Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

OAuth2 Opaque token [to and from] JWT profiled OAuth2 token #26

Open
identitymonk opened this issue Oct 3, 2024 · 2 comments
Open

OAuth2 Opaque token [to and from] JWT profiled OAuth2 token #26

identitymonk opened this issue Oct 3, 2024 · 2 comments

Comments

@identitymonk
Copy link

As discussed during IETF 120, I had to deal with customers that used Opaque Token on the public leg of the communication (Client to API) while it might be better to possess a JWT profiled token for the transaction on the private leg (API to backend services).

The reverse translation might be interesting for privacy purposes if communications have to cross zone of trusts / realm, as the communication might be a public leg again, which would require a JWT profiled token to be translated into an Opaque Token.

@deansaxe
Copy link
Owner

deansaxe commented Oct 7, 2024

Do you have a proposal for how this would work @identitymonk? Is this a token exchange RFC compliant exchange or something we would need to profile for translation?

@identitymonk
Copy link
Author

This usage for WIMSE falls into the description of the side note of RFC 8693 section 3 Token Type Identifiers

urn:ietf:params:oauth:token-type:jwt is to indicate specifically that a JWT is being requested or sent (perhaps in a cross-domain use case where the JWT is used as an authorization grant to obtain an access token from a different authorization server as is facilitated by [RFC7523])

Still RFC 8693 fell short of supporting this specific use case as there are no way to signal which issuer is related to the OAuth2 Opaque Token provided or requested to be issued. As WIMSE may have to deal with multiple trust

Therefore a WIMSE profile for translation needs to be written to guide and guardrail its usage.

I will formalize a proposal as part of this issue for this use case.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants