Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Generic nonce endpoint #395

Open
OR13 opened this issue Sep 19, 2024 · 2 comments
Open

Generic nonce endpoint #395

OR13 opened this issue Sep 19, 2024 · 2 comments

Comments

@OR13
Copy link

OR13 commented Sep 19, 2024

There was discussion of the nonce endpoint here: https://github.com/openid/OpenID4VCI/pull/381/files#r1752363400

Coauthors and myself worked on a draft presented to IETF OAuth WG on making a generic building block for this:

https://github.com/peppelinux/draft-demarco-oauth-nonce-endpoint

RATs, and protocols not part of OIDCVCI could benefit from an aligned approach.

If there is a chance to pull out enough of this API into a generic document that other systems could build on... that is worth exploring.

@OR13
Copy link
Author

OR13 commented Sep 19, 2024

There is also https://datatracker.ietf.org/doc/draft-ietf-httpbis-unprompted-auth/ which is worth considering.

The Concealed HTTP authentication scheme allows a client to
authenticate to an origin server while guaranteeing freshness and
without the need for the server to transmit a nonce to the client.

@bc-pi
Copy link
Member

bc-pi commented Sep 19, 2024

There is also https://datatracker.ietf.org/doc/draft-ietf-httpbis-unprompted-auth/ which is worth considering.

The Concealed HTTP authentication scheme allows a client to
authenticate to an origin server while guaranteeing freshness and
without the need for the server to transmit a nonce to the client.

A TLS keying material exporter is pretty much just a nonce from a different layer.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants