Skip to content

direct_post response mode, response with a redirect_uri, and protection against session fixation #25

@OIDF-automation

Description

@OIDF-automation

Imported from AB/Connect bitbucket: https://bitbucket.org/openid/connect/issues/1951

Original Reporter: pedro-felix

In the context of the OpenID4VP draft 18, I’ve have some questions regarding the direct_post response mode, responding with a redirect_uri, and protection against session fixation.

  1. The use of a payload containing a redirect_uri when responding to the POST with the Authorization Response, namely the algorithm described in https://openid.net/specs/openid-4-verifiable-presentations-1_0.html#section-10.5, is only effective when on a same-device scenario, right? If so, the spec should make that information more clearer.
    Even on a same-device scenario, the algorithm on section 10.5 only works if the wallet opens the same user-agent/browser as the one used initially by the user to interact with the verifier, right? If so, that can be an issue when the user has multiple browsers installed.

  2. How can the redirect_uri also be usable on cross-device scenarios to protect against session fixation?

    1. Have the UI shown by the resource at the redirect_uri present a code that needs to be presented directly at the verifier (on the initial session between the user and the verifier)?
    2. Are there any more guidelines on how to protect this flow?

Metadata

Metadata

Assignees

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions