< draft-ietf-oauth-pop-key-distribution-01.txt   draft-ietf-oauth-pop-key-distribution-02.txt >
Network Working Group J. Bradley Network Working Group J. Bradley
Internet-Draft Ping Identity Internet-Draft Ping Identity
Intended status: Standards Track P. Hunt Intended status: Standards Track P. Hunt
Expires: September 6, 2015 Oracle Corporation Expires: April 21, 2016 Oracle Corporation
M. Jones M. Jones
Microsoft Microsoft
H. Tschofenig H. Tschofenig
ARM Limited ARM Limited
March 5, 2015 October 19, 2015
OAuth 2.0 Proof-of-Possession: Authorization Server to Client Key OAuth 2.0 Proof-of-Possession: Authorization Server to Client Key
Distribution Distribution
draft-ietf-oauth-pop-key-distribution-01.txt draft-ietf-oauth-pop-key-distribution-02.txt
Abstract Abstract
RFC 6750 specified the bearer token concept for securing access to RFC 6750 specified the bearer token concept for securing access to
protected resources. Bearer tokens need to be protected in transit protected resources. Bearer tokens need to be protected in transit
as well as at rest. When a client requests access to a protected as well as at rest. When a client requests access to a protected
resource it hands-over the bearer token to the resource server. resource it hands-over the bearer token to the resource server.
The OAuth 2.0 Proof-of-Possession security concept extends bearer The OAuth 2.0 Proof-of-Possession security concept extends bearer
token security and requires the client to demonstrate possession of a token security and requires the client to demonstrate possession of a
skipping to change at page 1, line 46 skipping to change at page 1, line 46
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet- working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/. Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
This Internet-Draft will expire on September 6, 2015. This Internet-Draft will expire on April 21, 2016.
Copyright Notice Copyright Notice
Copyright (c) 2015 IETF Trust and the persons identified as the Copyright (c) 2015 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
skipping to change at page 2, line 42 skipping to change at page 2, line 42
5.2. Client-to-AS Response . . . . . . . . . . . . . . . . . . 11 5.2. Client-to-AS Response . . . . . . . . . . . . . . . . . . 11
6. Token Types and Algorithms . . . . . . . . . . . . . . . . . 12 6. Token Types and Algorithms . . . . . . . . . . . . . . . . . 12
7. Security Considerations . . . . . . . . . . . . . . . . . . . 13 7. Security Considerations . . . . . . . . . . . . . . . . . . . 13
8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 14 8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 14
9. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 15 9. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 15
10. References . . . . . . . . . . . . . . . . . . . . . . . . . 15 10. References . . . . . . . . . . . . . . . . . . . . . . . . . 15
10.1. Normative References . . . . . . . . . . . . . . . . . . 15 10.1. Normative References . . . . . . . . . . . . . . . . . . 15
10.2. Informative References . . . . . . . . . . . . . . . . . 16 10.2. Informative References . . . . . . . . . . . . . . . . . 16
Appendix A. Augmented Backus-Naur Form (ABNF) Syntax . . . . . . 17 Appendix A. Augmented Backus-Naur Form (ABNF) Syntax . . . . . . 17
A.1. 'aud' Syntax . . . . . . . . . . . . . . . . . . . . . . 17 A.1. 'aud' Syntax . . . . . . . . . . . . . . . . . . . . . . 17
A.2. 'key' Syntax . . . . . . . . . . . . . . . . . . . . . . 17 A.2. 'key' Syntax . . . . . . . . . . . . . . . . . . . . . . 18
A.3. 'alg' Syntax . . . . . . . . . . . . . . . . . . . . . . 17 A.3. 'alg' Syntax . . . . . . . . . . . . . . . . . . . . . . 18
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 18 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 18
1. Introduction 1. Introduction
The work on additional security mechanisms beyond OAuth 2.0 bearer The work on additional security mechanisms beyond OAuth 2.0 bearer
tokens [12] is motivated in [17], which also outlines use cases, tokens [12] is motivated in [17], which also outlines use cases,
requirements and an architecture. This document defines the ability requirements and an architecture. This document defines the ability
for the client indicate support for this functionality and to obtain for the client indicate support for this functionality and to obtain
keying material from the authorization server. As an outcome of the keying material from the authorization server. As an outcome of the
exchange between the client and the authorization server is an access exchange between the client and the authorization server is an access
skipping to change at page 15, line 43 skipping to change at page 15, line 43
9. Acknowledgements 9. Acknowledgements
We would like to thank Chuck Mortimore for his review comments. We would like to thank Chuck Mortimore for his review comments.
