-
Notifications
You must be signed in to change notification settings - Fork 9.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Representation of Client-Initiated Backchannel Authentication (CIBA) in 3.2.0 #4106
Comments
Paging @shilpa-padgaonkar |
Just thinking about this a bit more. We could have an object as follows: HsbcCibaProfile:
type: openIdConnect
openIdConnectUrl: https://sandbox.ob.hsbcnet.com/.well-known/openid-configuration
profile: CIBA Where CIBA is an instruction set that defines what CIBA "means" for a user and how to process the information in the well-known endpoint. Similarly: HsbcFapi2Profile:
type: openIdConnect
openIdConnectUrl: https://sandbox.ob.hsbcnet.com/.well-known/openid-configuration
profile: "FAPI2.0" If I was going to get really creative I'd probably have a bunch of JSON Paths available that could be used to select from the discovery document, and where identified by the {
"FAPI2.0": {
"grantTypes": "$.response_types_supported[?(@ == 'code')]"
}
} And only if all of those were not null could the profile be resolved. Probably stepping into implementation territory here, but the "processing rules" approach is way we could bridge the gap between what OpenAPI does and what OpenID Connect does and how we can source information from the correct place. |
@SensibleWood there is this #3615 that is cooking it is merged but branch 3.2 is not public yet What would be your feedback about it ? |
@LasneF well basically everything I said the 1st comment - in summary, CIBA is an OpenID Connect profile and mixing this into OAuth 2.0 provides no separation-of-concerns between the two. The words there reflects my understanding of the changes you've highlighted in that #3615. All subsequent comments reflect my concerns |
@SensibleWood as I've worked on diagraming the OAS (including everything that's already included in or plausibly proposed for 3.2), I've noticed that the new CIBA fields add a lot to the OpenAPI Flow Object. This is the part of the OAS (and APIs) that I understand the least, but from what I do understand, I like the direction. |
@handrews and therein lies the issue. They do add more information, but it is not necessarily the right way to convey the information and is only a subset of the possible information on offer. @handrews @LasneF @shilpa-padgaonkar I just want to make my thoughts on the approach to OpenID Connect profiles absolutely clear. I feel like a worked example is in order to make my point. The sample OpenID Connect Discovery URL above points to this data: {
"version": 1.0,
"issuer": "https://secure.sandbox.ob.hsbcnet.com",
"authorization_endpoint": "https://sandbox.ob.hsbcnet.com/obie/open-banking/v1.1/oauth2/authorize",
"registration_endpoint": "https://secure.sandbox.ob.hsbcnet.com/obie/open-banking/v3.2/oauth2/register",
"token_endpoint": "https://secure.sandbox.ob.hsbcnet.com/obie/open-banking/v1.1/oauth2/token",
"jwks_uri": "https://sandbox.ob.hsbcnet.com/jwks/public.jwks",
"scopes_supported": ["accounts", "payments", "openid", "fundsconfirmations"],
"claims_supported": [
"sub",
"iss",
"auth_time",
"acr",
"openbanking_intent_id"
],
"response_types_supported": ["code id_token"],
"grant_types_supported": [
"authorization_code",
"client_credentials",
"refresh_token"
],
"subject_types_supported": ["pairwise"],
"id_token_signing_alg_values_supported": ["PS256"],
"request_object_signing_alg_values_supported": ["PS256"],
"token_endpoint_auth_methods_supported": [
"private_key_jwt",
"tls_client_auth"
],
"claims_parameter_supported": true,
"request_parameter_supported": true,
"request_uri_parameter_supported": false,
"token_endpoint_auth_signing_alg_values_supported": ["PS256"],
"acr_values_supported": ["urn:openbanking:psd2:sca"],
"tls_client_certificate_bound_access_tokens": true
} This OpenID provider in question does not implement a CIBA configuration, but a lot of information here relevant to a CIBA client beside what is offered in the revised OAuth Flow object. I'll point to a few (note everywhere I say Client I mean OAuth/OpenID Connect client):
My point is this: By adding OpenID Connect information into OAuth Flow object directly we only scratch the surface on what the Client needs to know in order to understand the OpenID Connect Profile. If we are going to implement CIBA or any other profile directly in the OpenAPI Specification we need to think much more widely about what information the API consumer needs to know to create their implementation, and how a tooling maker can use information effectively. Taking a tooling maker as an example, they would absolutely need to know the information highlighted in the bullets above in order to create a client that could successfully invoke any CIBA implementation currently available across open banking and open finance ecosystems. There is another important factor here. By furthering this mechanism, where security configuration is represented from within a given OpenAPI description, we make our API descriptions more brittle and more likely to change. Every time OpenID Discovery data changes, the OpenAPI description changes. By having a mechanism where we reference the metadata and provide API consumers a view of how to process that data we make the coupling of OpenID Discovery and the OpenAPI Specification infinitely more flexible and have a means to continually evolve our support for OpenID Connect in all its flavours. There is therefore the potential to a disservice to both the security management lifecycle and API management lifecycle in embedded OpenID Discovery data directly in the OpenAPI Specification. To 100% clear: My proposal is support CIBA and as many OpenID profiles as we possibly can using the same, holistic mechanism that acts as a bridge between OpenID Discovery and the OpenAPI Specification with the information in the right place, consumed at the right time, with the right tools. I just don't think that embedding it directly in the OpenAPI Specification is the right approach. For me a pointer to the data and the concept of "processing rules" provides that flexibility. |
Ah, yes, my apologies, that was meant to read "add a lot of fields" with the implication being that it has ended up rather imbalanced. I very much agree with you here.
