Skip to content

Commit 4cd21ea

Browse files
committed
Update openid-caep-interoperability-profile-1_0.md
1 parent e620507 commit 4cd21ea

File tree

1 file changed

+18
-2
lines changed

1 file changed

+18
-2
lines changed

openid-caep-interoperability-profile-1_0.md

Lines changed: 18 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -78,6 +78,21 @@ normative:
7878
RFC6750: # The OAuth 2.0 Authorization Framework: Bearer Token Usage
7979
RFC8414: # OAuth 2.0 Authorization Server Metadata
8080
RFC6749:
81+
FAPI:
82+
target: https://openid.bitbucket.io/fapi/fapi-2_0-security-profile.html
83+
title: FAPI 2.0 Security Profile — draft
84+
author:
85+
- ins: D. Fett
86+
- ins: D. Tonge
87+
- ins: J. Heenan
88+
OPRM:
89+
target: https://www.ietf.org/archive/id/draft-ietf-oauth-resource-metadata-03.html
90+
title: OAuth 2.0 Protected Resource Metadata
91+
author:
92+
-ins: M.B. Jones
93+
-ins: P. Hunt
94+
-ins: A. Parecki
95+
8196

8297
--- abstract
8398
This document defines an interoperability profile for implementations of the Shared Signals Framework (SSF) {{SSF}} and the Continuous Access Evaluation Profile (CAEP) {{CAEP}}. This also profiles The OAuth 2.0 Authorization Framework {{RFC6749}} usage in the context of the SSF framework. The interoperability profile is organized around use-cases that improve security of authenticated sessions. It specifies certain optional elements from within the SSF and CAEP specifications as being required to be supported in order to be considered as an interoperable implementation.
@@ -192,12 +207,12 @@ All events MUST be signed using the `RS256` algorithm using a minimum of 2048-bi
192207

193208
### Authorization Server
194209
* MAY distribute discovery metadata (such as the authorization endpoint) via the metadata document as specified in [RFC8414]{{RFC8414}}
195-
* MUST support at least one of the following to obtain a short-lived access token. (Please check out security considerations around access token lifetime https://openid.bitbucket.io/fapi/fapi-2_0-security-profile.html#name-access-token-lifetimes)
210+
* MUST support at least one of the following to obtain a short-lived access token. Please refer Access token lifetimes in the security considerations {{FAPI}} for additional considerations.
196211
** client credential grant flow {{RFC6749}} section 4.4
197212
** authorization code flow {{RFC6749}} section 4.1
198213

199214
### OAuth Scopes
200-
215+
The OAuth scopes required to access the resources MAY be obtained by the client using {{OPRM}} hosted by the Resource Server. In the absence of this mechanism -
201216
* An OAuth {{RFC6749}} authorization that is used to issue tokens to SSF Receivers, MUST reserve the scopes for the SSF endpoints with the prefix of `ssf`
202217
* All the SSF stream configuration management API operations MUST be protected using `ssf.manage` scope
203218
* All the SSF stream configuration Read API operations MUST be protected by `ssf.read` scope
@@ -210,6 +225,7 @@ All events MUST be signed using the `RS256` algorithm using a minimum of 2048-bi
210225
* MUST verify the validity, integrity, expiration and revocation status of access tokens
211226
* MUST verify that the authorization represented by the access token is sufficient for the requested resource access.
212227
* If the access token is not sufficient for the requested action, the Resource server MUST return errors as per section 3.1 of [RFC6750]{{RFC6750}}
228+
* MAY publish the {{OPRM}} to describe the metadata needed to interact with the protected resource.
213229

214230
# Use Cases
215231
Implementations MAY choose to support one or more of the following use-cases in order to be considered interoperable implementations

0 commit comments

Comments
 (0)