10. References 10. References
10.1. Normative References 10.1. Normative References
[1] Bradner, S., "Key words for use in RFCs to Indicate [1] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997. Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/
RFC2119, March 1997,
<http://www.rfc-editor.org/info/rfc2119>.
[2] Hardt, D., "The OAuth 2.0 Authorization Framework", RFC [2] Hardt, D., Ed., "The OAuth 2.0 Authorization Framework",
6749, October 2012. RFC 6749, DOI 10.17487/RFC6749, October 2012,
<http://www.rfc-editor.org/info/rfc6749>.
[3] Berners-Lee, T., Fielding, R., and L. Masinter, "Uniform [3] Berners-Lee, T., Fielding, R., and L. Masinter, "Uniform
Resource Identifier (URI): Generic Syntax", STD 66, RFC Resource Identifier (URI): Generic Syntax", STD 66, RFC
3986, January 2005. 3986, DOI 10.17487/RFC3986, January 2005,
<http://www.rfc-editor.org/info/rfc3986>.
[4] Dierks, T. and E. Rescorla, "The Transport Layer Security [4] Dierks, T. and E. Rescorla, "The Transport Layer Security
(TLS) Protocol Version 1.2", RFC 5246, August 2008. (TLS) Protocol Version 1.2", RFC 5246, DOI 10.17487/
RFC5246, August 2008,
<http://www.rfc-editor.org/info/rfc5246>.
[5] Jones, M., "JSON Web Key (JWK)", draft-ietf-jose-json-web- [5] Jones, M., "JSON Web Key (JWK)", RFC 7517, DOI 10.17487/
key-41 (work in progress), January 2015. RFC7517, May 2015,
<http://www.rfc-editor.org/info/rfc7517>.
[6] Jones, M., Bradley, J., and N. Sakimura, "JSON Web [6] Jones, M., Bradley, J., and N. Sakimura, "JSON Web
Signature (JWS)", draft-ietf-jose-json-web-signature-41 Signature (JWS)", RFC 7515, DOI 10.17487/RFC7515, May
(work in progress), January 2015. 2015, <http://www.rfc-editor.org/info/rfc7515>.
[7] Jones, M., "JSON Web Algorithms (JWA)", draft-ietf-jose- [7] Jones, M., "JSON Web Algorithms (JWA)", RFC 7518, DOI
json-web-algorithms-40 (work in progress), January 2015. 10.17487/RFC7518, May 2015,
<http://www.rfc-editor.org/info/rfc7518>.
[8] Jones, M. and J. Hildebrand, "JSON Web Encryption (JWE)", [8] Jones, M. and J. Hildebrand, "JSON Web Encryption (JWE)",
draft-ietf-jose-json-web-encryption-40 (work in progress), RFC 7516, DOI 10.17487/RFC7516, May 2015,
January 2015. <http://www.rfc-editor.org/info/rfc7516>.
[9] Jones, M., Bradley, J., and N. Sakimura, "JSON Web Token [9] Jones, M., Bradley, J., and N. Sakimura, "JSON Web Token
(JWT)", draft-ietf-oauth-json-web-token-32 (work in (JWT)", RFC 7519, DOI 10.17487/RFC7519, May 2015,
progress), December 2014. <http://www.rfc-editor.org/info/rfc7519>.
[10] Jones, M., Bradley, J., and H. Tschofenig, "Proof-Of- [10] Jones, M., Bradley, J., and H. Tschofenig, "Proof-of-
Possession Semantics for JSON Web Tokens (JWTs)", draft- Possession Key Semantics for JSON Web Tokens (JWTs)",
jones-oauth-proof-of-possession-02 (work in progress), draft-ietf-oauth-proof-of-possession-04 (work in
July 2014. progress), August 2015.
[11] Jones, M., "JSON Web Key (JWK) Thumbprint", draft-jones- [11] Jones, M. and N. Sakimura, "JSON Web Key (JWK)
jose-jwk-thumbprint-01 (work in progress), July 2014. Thumbprint", RFC 7638, DOI 10.17487/RFC7638, September
2015, <http://www.rfc-editor.org/info/rfc7638>.
