Internet-Draft | Tx-Tokens | July 2023 |
Tulshibagwale, et al. | Expires 8 January 2024 | [Page] |
Transaction Tokens (Tx-Tokens) enable workloads in a trusted domain to ensure that user identity and authorization context of an external programmatic request, such as an API invocation, is preserved and available to all workloads that are invoked as part of processing such a request. Tx-Tokens also enable workloads within the trusted domain to optionally immutably assert to downstream workloads that they were invoked in the call chain of the request.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 8 January 2024.¶
Copyright (c) 2023 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.¶
Modern computing architectures often use multiple independently running components called workloads. In many cases, external invocations through externally visible interfaces such as APIs result in a number of internal workloads being invoked in order to process the external invocation. These workloads often run in virtually or physically isolated networks. These networks and the workloads running within their perimeter may be compromised by attackers through software supply chain, privileged user compromise or other attacks. Workloads compromised through external attacks, malicious insiders or software errors can cause any or all of the following unauthorized actions:¶
The results of these actions are unauthorised access to resources.¶
Transaction Tokens (Tx-Token) are a means to mitigate damage from such attacks or spurious invocations. A valid Tx-Token indicates a valid external invocation. They ensure that the identity of the user or a workload that made the external request is preserved throughout subsequent workload invocations. They preserve any context such as:¶
Cryptographically protected Tx-Token ensure that downstream workloads cannot make unauthorized modifications to such information, and cannot make spurious calls without the presence of an external trigger.¶
Tx-Tokens are short-lived, signed JWTs [RFC7519] that assert the identity of a user or a workload and assert an authorization context. The authorization context provides information expected to remain constant during the execution of a call as it passes through multiple workloads.¶
When necessary, a Tx-Token may include embedded tokens, as described in [JWTEmbeddedTokens]. This is called Nested Tx-Token. This nesting enables workloads in a call chain to assert their invocation during the call chain to downstream workloads.¶
Tx-Tokens are typically created when a workload is invoked using an endpoint that is externally visible, and is authorized using a separate mechanism, such as an OAuth [RFC6749] token or an OpenID Connect [OpenIdConnect] token. We call this token "Leaf Tx-Token". This workload then performs an OAuth 2.0 Token Exchange [RFC8693] to obtain a Tx-Token. To do this, it invokes a special Token Service (the Tx-Token Service) and provides context that is sufficient for it to generate a Tx-Token. This context MAY include:¶
The Tx-Token Service responds to a successful invocation by generating a Tx-Token. The calling workload then uses the Tx-Token to authorize its calls to subsequent workloads. Subsequent workloads may obtain Tx-Tokens of their own.¶
A workload within the call chain of such an external call MAY generate a new Nested Tx-Token. To generate the Nested Tx-Token, it creates a self-signed JWT Embedded Token [JWTEmbeddedTokens] that includes the received Tx-Token by value. Subsequent workloads can therefore know that the signing workload was in the path of the call chain.¶
Tx-Tokens are expected to be short-lived (order of minutes, e.g. 5 minutes), and as a result MAY be used only for the expected duration of an external invocation. If a long-running process such as an batch or offline task is involved, it can use a separate mechanism to perform the external invocation, but the resulting Tx-Token SHALL still be short-lived.¶
Tx-Tokens help prevent spurious invocations by ensuring that a workload receiving an invocation can independently verify the user or workload on whose behalf an external call was made and any context relevant to the processing of the call. Through the presence of additional signatures on the Tx-Token, a workload receiving an invocation can also independently verify that specific workloads were within the path of the call before it was invoked.¶
Figure 1 shows how Tx-Tokens are used in an a multi-workload environment.¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.¶
An independent computational unit that can autonomously receive and process invocations, and can generate invocations of other workloads. Examples of workloads include containerized microservices, monolithic services and infrastructure services such as managed databases.¶
A virtually or physically separated network, which contains two or more workloads. The workloads within an Trust Domain may be invoked only through published interfaces. A Trust Domain must have a name that is used as the aud
(audience) value in Tx-Tokens.¶
A published interface to an Trust Domain that results in the invocation of a workload within the Trust Domain.¶
A sequence of invocations that results from the invocation of an external endpoint.¶
A signed JWT that has a short lifetime, which provides immutable information about the user or workload, certain parameters of the call and certain contextual attributes of the call. A Tx-Token may contain a nested Tx-Token.¶
