-
Notifications
You must be signed in to change notification settings - Fork 37
Description
Imported from AB/Connect bitbucket: https://bitbucket.org/openid/connect/issues/1951
Original Reporter: pedro-felix
In the context of the OpenID4VP draft 18, I’ve have some questions regarding the direct_post response mode, responding with a redirect_uri, and protection against session fixation.
-
The use of a payload containing a
redirect_uriwhen responding to the POST with the Authorization Response, namely the algorithm described in https://openid.net/specs/openid-4-verifiable-presentations-1_0.html#section-10.5, is only effective when on a same-device scenario, right? If so, the spec should make that information more clearer.
Even on a same-device scenario, the algorithm on section 10.5 only works if the wallet opens the same user-agent/browser as the one used initially by the user to interact with the verifier, right? If so, that can be an issue when the user has multiple browsers installed. -
How can the
redirect_urialso be usable on cross-device scenarios to protect against session fixation?- Have the UI shown by the resource at the
redirect_uripresent a code that needs to be presented directly at the verifier (on the initial session between the user and the verifier)? - Are there any more guidelines on how to protect this flow?
- Have the UI shown by the resource at the