-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Query] Best approach to amend authorization_details #100
Comments
Hi, in order to be able to merge and ask the user, the merge must happen during authorization request processing. There is no way in OAuth so far to let client identify the set if pre-existing permissions using a authorization request parameter. The AS may determine the pre-existing set of permissions based on the identifier of the authenticated user and the identifier of the requesting client. There is a proposed extension for explicitely managing grants that is being specified at OpenID Foundation: https://openid.net/specs/oauth-v2-grant-management-ID1.html hope that helps, |
Hi Torsten, Thank you for taking the time to respond and for providing the resources. The RFC 9396 specification states that "merge requested and preexisting authorization details" as a minimum implementation requirement[1]. Let's assume that an authorization server supports concurrent grants[2]. In order to update those grants, does the AS have to support both RFC 9396 and "Grant Management for OAuth 2.0" specifications? Additionally, could you please let us know when the "Grant Management for OAuth 2.0" RFC is expected to be published? [1] https://datatracker.ietf.org/doc/html/rfc9396#name-minimal-implementation-supp Thank you, |
Hi @tlodderstedt / Team, Kind reminder Thanks, |
RFC 9396 does not take a position on how the AS manages grants. |
Hi @tlodderstedt, I apologize if there has been a miscommunication. Thank you, |
sure, you can combine RFC 9396 with grant management. We did the grant management spec to offer deployments a way to support explicit management of grants. |
Grant management was designed to enable fine grained authorisation requirements of open data ecosystems. Our primary use case required to combine it with the use of RAR (RFC9396). This is almost the same use case yours, described above @VimukthiRajapaksha. Grant management is stable implementers draft now and waiting for implementations before moving towards final. |
Hi,
The "Minimal Implementation Support" section[1] requires us to "merge requested and preexisting authorization details". Let's suppose that an authorization code grant flow goes like this:
To complete the step 4, the authorization server needs to send a unique ID in the token response in step 1. The client must then include the same unique ID in the new authorization request mentioned in step 3 to refer the preexisting authorization details. Is this the intended approach, or is there a better way to amend authorization_details?
[1] https://datatracker.ietf.org/doc/html/rfc9396#section-11.2
Thanks,
Vimukthi
The text was updated successfully, but these errors were encountered: