Skip to content

Commit b585ac8

Browse files
committed
Added references to protected resource metadata
Added references to protected resource metadata
1 parent dc8c67a commit b585ac8

File tree

1 file changed

+42
-10
lines changed

1 file changed

+42
-10
lines changed

openid-sharedsignals-framework-1_0.md

Lines changed: 42 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -140,6 +140,17 @@ normative:
140140
date: May 2021
141141
target: https://datatracker.ietf.org/doc/html/draft-ietf-secevent-subject-identifiers
142142
title: Subject Identifiers for Security Event Tokens
143+
PROTECTEDSERVERMETADATA:
144+
author:
145+
- ins: M.B. Jones
146+
name: Michael B. Jones
147+
- ins: P. Hunt
148+
name: Phil Hunt
149+
- ins: A. Parecki
150+
name: Aaron Parecki
151+
date: July 2023
152+
target: https://datatracker.ietf.org/doc/html/draft-jones-oauth-resource-metadata-04#name-protected-resource-metadata
153+
title: OAuth 2.0 Protected Resource Metadata
143154

144155
informative:
145156
CAEP:
@@ -538,9 +549,36 @@ critical_subject_members
538549
> OPTIONAL. An array of member names in a Complex Subject which, if present in
539550
a Subject Member in an event, MUST be interpreted by a Receiver.
540551

552+
authorizationSchemes
553+
554+
> OPTIONAL. A multi-valued complex type that specifies supported
555+
authorization scheme properties defined in {{authorization-scheme}}. To enable seamless discovery of
556+
configurations, the service provider SHOULD, with the appropriate
557+
security considerations, make the authorizationSchemes attribute
558+
publicly accessible without prior authentication.
559+
560+
541561
TODO: consider adding a IANA Registry for metadata, similar to Section 7.1.1 of
542562
{{RFC8414}}. This would allow other specs to add to the metadata.
543563

564+
### Authorization scheme {#authorization-scheme}
565+
Authorization scheme used by the receiver to authorize with the Transmitter's management API for SET event stream.
566+
567+
type
568+
569+
> The authorization scheme. This specification defines the values "oauth", "oauth2",
570+
"oauthbearertoken" REQUIRED.
571+
572+
The receiver will call the transmitter APIs by providing appropriate credentials as mentioned in the type.
573+
574+
575+
If the Authorization scheme is OAuth2
576+
- The Transmitter SHOULD publish Protected Server Metadata {{PROTECTEDSERVERMETADATA}} to aid the discovery of metadata needed to interact with an OAuth 2.0 protected resource.
577+
- Discovery of the Protected Server Metadata {{PROTECTEDSERVERMETADATA}} is outside the scope of this specification.
578+
- The receiver may obtain an access token using the Client
579+
Credential Grant {{CLIENTCRED}}, or any other method suitable for the Receiver and the
580+
Transmitter.
581+
544582
## Obtaining Transmitter Configuration Information
545583

546584
Using the Issuer as documented by the Transmitter, the Transmitter Configuration
@@ -637,8 +675,10 @@ Content-Type: application/json
637675
"https://tr.example.com/ssf/mgmt/subject:remove",
638676
"verification_endpoint":
639677
"https://tr.example.com/ssf/mgmt/verification",
640-
"critical_subject_members": [ "tenant", "user" ]
641-
]
678+
"critical_subject_members": [ "tenant", "user" ],
679+
"authenticationSchemes": {
680+
"type": "oauth2"
681+
}
642682
}
643683
~~~
644684
{: #figdiscoveryresponse title="Example: Transmitter Configuration Response"}
@@ -1834,14 +1874,6 @@ subject
18341874
~~~
18351875
{: title="Example: Stream Updated SET with stream as the subject of single-stream Transmitter" #figstreamupdatedstreamset}
18361876

1837-
# Authorization {#management-api-auth}
1838-
HTTP API calls from a Receiver to a Transmitter SHOULD be authorized by
1839-
providing an OAuth 2.0 Access Token as defined by {{RFC6750}}.
1840-
1841-
The receiver may obtain an access token using the Client
1842-
Credential Grant {{CLIENTCRED}}, or any other method suitable for the Receiver and the
1843-
Transmitter.
1844-
18451877
# Security Considerations {#management-sec}
18461878

18471879
## Subject Probing {#management-sec-subject-probing}

0 commit comments

Comments
 (0)