Skip to content

Commit

Permalink
Merge branch 'main' into kburgin3-delegated-key-binding
Browse files Browse the repository at this point in the history
  • Loading branch information
bc-pi authored Jan 31, 2025
2 parents bf4c463 + d91de07 commit 9a901c9
Show file tree
Hide file tree
Showing 4 changed files with 5 additions and 5 deletions.
2 changes: 1 addition & 1 deletion .github/workflows/archive.yml
Original file line number Diff line number Diff line change
Expand Up @@ -37,6 +37,6 @@ jobs:
token: ${{ github.token }}

- name: "Save Archive"
uses: actions/upload-artifact@v3
uses: actions/upload-artifact@v4
with:
path: archive.json
2 changes: 1 addition & 1 deletion .github/workflows/ghpages.yml
Original file line number Diff line number Diff line change
Expand Up @@ -51,7 +51,7 @@ jobs:
token: ${{ github.token }}

- name: "Archive Built Drafts"
uses: actions/upload-artifact@v3
uses: actions/upload-artifact@v4
with:
path: |
draft-*.html
Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/publish.yml
Original file line number Diff line number Diff line change
Expand Up @@ -44,6 +44,6 @@ jobs:
make: upload

- name: "Archive Submitted Drafts"
uses: actions/upload-artifact@v3
uses: actions/upload-artifact@v4
with:
path: "versioned/draft-*-[0-9][0-9].*"
4 changes: 2 additions & 2 deletions draft-ietf-oauth-identity-chaining.md
Original file line number Diff line number Diff line change
Expand Up @@ -51,7 +51,6 @@ normative:

informative:

I-D.ietf-oauth-selective-disclosure-jwt:
I-D.ietf-oauth-security-topics:
I-D.ietf-oauth-resource-metadata:

Expand Down Expand Up @@ -264,7 +263,7 @@ Cache-Control: no-cache, no-store
Authorization servers MAY transcribe claims when either producing JWT authorization grants in the token exchange flow or access tokens in the assertion flow.

* **Transcribing the subject identifier**: Subject identifier can differ between the parties involved. For instance: A user is known at domain A by "[email protected]" but in domain B by "[email protected]". The mapping from one identifier to the other MAY either happen in the token exchange step and the updated identifier is reflected in returned JWT authorization grant or in the assertion step where the updated identifier would be reflected in the access token. To support this both authorization servers MAY add, change or remove claims as described above.
* **Selective disclosure**: Authorization servers MAY remove or hide certain claims due to privacy requirements or reduced trust towards the targeting trust domain. To hide and enclose claims {{I-D.ietf-oauth-selective-disclosure-jwt}} MAY be used.
* **Selective disclosure**: Authorization servers MAY remove or hide certain claims due to privacy requirements or reduced trust towards the targeting trust domain.
* **Controlling scope**: Clients MAY use the scope parameter to control transcribed claims (e.g. downscoping). Authorization Servers SHOULD verify that the requested scopes are not higher privileged than the scopes of the presented subject_token.
* **Including JWT authorization grant claims**: The authorization server performing the assertion flow MAY leverage claims from the presented JWT authorization grant and include them in the returned access token. The populated claims SHOULD be namespaced or validated to prevent the injection of invalid claims.

Expand Down Expand Up @@ -456,6 +455,7 @@ The editors would like to thank Joe Jubinski, Justin Richer, Aaron Parecki, Dean
\[\[ To be removed from the final specification ]]
-latest
* Clarified diagrams and description of authorization server acting as a client.
* Remove references to sd-jwt.

-03

Expand Down

0 comments on commit 9a901c9

Please sign in to comment.