-
Notifications
You must be signed in to change notification settings - Fork 15
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
consider methods to obtain access tokens from an authorization server instead of making them in the client #12
Comments
Latest draft relies on DPoP-bound Access Token issued by user's IdP. While client doesn't create access tokens any more, just DPoP Proofs, it still doesn't follow approach suggested in this issue. Maybe we could rename this issue to clearly propose that RS associated Authorization Server should issue Access Tokens. |
BTW maybe OAuth 2.0 Token Exchange would still allow RS to delegate some responsibilities to AS server of its choice. I guess RS would still need to do the DPoP verification but could leave all the rest to AS it exchanges tokens with. |
This is an old issue that has been discussed and it is more in line with classic OAuth2 than OpenID Connect. Marking as closed as the Solid-OIDC proposal relies significantly on DPoP. |
in the current POP token scheme, the client directly manufactures an access token to present to the server with the "
Bearer
" method. as discussed on the 2019-08-26 and other calls and in #1, i believe there are numerous problems with the current POP token scheme.several issues raised in #1 can at least be partially addressed by approaches discussed in #3, #9, #10. a summary of the most important remaining problems specifically with the client making access tokens:
obtaining an access token from the resource server's authorization server instead of using an access token made by the client addresses the above and has the following benefits:
iat
or serial number or something. techniques like Bloom filters could be used in very high-volume deployments.401
response, could provide an API endpoint to obtain an access token that is otherwise compatible with the server's existingBearer
-based authorization infrastructure.Bearer
" model, which might make security people happier.with the following cost:
The text was updated successfully, but these errors were encountered: