-
-
Notifications
You must be signed in to change notification settings - Fork 668
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
V51 OAuth: Add resource server verifications (modify 51.4.1) #2045
Comments
What is the security risk to solve or attack to take down with those requirements? By current wording, those are resource server functionality testing. |
The sender-constrained access tokens mitigates the risk with "token theft", where an attacker is able to get a valid token, perhaps from logs or leaked in some way to other services (where the attacker have access), see e g https://www.rfc-editor.org/rfc/rfc8705.html#name-introduction
Maybe it is better to use that, something like this, perhaps a bit long?
|
It covers both initially proposed requirements? I think the last "Note" part is not necessary, if the requirement is made for "Level 3", it gives that meaning anyway. |
Yes, this could be for L3 only, then it could be written as:
|
Currently, we have 51.4.1 as a Level 1 requirement.
The initial proposal was to split it, but the latest proposal is to replace it with one level 3 requirement:
@TobiasAhnoff - do I understand it correctly? ping @randomstuff for opinions and feedback |
Yes! |
Is is updated now via #2135
|
It is suggested to modify 51.3.1 and split in two verifications, one for all levels and one for L3 only, since sender-constrained access tokens are only a requirement in security profiles like FAPI and it is uncommon for L2 application to implement this.
V51.4 Resource Server
Verify that if that if the client sends an sender-constrained access token, using Mutual TLS for OAuth 2 or OAuth 2 DPoP, then the Resource Server must verify accordingly (proof-of-possession). (L1, L2, L3)
Verify that all Resource Servers requests requires sender-constrained access token validation using Mutual TLS for OAuth 2 or OAuth 2 DPoP. (L3)
The text was updated successfully, but these errors were encountered: