[openid-specs-rande] today's meeting notes
Mischa Salle
msalle at nikhef.nl
Mon Apr 1 09:11:23 UTC 2019
Hi Paul.
On Fri, Mar 29, 2019 at 10:09:08AM +0100, Paul Millar wrote:
> I've just joined this group.
Welcome!!
> There's certainly a number of familiar faces here.
(-;
> On 28/03/2019 13:13, Mischa Salle wrote:
> > On Thu, Mar 28, 2019 at 12:39:42PM +0100, Roland Hedberg wrote:
> > > > I was wondering about the sub + '!' + iss suggestion.
> > > >
> > > > I often found this notion: sub + '@' + iss. It seems logical to me to use
> > > > it like user at host, just like ssh or email.
> > > >
> > > > Wondering whether the '@' was discussed. >>
> > > Looks too much like an email address. We wanted something that looked like nothing else.
> > > With the hope that people would not have any preconceived notion about what they could
> > > use them for.
>
> FWIW, in dCache the SciToken (which is basically just a profile of OAuth2)
> identifiers are currently stored with a ':' separator (rather than '!'). To
> me, this looks like the iss is scoping the sub ("foo:bar" => "foo" is the
> scope within which "bar" is defined).
>
> The other twist is that each SciToken issuer has a unique nickname within
> the dCache configuration. So, rather than referring to an OP as
> "https://issuer 1.example.org/foo", the nickname might be "FOO".
>
> The combined identifier would be "FOO:<sub>".
>
> Identifiers for dCache's OIDC support are currently just <sub> (yeah, need
> to fix that.)
>
> If you want to have an identifier from directly composing <sub> and <iss>
> then I guess one requirement is that it should be possible to decompose the
> token back to <sub> and <iss> in an unambiguous fashion.
>
> <sub> is an opaque token, while (IIRC) <iss> is always going to be a URI.
For OIDC, yes it's a URL actually (not even a URI), on the other hand,
the JWT RFC7519 underpinning most implementation using 'fat' access
tokens, only says StringOrURI
https://tools.ietf.org/html/rfc7519#section-4.1.1
> [...]
> > yesterday during our AARC meeting I wondered whether we can't just use a
> > JSON (either as JSONObject with the claim names, or as JSONArray). It's
> > not that much longer and clearly defined: by definition it must be
> > expressible as such.
>
> While certainly an option, it seems an inelegant solution to me:
>
>1. it does make the identifier longer than necessary,
I agree with that, although in particular a JSONArray would add a very
minimal overhead (but requires slightly more parsing code and a clear
definition of the order).
> 2. certain characters would need to be escaped -- reading
> the identifier becomes (in some cases) non-trivial
No, that makes no sense: we're talking in any case about something that
can be put into a JWT (either a OIDC ID token, or a OAuth2 using JWTs as
access tokens) as sub/iss claims. You just put whatever is in that JWT
1-to-1 into the new JWT.
> 3. it risks "feature creep" where more metadata is injected
> into what is meant to be a simple identifier.
I would claim (no pun intended) the opposite: the natural representation
is as claims in a JWT, so what's better than to use a 'reduced' JWT just
containing those two claims?
Cheers,
Mischa
--
Nikhef Room H155
Science Park 105 Tel. +31-20-592 5102
1098 XG Amsterdam Fax +31-20-592 5155
The Netherlands Email msalle at nikhef.nl
__ .. ... _._. .... ._ ... ._ ._.. ._.. .._..
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/x-pkcs7-signature
Size: 4521 bytes
Desc: not available
URL: <http://lists.openid.net/pipermail/openid-specs-rande/attachments/20190401/764a0681/attachment.bin>
More information about the openid-specs-rande
mailing list