Skip to content

Commit e620507

Browse files
committed
Update openid-caep-interoperability-profile-1_0.md
1 parent c4f0f85 commit e620507

File tree

1 file changed

+8
-7
lines changed

1 file changed

+8
-7
lines changed

openid-caep-interoperability-profile-1_0.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ normative:
8080
RFC6749:
8181

8282
--- abstract
83-
This document defines an interoperability profile for implementations of the Shared Signals Framework (SSF) {{SSF}}, the Continuous Access Evaluation Profile (CAEP) {{CAEP}}. This also profiles The OAuth 2.0 Authorization Framework {{RFC6749}} usage in the context of the SSF framework. The interoperability profile is organized around use-cases that improve security of authenticated sessions. It specifies certain optional elements from within the SSF and CAEP specifications as being required to be supported in order to be considered as an interoperable implementation.
83+
This document defines an interoperability profile for implementations of the Shared Signals Framework (SSF) {{SSF}} and the Continuous Access Evaluation Profile (CAEP) {{CAEP}}. This also profiles The OAuth 2.0 Authorization Framework {{RFC6749}} usage in the context of the SSF framework. The interoperability profile is organized around use-cases that improve security of authenticated sessions. It specifies certain optional elements from within the SSF and CAEP specifications as being required to be supported in order to be considered as an interoperable implementation.
8484

8585
Interoperability between SSF and CAEP, leveraging OAuth {{RFC6749}} provides greater assurance to implementers that their implementations will work out of the box with others.
8686

@@ -99,12 +99,12 @@ Credential Change
9999
The following requirements are common across all use-cases defined in this document.
100100

101101
## Network layer protection
102-
* The SSF transmitter MUST offer TLS protected endpoints and shall establish connections to other servers using TLS. TLS connections MUST be set up to use TLS version 1.2 or later.
102+
* The SSF transmitter MUST offer TLS protected endpoints and MUST establish connections to other servers using TLS. TLS connections MUST be set up to use TLS version 1.2 or later.
103103
* When using TLS 1.2, follow the recommendations for Secure Use of Transport Layer Security in [RFC7525]{{RFC7525}}.
104104
* The SSF receiver MUST perform a TLS server certificate signature checks, chain of trust validations, expiry and revocation status checks before calling the SSF transmitter APIs, as per [RFC6125]{{RFC6125}}.
105105

106106
## CAEP specification version
107-
This specification supports CAEP {{CAEP}} events from Implementer's Draft 1
107+
This specification supports CAEP {{CAEP}} events from Implementer's Draft 2
108108

109109
## Transmitters {#common-transmitters}
110110
Transmitters MUST implement the following features:
@@ -192,9 +192,9 @@ All events MUST be signed using the `RS256` algorithm using a minimum of 2048-bi
192192

193193
### Authorization Server
194194
* MAY distribute discovery metadata (such as the authorization endpoint) via the metadata document as specified in [RFC8414]{{RFC8414}}
195-
* MUST support at least one of the following to obtain a short-lived access token
196-
** client credential grant flow
197-
** authorization code flow
195+
* MUST support at least one of the following to obtain a short-lived access token. (Please check out security considerations around access token lifetime https://openid.bitbucket.io/fapi/fapi-2_0-security-profile.html#name-access-token-lifetimes)
196+
** client credential grant flow {{RFC6749}} section 4.4
197+
** authorization code flow {{RFC6749}} section 4.1
198198

199199
### OAuth Scopes
200200

@@ -208,7 +208,8 @@ All events MUST be signed using the `RS256` algorithm using a minimum of 2048-bi
208208
* MUST accept access tokens in the HTTP header as in Section 2.1 of OAuth 2.0 Bearer Token Usage [RFC6750]{{RFC6750}}
209209
* MUST NOT accept access tokens in the query parameters stated in Section 2.3 of OAuth 2.0 Bearer Token Usage [RFC6750]{{RFC6750}}
210210
* MUST verify the validity, integrity, expiration and revocation status of access tokens
211-
* MUST verify that the authorization represented by the access token is sufficient for the requested resource access and otherwise return errors as in section 3.1 of [RFC6750]{{RFC6750}}
211+
* MUST verify that the authorization represented by the access token is sufficient for the requested resource access.
212+
* If the access token is not sufficient for the requested action, the Resource server MUST return errors as per section 3.1 of [RFC6750]{{RFC6750}}
212213

213214
# Use Cases
214215
Implementations MAY choose to support one or more of the following use-cases in order to be considered interoperable implementations

0 commit comments

Comments
 (0)