A Tx-Token that does not contain a tx_token
claim in its JWT body.¶
A JWT Embedded Token [JWTEmbeddedTokens] that embeds a Tx-Token by value.¶
A JSON object containing a set of claims that represent the immutable context of a call chain.¶
A special service within the Trust Domain, which issues Tx-Tokens to requesting workloads.¶
A Tx-Token is a JSON Web Token [RFC7519] protected by a JSON Web Signature [RFC7515]. The following is true in a Tx-Token:¶
In the JWT Header:¶
typ
claim MUST be present and MUST have the value tx_token
.¶
kid
claim.¶
Figure 2 is a non-normative example of the JWT Header of a Tx-Token¶
The JWT body MUST have the following claims regardless of whether the Tx-Token is a Leaf Tx-Token or a Nested Tx-Token:¶
iss
claim, whose value is a URN [RFC8141] that uniquely identifies the workload or the Tx-Token Service that created the Tx-Token.¶
iat
claim, whose value is the time at which the Tx-Token was created.¶
exp
claim, whose value is the time at which the Tx-Token expires. Note that if this claim is in a Nested Tx-Token, then this exp
value MUST NOT exceed the exp
value of the Tx-Token included in the JWT Body.¶
The following claims MUST be present in the JWT body of a Leaf Tx-Token:¶
tid
claim, whose value is the unique identifier of entire call chain.¶
sub_id
claim, whose value is the unique identifier of the user or workload on whose behalf the call chain is being executed. The format of this claim MAY be a Subject Identifier as specified in [SubjectIdentifiers].¶
azc
claim, whose value is a JSON object that contains values that remain constant in the call chain.¶
Figure 3 shows a non-normative example of the JWT body of a Leaf Tx-Token:¶
A Nested Tx-Token is a JWT Embedded Token [JWTEmbeddedTokens], which embeds a Tx-Token by value. The following claims MUST be present in a Nested Tx-Token:¶
type
claim, whose value is urn:ietf:params:oauth:token-type:tx_token
.¶
token
claim, whose value is an encoded JWT representation of a Tx-Token.¶
Figure 4 shows a non-normative example the JWT body of a nested Tx-Token¶
A workload requests a Tx-Token from a Transaction Token Service using OAuth 2.0 Token Exchange [RFC8693]. The request to obtain a Tx-Token using this method is called a Tx-Token Request, and a success response is called a Tx-Token Response. A Tx-Token Request is a Token Exchange Request, as described in Section 2.1 of [RFC8693] with additional parameters. A Tx-Token Response is a OAuth 2.0 token endpoint response, as described in Section 5 of [RFC6749], where the token_type
in the response has the value tx_token
.¶
The Transaction Token Service acts as an OAuth 2.0 [RFC6749] Authorization Server. The requesting workload acts as the OAuth 2.0 Client, which authenticates itself to the Transaction Token Service through mechanisms defined in OAuth 2.0.¶
A Tx-Token Request is an OAuth 2.0 Token Exchange Request, as described in Section 2.1 of [RFC8693], with an additional parameter in the request. The following is true of the Tx-Token Request:¶
audience
value MUST be set to the Trust Domain name.¶
requested_token_type
value MUST be urn:ietf:params:oauth:token-type:tx_token
.¶
subject_token
value MUST be the external token received by the workload that authorized the call.¶
subject_token_type
value MUST be present and indicate the type of the authorization token present in the subject_token
parameter.¶
The following additional parameter MUST be present in a Tx-Token Request:¶
azc
, whose value is a JSON object. This object contains any information the Transaction Token Service needs to understand the context of the incoming request.¶
Figure 5 shows a non-normative example of a Tx-Token Request.¶
A successful response to a Tx-Token Request by a Transaction Token Service is called a Tx-Token Response. If the Transaction Token Service responds with an error, the error response is as described in Section 5.2 of [RFC6749]. The following is true of a Tx-Token Response:¶
token_type
value MUST be set to tx_token
.¶
access_token
value MUST be the Tx-Token.¶
expires_in
, refresh_token
and scope
.¶
Figure 6 shows a non-normative example of a Tx-Token Response.¶
A workload within a call chain MAY create a Nested Tx-Token. It does so by embedding the Tx-Token it receives by value in a JWT Embedded Token [JWTEmbeddedTokens]. Nested Tx-Tokens are self-signed and not requested from a separate service.¶
The expiration time of a enclosing Tx-Token MUST NOT exceed the expiration time of an embedded Tx-Token.¶
This memo includes no request to IANA.¶
A Transaction Token Service MUST ensure that it authenticates any workloads requesting Tx-Tokens. In order to do so:¶
The requesting workload MUST have a pre-configured location for the Transaction Token Service. It SHOULD rely on mechanisms, such as [Spiffe], to securely authenticate the Transaction Token Service before making a Tx-Token Request.¶
Although Tx-Tokens are short-lived, they may be sender constrained as an additional layer of defence to prevent them from being re-used by a compromised or malicious workload under the control of a hostile actor.¶
When creating Tx-Tokens, the Tx-Token MUST NOT contain the Access Token presented to the resource server. If an Access Token is included in a Tx-Token, an attacker may obtain a Tx-Token, extract the Access Token, and replay it to the Resource Server. Tx-Token expiry does not protect against this attack since the Access Token may remain valid even after the Tx-Token has expired.¶