1000000% yes to this! And everything you said that follows from it. |
I was thinking about what I said earlier in this thread about a "rules" based approach, but am a bit stumped on what the right "rules" approach should be. As an idea I created three rules for CIBA using a custom description syntax, mixing JSON and JSON Path expressions. The idea is predicated on selecting the right properties from the OpenID Discovery data to drive a CIBA Client. If one JSON Path fails to return data the validation fails, and the Client cannot therefore attempt to represent the CIBA Interface to e.g. some trying to test an API call from inside an API client. So based on this discovery data at the OpenID Provider: {
"grant_types": ["urn:openid:params:grant-type:ciba"],
"backchannel_token_delivery_modes_supported": ["ping", "poll"],
"backchannel_authentication_endpoint": "https://auth.openapis.org"
} I used the following JSON Paths to "discover" the data: {
"profileName": "CIBA",
"rules": [
{
"property": "grantType",
"jsonPath": "$.grant_types[?match(@, 'urn:openid:params:grant-type:ciba')]"
},
{
"property": "deliveryMode",
"jsonPath": "$.[?(@property == 'backchannel_token_delivery_modes_supported')]"
},
{
"property": "authEndpoint",
"jsonPath": "$.[?(@property == 'backchannel_authentication_endpoint')]"
}
]
} (Note some JSON Path syntax is as per RFC9535) If any of the JSON Path expressions return no results, the profile cannot be retrieved and the Client cannot be initialised. This approach isn't quite the solution (I think). It feels a bit fussy, and not quite what's required to provide a view onto OpenID Discovery data that be used alongside OpenAPI. It is, however, the kind of approach we should be considering to provide the kind of loose-coupling I'm talking about above. JSON Path also features in Overlay and Arazzo, so not completely outside the vernacular of OpenAPI Initiative specifications. |
I'd like to raise a concern with including CIBA in the OAuth Flow Object in 3.2.0.
I understand that CIBA can, feasibly, be implemented using bare OAuth 2.0 but realistically it's an OpenID Connect profile. A user is correlated by the Authorization Server using
login_hint
,id_token_hint
, etc - these are OpenID Connect features.I think there needs to be a separation-of-concerns between OAuth 2.0 and OpenID Connect in OpenAPI. The semantics of OpenID Connect provides proofs-of-authentication, with support for request objects, ID tokens, et al. OpenID Connect obviously builds on top of OAuth, but if we go down the road of starting to bundle OpenID Connect profiles into the OAuth Flow it has the potential to get pretty messy .
I propose an alternative approach:
openIdConnect
property. Implement with a description of how to process that metadata for various profiles such as:I think that if we did it this way we can avoid duplicating OpenID Connect Discovery metadata in OpenAPI, and instead allow that to live where it needs to i.e. in the discovery endpoint. Implementing OpenID Discovery is a common practice, so I think we are in a good place to leverage an existing, external metadata source.
The descriptions - and maybe a nice JSON Schema as an addendum that we provide to be helpful - will then help tooling makers make sense of the discovery metadata from the lens of OpenAPI.
Happy to get involved if this approach is perceived as a good idea. I know OpenID in enough to detail to be vaguely useful.
The text was updated successfully, but these errors were encountered: