You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: openid-sharedsignals-framework-1_0.md
+28-42Lines changed: 28 additions & 42 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -604,42 +604,39 @@ critical_subject_members
604
604
605
605
> OPTIONAL. An array of member names in a Complex Subject which, if present in
606
606
a Subject Member in an event, MUST be interpreted by a Receiver.
607
-
608
-
supported_scopes
609
607
610
-
> OPTIONAL. A list of OAuth {{RFC6749}} scope names that the Transmitter supports for specific endpoints. The value of this field is a JSON object that has the endpoint names as keys, and arrays of scope name strings they support as their values. OAuth tokens obtained using any of the scopes defined here MUST be accepted by the specified endpoint. Any key that is not defined as an endpoint in the Transmitter Configuration Metadata MUST be ignored. If the supported_scopes member is present in the metadata and an endpoint is not listed as a key, then that endpoint MUST not require OAuth for authorization.
608
+
authorization_schemes
611
609
612
-
authorization_servers
610
+
> OPTIONAL. An array of JSON objects that specify the supported
611
+
authorization scheme properties defined in {{authorization-scheme}}. To enable seamless discovery of
612
+
configurations, the service provider SHOULD, with the appropriate
613
+
security considerations, make the authorization_schemes attribute
614
+
publicly accessible without prior authentication.
613
615
614
-
> OPTIONAL. An array of supported authorization servers and the scopes they support. Each element of the array is a Authorization Server Descriptor JSON object defined in the section {{authz-server-descriptor}} below. If the `supported_scopes` member is present in the metadata, then the `authorization_servers` MUST also be present, and it MUST provide a server location for every supported scope.
615
616
616
617
TODO: consider adding a IANA Registry for metadata, similar to Section 7.1.1 of
617
618
{{RFC8414}}. This would allow other specs to add to the metadata.
618
619
619
-
### Authorization Server Descriptor {#authz-server-descriptor}
620
-
An Authorization Server Descriptor is a JSON object that has two keys:
621
-
622
-
scopes
620
+
### Authorization scheme {#authorization-scheme}
621
+
SSF is an HTTP based signals sharing framework and is agnostic to the authentication and authorization schemes used to secure stream configuration APIs. It does not provide any SSF-specific authentication and authorization schemes but relies on the cooperating parties' mutual security considerations. The authorization scheme section of the metadata provides discovery information related to the transmitter's stream management APIs.
623
622
624
-
> REQUIRED. An array of scope names supported by the authorization server
623
+
spec_urn
625
624
626
-
servers
625
+
> REQUIRED. A URN that describes the specification of the protocol being used.
627
626
628
-
> REQUIRED. An array of authorization server URLs. This is the URL from which the Authorization Server Metadata MAY be obtained by following the process described in Section 3 of RFC8414 {{RFC8414}}
627
+
The receiver will call the transmitter APIs by providing appropriate credentials as per the `spec_urn`.
629
628
630
-
The following is a non-normative example of an Authorization Server Descriptor
629
+
The following is a non-normative example of the `spec_urn`
631
630
632
631
~~~ json
633
-
{
634
-
"scopes": ["scope1", "scope2"],
635
-
"servers": [
636
-
"https://server1.example/base/url",
637
-
"https://server2.example/base/url",
638
-
"https://server3.example/base/url"
639
-
]
640
-
}
632
+
{
633
+
"spec_urn": "urn:ietf:rfc:6749"
634
+
}
641
635
~~~
642
-
{: #authz-descriptor-example title="Example Authorization Server Descriptor"}
636
+
637
+
In this case, the receiver may obtain an access token using the Client
638
+
Credential Grant {{CLIENTCRED}}, or any other method suitable for the Receiver and the
639
+
Transmitter.
643
640
644
641
## Obtaining Transmitter Configuration Information
0 commit comments