Internet-Draft | JOSE Authentication | August 2020 |
Hardt | Expires 16 February 2021 | [Page] |
TBD¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 16 February 2021.¶
Copyright (c) 2020 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.¶
TBD¶
Terminology¶
This document uses the following terms defined in [GNAP]:¶
Notational Conventions¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this specification are to be interpreted as described in [RFC2119].¶
Certain security-related terms are to be understood in the sense defined in [RFC4949]. These terms include, but are not limited to, "attack", "authentication", "authorization", "certificate", "confidentiality", "credential", "encryption", "identity", "sign", "signature", "trust", "validate", and "verify".¶
Unless otherwise noted, all the protocol parameter names and values are case sensitive.¶
How the GC authenticates to the GS and RS are independent of each other. One mechanism can be used to authenticate to the GS, and a different mechanism to authenticate to the RS.¶
Other documents that specify other GC authentication mechanisms will replace this section.¶
In the JOSE Authentication Mechanism, the GC authenticates by using its private key to sign a JSON document with JWS per [RFC7515] which results in a token using JOSE compact serialization.¶
[Editor: are there advantages to using JSON serialization in the body?]¶
Different instances of a Registered GC MAY have different private keys, but each instance has a certificate to bind its private key to to a public key the GS has for the Client ID. An instance of a GC will use the same private key for all signing operations.¶
The GC and the GS MUST both use HTTP/2 ([RFC7540]) or later, and TLS 1.3 ([RFC8446]) or later, when communicating with each other.¶
[Editor: too aggressive to mandate HTTP/2 and TLS 1.3?]¶
The token may be included in an HTTP header, or as the HTTP message body.¶
The following sections specify how the GC uses JOSE to authenticate to the GS and RS.¶
The GC authenticates to the GS by passing either a signed header parameter, or a signed message body. The following table shows the method, uri and token location for each GC request to the GS:¶
request | http method | uri | token in |
---|---|---|---|
Create Grant | POST | GS URI | body |
Verify Grant | PATCH | Grant URI | body |
Read Grant | GET | Grant URI | header |
Update Grant | PUT | Grant URI | body |
Delete Grant | DELETE | Grant URI | header |
Read AuthZ | GET | AZ URI | header |
Update AuthZ | PUT | AZ URI | body |
Delete AuthZ | DELETE | AZ URI | header |
GS Options | OPTIONS | GS URI | header |
Grant Options | OPTIONS | Grant URI | header |
AuthZ Options | OPTIONS | AZ URI | header |
For requests with the token in the body, the GC uses the Request JSON as the payload in a JWS. The resulting token is sent with the content-type set to "application/jose".¶
A non-normative example (line breaks added to the body for readability):¶
POST /endpoint HTTP/2 Host: as.example Content-Type: application/jose Content-Length: 155 eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyzdWIiOiIxMjM0NTY3ODkwIiwibmF tZSI6IkpvaG4gRG9lIiwiaWF0IjoxNTE2MjM5MDIyfQ.SflKxwRJSMeKKF2QT4fwpMe Jf36POk6yJV_adQssw5c¶
[Editor: make a real example token]¶
GS Verification¶
The GS MUST verify the token by:¶
[Editor: would examples help here so that implementors understand the full range of options, and how an instance can have its own asymetric key pair]¶
A non-normative example of a JOSE header for a Registered Client with a key identifier of "12":¶
{ "alg" : "ES256", "typ" : "JOSE", "kid" : "12" }¶
A non-normative example of a JOSE header for a Dynamic Client:¶
{ "alg" : "ES256", "typ" : "JOSE", "jwk" : { "kty" : "EC", "crv" : "P-256", "x" : "Kgl5DJSgLyV-G32osmLhFKxJ97FoMW0dZVEqDG-Cwo4", "y" : "GsL4mOM4x2e6iON8BHvRDQ6AgXAPnw0m0SfdlREV7i4" } }¶
In the "jose" mechanism Section 2.2.2, all GC requests to the RS include a proof-of-possession token in the HTTP authorization header. In the "jose+body" mechanism Section 2.2.3, the GC signs the JSON document in the request if the POST or PUT methods are used, otherwise it is the same as the "jose" mechanism.¶
The GS provides the GC one or more JWS header parameters and values for a a certificate, or a reference to a certificate or certificate chain, that the RS can use to resolve the public key matching the private key being used by the GC.¶
A non-normative examples JOSE header:¶
{ "alg" : "ES256", "typ" : "JOSE", "x5u" : "https://as.example/cert/example2" }¶
[Editor: this enables Dynamic Clients to make proof-of-possession API calls the same as Registered Clients.]¶
The JWS payload MUST contain the following attributes:¶
iat - the time the token was created as a NumericDate.¶
jti - a unique identifier for the token per [RFC7519] section 4.1.7.¶
uri - the value of the RS URI being called.¶
method - the HTTP method being used in the call¶
token - the access token provided by the GS to the GC¶
The HTTP authorization header is set to the "jose" parameter followed by one or more white space characters, followed by the resulting token.¶
A non-normative example of a JWS payload and the HTTP request follows:¶
{ "iat" : 15790460234, "jti" : "f6d72254-4f23-417f-b55e-14ad323b1dc1", "uri" : "https://calendar.example/calendar", "method" : "GET", "token" : "eyJJ2D6.example.access.token.mZf9pTSpA" } GET /calendar HTTP/2 Host: calendar.example Authorization: jose eyJhbG.example.jose.token.adks¶
[Editor: make a real example token]¶
RS Verification¶
The RS MUST verify the token by:¶
The "jose+body" mechanism can only be used if the content being sent to the RS is a JSON document.¶
Any requests not sending a message body will use the "jose" mechanism Section 2.2.2.¶
Requests sending a message body MUST have the following JWS payload:¶
iat - the time the token was created as a NumericDate.¶
jti - a unique identifier for the token per [RFC7519] section 4.1.7.¶
uri - the value of the RS URI being called.¶
method - the HTTP method being used in the call¶
token - the access token provided by the GS to the GC¶
body - the message body being sent to the RS¶
A non-normative example of a JWS payload and the HTTP request follows:¶
{ "iat" : 15790460234, "jti" : "f6d72254-4f23-417f-b55e-14ad323b1dc1", "uri" : "https://calendar.example/calendar", "method": "POST", "token" : "eyJJ2D6.example.access.token.mZf9pTSpA", "payload" : { "event" : { "title" : "meeting with joe", "start_date_utc" : "2020-02-21 11:00:00", "end_date_utc" : "2020-02-21 11:00:00" } } } POST /calendar HTTP/2 Host: calendar.example Content-Type: application/jose Content-Length: 155 eyJhbGciOi.example.jose+body.adasdQssw5c¶
[Editor: make a real example token]¶
RS Verification¶
The RS MUST verify the token by:¶
The RS has a public key for the GS that it uses to verify the certificate or certificate chain the GC includes in the JWS header.¶
[Editor: to be fleshed out]¶
The GC encrypts a request when ??? using the GS public key returned as the ??? attribute in GS Options.¶
[Editor: to be fleshed out]¶
The GC verifies a signed response ??? using the GS public key returned as the ??? attribute in GS Options.¶
[Editor: to be fleshed out]¶
The GC decrypts a response when ??? using the private key matching the public key included in the request as the ??? attribute in [GNAP] Grant Request JSON.¶
TBD¶