Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

UMA 1.0.1 : use signed JWT RPT #111

Closed
yuriyz opened this issue Dec 17, 2015 · 9 comments
Closed

UMA 1.0.1 : use signed JWT RPT #111

yuriyz opened this issue Dec 17, 2015 · 9 comments
Assignees

Comments

@yuriyz
Copy link
Contributor

yuriyz commented Dec 17, 2015

UMA 1.0.1 : use JWT RPT

@yuriyz
Copy link
Contributor Author

yuriyz commented Dec 17, 2015

publish whether RPT is JWT on /.well-known/uma-configuration

[8:07:04 PM | Edited 8:07:07 PM] Gluu - Michael Schwartz: 'local_token_introspection': 'true'
[8:07:26 PM] Gluu - Michael Schwartz: actually, use JWT for RPT

@nynymike nynymike changed the title UMA 1.0.1 : use JWT for PAT, AAT UMA 1.0.1 : use signed JWT RPT Dec 17, 2015
@yuriyz yuriyz self-assigned this Dec 17, 2015
@yuriyz
Copy link
Contributor Author

yuriyz commented Dec 17, 2015

RPT can be both JWT or access_token. It should be configurable via oxauth configuration.

@yuriyz
Copy link
Contributor Author

yuriyz commented Dec 24, 2015

Support to issue RPT as JWT is added:

  1. RPT manager issue JWT or generated string depending on oxauth configuration
  2. publish rpt_as_jwt=true/false on /.well-known/uma-configuration
  3. corrected oxtrust json schema GluuFederation/oxTrust@9b48205
  4. decision is performed based on oxauth configuration

@yuriyz yuriyz closed this as completed Dec 24, 2015
@nynymike
Copy link
Contributor

How is the RPT signed? Should the RPT signing algorithm also be specified in /.well-known/uma-configuration ?

@yuriyz
Copy link
Contributor Author

yuriyz commented Dec 28, 2015

@nynymike it is signed based on client information for ID Token:
http://openid.net/specs/openid-connect-registration-1_0.html#RegistrationRequest

  • id_token_signed_response_alg
  • id_token_encrypted_response_alg
  • id_token_encrypted_response_enc

I've stick to ID Token signing&encryption info. Do we want to keep that separately for RPT? If yes then we need to add it to dynamic client registration.

  • rpt_signed_response_alg
  • rpt_encrypted_response_alg
  • rpt_encrypted_response_enc

@nynymike
Copy link
Contributor

Let the client register specifying signing for the id_token--we can just re-use for the rpt. But I think we should explicitly list this in uma discovery so its clear.

@yuriyz
Copy link
Contributor Author

yuriyz commented Dec 28, 2015

reopened the issue : we need to add signing&encryption info explicitly to uma discovery.

@yuriyz yuriyz reopened this Dec 28, 2015
@yuriyz
Copy link
Contributor Author

yuriyz commented Dec 28, 2015

We have to publish on uma discovery following:

  • rpt_signing_alg_values_supported
  • rpt_encryption_alg_values_supported
  • rpt_encryption_enc_values_supported

@yuriyz
Copy link
Contributor Author

yuriyz commented Dec 29, 2015

Done in cb5d08e

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants