Skip to content

Commit 12d5819

Browse files
committed
artefact binding
1 parent 6228a82 commit 12d5819

File tree

1 file changed

+12
-0
lines changed

1 file changed

+12
-0
lines changed

draft-ietf-oauth-attestation-based-client-auth.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -69,6 +69,9 @@ informative:
6969
ARF:
7070
title: "The European Digital Identity Wallet Architecture and Reference Framework"
7171
SD-JWT: I-D.ietf-oauth-selective-disclosure-jwt
72+
CIBA:
73+
title: OpenID Connect Client-Initiated Backchannel Authentication Flow - Core 1.0
74+
target: https://openid.net/specs/openid-client-initiated-backchannel-authentication-core-1_0.html
7275

7376

7477
--- abstract
@@ -533,6 +536,15 @@ Implementers should be aware that the design of this authentication mechanism de
533536

534537
Authorization servers issuing a refresh token in response to a token request using the client attestation mechanism as defined by this draft MUST bind the refresh token to the Client Instance and its associated public key, and NOT just the client as specified in section 6 {{RFC6749}}. To prove this binding, the Client Instance MUST use the client attestation mechanism when refreshing an access token. The client MUST also use the same key that was present in the "cnf" claim of the client attestation that was used when the refresh token was issued.
535538

539+
## Binding of OAuth protocol artefacts
540+
541+
Authorization servers where possible are RECOMMENDED to bind relevant protocol artefacts to the Client Instance and its associated public key, and NOT just the client as specified in section 6 {{RFC6749}}. Examples of these artefacts include but are not limited to:
542+
543+
- The authorization_code as specified in section 4.1 {{RFC6749}}.
544+
- The auth_req_id as specified in section 7.3 {{CIBA}}.
545+
546+
How this binding is established and then proven is specific to the protocol artifact. For example establishing binding to an authorization_code involves the client instance using client attestation in the authorization request, and proving binding of the authorization_code to the Client Instance involves using the client attestation mechanism to authenticate at the token endpoint using an authorization code grant.
547+
536548
## Web Server Default Maximum HTTP Header Sizes
537549

538550
Because the Client Attestation and Client Attestation PoP are communicated using HTTP headers, implementers should consider that web servers may have a default maximum HTTP header size configured which could be too low to allow conveying a Client Attestation and or Client Attestation PoP in an HTTP request. It should be noted, that this limit is not given by the HTTP {{RFC9112}}, but instead web server implementations commonly set a default maximum size for HTTP headers. As of 2024, typical limits for modern web servers configure maximum HTTP headers as 8 kB or more as a default.

0 commit comments

Comments
 (0)