitted by John Bradley and posted to the
>> IETF repository.
>>
>> Name: draft-campbell-oauth-tls-client-auth
>> Revision: 00
>> Title: Mutual X.509 Transport Layer Security (TLS) Authentication for OAuth Clients
>> Document date: 2016-10-10
>> Group: Individual Submission
>> Pages: 5
>> URL: https://www.ietf.org/internet-drafts/draft-campbell-oauth-tls-client-auth-00.txt [1]
>> Status: https://datatracker.ietf.org/doc/draft-campbell-oauth-tls-client-auth/ [2]
>> Htmlized: https://tools.ietf.org/html/draft-campbell-oauth-tls-client-auth-00 [3]
>>
>> Abstract:
>> This document describes X.509 certificates as OAuth client
>> credentials using Transport Layer Security (TLS) mutual
>> authentication as a mechanism for client authentication to the
>> authorization server's token endpoint.
>>
>> Please note that it may take a couple of minutes from the time of submission
>> until the htmlized version and diff are available at tools.ietf.org [4].
>>
>> The IETF Secretariat
>
> _______________________________________________
> Openid-specs-fapi mailing list
> Openid-specs-fapi at lists.openid.net
> http://lists.openid.net/mailman/listinfo/openid-specs-fapi [5]
Links:
------
[1]
https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ietf.org_internet-2Ddrafts_draft-2Dcampbell-2Doauth-2Dtls-2Dclient-2Dauth-2D00.txt&d=DQMFaQ&c=_hRq4mqlUmqpqlyQ5hkoDXIVh6I6pxfkkNxQuL0p-Z0&r=BjnOFeRZMwPBZLm00SguJm4i4lt0O13oAeF-9EZheL8&m=y0V-Som1RDD_XSON16geiVwizJHHdigmrpofDystITA&s=260YDXh2PcZARRiXTxOl8pc5v0ziWSLzLiG9CI0OOlI&e=
[2]
https://urldefense.proofpoint.com/v2/url?u=https-3A__datatracker.ietf.org_doc_draft-2Dcampbell-2Doauth-2Dtls-2Dclient-2Dauth_&d=DQMFaQ&c=_hRq4mqlUmqpqlyQ5hkoDXIVh6I6pxfkkNxQuL0p-Z0&r=BjnOFeRZMwPBZLm00SguJm4i4lt0O13oAeF-9EZheL8&m=y0V-Som1RDD_XSON16geiVwizJHHdigmrpofDystITA&s=NOkb8avw2ZN74wW-gLDbuZfXskqV9xRqyYvV5Fg18_Y&e=
[3]
https://urldefense.proofpoint.com/v2/url?u=https-3A__tools.ietf.org_html_draft-2Dcampbell-2Doauth-2Dtls-2Dclient-2Dauth-2D00&d=DQMFaQ&c=_hRq4mqlUmqpqlyQ5hkoDXIVh6I6pxfkkNxQuL0p-Z0&r=BjnOFeRZMwPBZLm00SguJm4i4lt0O13oAeF-9EZheL8&m=y0V-Som1RDD_XSON16geiVwizJHHdigmrpofDystITA&s=9z770xRpUnNkMOo9UDUj5gYGUZXwQljipKvN0VfMC74&e=
[4]
https://urldefense.proofpoint.com/v2/url?u=http-3A__tools.ietf.org&d=DQMFaQ&c=_hRq4mqlUmqpqlyQ5hkoDXIVh6I6pxfkkNxQuL0p-Z0&r=BjnOFeRZMwPBZLm00SguJm4i4lt0O13oAeF-9EZheL8&m=y0V-Som1RDD_XSON16geiVwizJHHdigmrpofDystITA&s=kqP8TZStoJyWhk2OJiXgoNTWIsNvNH5qgGX7QBWBHWA&e=
[5] http://lists.openid.net/mailman/listinfo/openid-specs-fapi
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs-fapi/attachments/20161011/980b3c9c/attachment.html>
More information about the Openid-specs-fapi
mailing list