Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Limiting Proof of Possession Scope #50

Closed
PieterKas opened this issue Jul 4, 2024 · 7 comments
Closed

Limiting Proof of Possession Scope #50

PieterKas opened this issue Jul 4, 2024 · 7 comments
Assignees
Labels

Comments

@PieterKas
Copy link

PieterKas commented Jul 4, 2024

Commenting as identity enthusiast as opposed to WIMSE co-chair:

Do we need additional mechanism defined in the Workload Proof Token for additional scoping (e.g. specific API on a target workload)?

@yaronf
Copy link
Collaborator

yaronf commented Jul 11, 2024

This is related to the bigger question of whether the token is reusable or associated with a single HTTP request.

@bc-pi
Copy link
Collaborator

bc-pi commented Jul 11, 2024

The aud is basically meant to do that https://www.ietf.org/archive/id/draft-sheffer-wimse-s2s-protocol-00.html#section-4.2-2.2.2.2.1

But also what @yaronf said

@bc-pi
Copy link
Collaborator

bc-pi commented Jul 18, 2024

and the @method and @request-target and Content-Type and Content-Digest in the https://www.ietf.org/archive/id/draft-sheffer-wimse-s2s-protocol-00.html#name-option-2-authentication-bas approach

@arndt-s
Copy link
Collaborator

arndt-s commented Aug 29, 2024

From what I can see we have the following options for the Workload Proof Token (DPoP approach). The order is random and the options are not pre-filtered.

  • Option A: Specify some selected claims for various request attributes. This could be an Access Token and/or Transaction token hash, the audience to specify endpoint and potentially method, maybe body hash, etc.

  • Option B: Don't specify anything and only limit it by the audience. If customers need specific attributes bound they can include it into the audience

  • Option C: Build something more flexible that allows to specify similar to HTTP Message Signatures what is bound. This would require the draft to include rules on how the digest is calculated.

  • Option D: Allow customers to specify their own claims and rules (in addition to audience). We could only specify the claim for the digest. While this allows the most flexibility the interoperability would be a challenge.

  • Option E: Use RFC9449 claims (htm & htu) to start with and profile more if necessity arises. OAuth could profit from this too then which could boost adoption.

I'm sure there's more options that don't come into my mind at the moment.

@yaronf
Copy link
Collaborator

yaronf commented Aug 30, 2024

B and D are clearly a no go because they leave to much to the user and/or do not promote interoperability.

Personally I think we'll be forced into C, I think the complexity is justified and people will be writing new code for WIMSE anyway.

I don't understand the comment about OAuth in option E. To me this is not OAuth DPoP, this is an entirely new think inspired by that DPoP. And yes, features we add here may be "back ported" into OAuth DPoP.

@arndt-s
Copy link
Collaborator

arndt-s commented Sep 3, 2024

@yaronf yes, this is what I was trying to say, if WIMSE would define claims for messaging queue possession, OAuth could profit from that too.

Anyway, nothing we should put a lot of weight on IMO.

@arndt-s
Copy link
Collaborator

arndt-s commented Sep 12, 2024

Closing this in favour of #39.

Overall, the authors believe that including the user context to the WPT scope makes sense. The current draft includes audience, ath, tth in the DPoP approach and allows signature over url, header & body in the Http Message Signature approach.

#39 is focusing on accustom deployments that may use over approaches with the WPT token.

@arndt-s arndt-s closed this as completed Sep 12, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

4 participants