Skip to content

Commit c2baf3f

Browse files
committed
Removed type from authorization scheme
- More OAuth agnostic changes - Removed OPRM references
1 parent d20baa6 commit c2baf3f

File tree

1 file changed

+13
-29
lines changed

1 file changed

+13
-29
lines changed

openid-sharedsignals-framework-1_0.md

Lines changed: 13 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -140,17 +140,7 @@ normative:
140140
date: May 2021
141141
target: https://datatracker.ietf.org/doc/html/draft-ietf-secevent-subject-identifiers
142142
title: Subject Identifiers for Security Event Tokens
143-
OPRM:
144-
author:
145-
- ins: M.B. Jones
146-
name: Michael B. Jones
147-
- ins: P. Hunt
148-
name: Phil Hunt
149-
- ins: A. Parecki
150-
name: Aaron Parecki
151-
date: July 2023
152-
target: https://datatracker.ietf.org/doc/html/draft-jones-oauth-resource-metadata-04#name-protected-resource-metadata
153-
title: OAuth 2.0 Protected Resource Metadata
143+
154144

155145
informative:
156146
CAEP:
@@ -551,7 +541,7 @@ critical_subject_members
551541

552542
authorization_schemes
553543

554-
> OPTIONAL. A multi-valued complex type that specifies supported
544+
> OPTIONAL. A list of complex type that specifies supported
555545
authorization scheme properties defined in {{authorization-scheme}}. To enable seamless discovery of
556546
configurations, the service provider SHOULD, with the appropriate
557547
security considerations, make the authorization_schemes attribute
@@ -562,24 +552,18 @@ TODO: consider adding a IANA Registry for metadata, similar to Section 7.1.1 of
562552
{{RFC8414}}. This would allow other specs to add to the metadata.
563553

564554
### Authorization scheme {#authorization-scheme}
565-
SSF is an HTTP based signals sharing framework. It is agnostic to the authentication and authorization schems used to secure stream configuration APIs. It does not provide any SSF specific authentication and authorization schemes but relies on the cooperating parties mutual security considerations. Authorization scheme section of the metadata, providers disovery informaton related to the transmitter's stream management APIs.
566-
567-
type
568-
569-
> The authorization scheme. This specification defines the values "oauth",
570-
"oauth2", "oauthbearertoken" REQUIRED.
555+
SSF is an HTTP based signals sharing framework. It is agnostic to the authentication and authorization schems used to secure stream configuration APIs. It does not provide any SSF specific authentication and authorization schemes but relies on the cooperating parties mutual security considerations. Authorization scheme section of the metadata, providers disovery informaton related to the transmitter's stream management APIs.
571556

572557
spec_urn
573558

574-
> A URN for a specification for the protocol being used OPTIONAL.
559+
> A URN for a specification for the protocol being used REQUIRED.
560+
575561

562+
The receiver will call the transmitter APIs by providing appropriate credentials as per the `spec_urn`.
576563

577-
The receiver will call the transmitter APIs by providing appropriate credentials as mentioned in the type.
578564

565+
If the `spec_urn` in Authorization scheme is `urn:ietf:rfc6749`
579566

580-
If the Authorization scheme is OAuth2
581-
- The Transmitter SHOULD publish Protected Server Metadata {{OPRM}} to aid the discovery of metadata needed to interact with an OAuth 2.0 protected resource.
582-
- Discovery of the Protected Server Metadata {{OPRM}} is outside the scope of this specification.
583567
- The receiver may obtain an access token using the Client
584568
Credential Grant {{CLIENTCRED}}, or any other method suitable for the Receiver and the
585569
Transmitter.
@@ -681,14 +665,14 @@ Content-Type: application/json
681665
"verification_endpoint":
682666
"https://tr.example.com/ssf/mgmt/verification",
683667
"critical_subject_members": [ "tenant", "user" ],
684-
"authorization_schemes": {
685-
[
668+
"authorization_schemes":[
686669
{
687-
"type": "oauth2",
688670
"spec_urn": "urn:ietf:rfc:6749"
671+
},
672+
{
673+
"spec_urn": "urn:ietf:rfc:8705"
689674
}
690675
]
691-
}
692676
}
693677
~~~
694678
{: #figdiscoveryresponse title="Example: Transmitter Configuration Response"}
@@ -1469,9 +1453,9 @@ Errors are signaled with HTTP status codes as follows:
14691453

14701454
Examples:
14711455

1472-
1. If a Receiver makes a request with an invalid OAuth token, then the
1456+
1. If a Receiver makes a request with an invalid token, then the
14731457
Transmitter MUST respond with a 401 error status.
1474-
2. If the Receiver presents a valid OAuth token, but the Transmitter policy
1458+
2. If the Receiver presents a valid token, but the Transmitter policy
14751459
does not permit the Receiver from obtaining the status, then the Transmitter
14761460
MAY respond with a 403 error status.
14771461
3. If the Receiver requests the status for a stream that does not exist then the

0 commit comments

Comments
 (0)