Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Token Introspection #24

Closed
jricher opened this issue Nov 13, 2020 · 3 comments · Fixed by #34
Closed

Token Introspection #24

jricher opened this issue Nov 13, 2020 · 3 comments · Fixed by #34

Comments

@jricher
Copy link
Collaborator

jricher commented Nov 13, 2020

§10.1 Introspecting a Token: Editor's note:

This isn't super different from the token management URIs, but the RS has no way to get that URI, and it's bound to the RS's keys instead of the RC's or token's keys.

@Denisthemalice
Copy link

From a privacy point of view, token introspection allows an AS to know exactly when operation(s) are being performed by an end-user on a RS. This provides useful information for ASs that may be tempted to act as "Big Brother".

For that reason, the risks related to token introspection should be advertised in the Privacy Considerations section.

Its usage should be deprecated in the general case. If there exists specific cases where there is no such a risk, these cases should be advertised.

@adeinega
Copy link
Contributor

The section doesn't provide any information on what happens when a client wants to introspect an inactive/invalid/revoked token.

@jricher
Copy link
Collaborator Author

jricher commented Mar 27, 2021

Yes, this is pretty thin right now. It's the RS that introspects the token, and this section will be pulled out into a separate spec to make that more clear (#114). The response for both positive and negative situations is likely to be based on the OAuth introspection spec, RFC7662 https://tools.ietf.org/html/rfc7662

@aaronpk aaronpk transferred this issue from ietf-wg-gnap/gnap-core-protocol May 12, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

3 participants