10.2. Informative References 10.2. Informative References
[12] Jones, M. and D. Hardt, "The OAuth 2.0 Authorization [12] Jones, M. and D. Hardt, "The OAuth 2.0 Authorization
Framework: Bearer Token Usage", RFC 6750, October 2012. Framework: Bearer Token Usage", RFC 6750, DOI 10.17487/
RFC6750, October 2012,
<http://www.rfc-editor.org/info/rfc6750>.
[13] Crocker, D. and P. Overell, "Augmented BNF for Syntax [13] Crocker, D., Ed. and P. Overell, "Augmented BNF for Syntax
Specifications: ABNF", STD 68, RFC 5234, January 2008. Specifications: ABNF", STD 68, RFC 5234, DOI 10.17487/
RFC5234, January 2008,
<http://www.rfc-editor.org/info/rfc5234>.
[14] Campbell, B., Mortimore, C., Jones, M., and Y. Goland, [14] Campbell, B., Mortimore, C., Jones, M., and Y. Goland,
"Assertion Framework for OAuth 2.0 Client Authentication "Assertion Framework for OAuth 2.0 Client Authentication
and Authorization Grants", draft-ietf-oauth-assertions-18 and Authorization Grants", RFC 7521, DOI 10.17487/RFC7521,
(work in progress), October 2014. May 2015, <http://www.rfc-editor.org/info/rfc7521>.
[15] Sakimura, N., Bradley, J., and N. Agarwal, "OAuth [15] Sakimura, N., Ed., Bradley, J., and N. Agarwal, "Proof Key
Symmetric Proof of Posession for Code Extension", draft- for Code Exchange by OAuth Public Clients", RFC 7636, DOI
sakimura-oauth-tcse-03 (work in progress), April 2014. 10.17487/RFC7636, September 2015,
<http://www.rfc-editor.org/info/rfc7636>.
[16] ietf@justin.richer.org, i., Jones, M., Bradley, J., [16] Richer, J., Ed., Jones, M., Bradley, J., Machulak, M., and
Machulak, M., and P. Hunt, "OAuth 2.0 Dynamic Client P. Hunt, "OAuth 2.0 Dynamic Client Registration Protocol",
Registration Protocol", draft-ietf-oauth-dyn-reg-24 (work RFC 7591, DOI 10.17487/RFC7591, July 2015,
in progress), February 2015. <http://www.rfc-editor.org/info/rfc7591>.
[17] Hunt, P., Richer, J., Mills, W., Mishra, P., and H. [17] Hunt, P., Richer, J., Mills, W., Mishra, P., and H.
Tschofenig, "OAuth 2.0 Proof-of-Possession (PoP) Security Tschofenig, "OAuth 2.0 Proof-of-Possession (PoP) Security
Architecture", draft-hunt-oauth-pop-architecture-02 (work Architecture", draft-ietf-oauth-pop-architecture-03 (work
in progress), June 2014. in progress), September 2015.
[18] Richer, J., "OAuth Token Introspection", draft-richer- [18] Richer, J., "OAuth 2.0 Token Introspection", draft-ietf-
oauth-introspection-06 (work in progress), July 2014. oauth-introspection-11 (work in progress), July 2015.
[19] Richer, J., Bradley, J., and H. Tschofenig, "A Method for [19] Richer, J., Bradley, J., and H. Tschofenig, "A Method for
Signing an HTTP Requests for OAuth", draft-richer-oauth- Signing an HTTP Requests for OAuth", draft-ietf-oauth-
signed-http-request-01 (work in progress), April 2014. signed-http-request-01 (work in progress), March 2015.
Appendix A. Augmented Backus-Naur Form (ABNF) Syntax Appendix A. Augmented Backus-Naur Form (ABNF) Syntax
This section provides Augmented Backus-Naur Form (ABNF) syntax This section provides Augmented Backus-Naur Form (ABNF) syntax
descriptions for the elements defined in this specification using the descriptions for the elements defined in this specification using the
notation of [13]. notation of [13].
A.1. 'aud' Syntax A.1. 'aud' Syntax
The ABNF syntax is defined as follows where by the "URI-reference" The ABNF syntax is defined as follows where by the "URI-reference"
 End of changes. 24 change blocks. 
45 lines changed or deleted 59 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/