Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[At-Risk] Implementations of PoPSecurityScheme needed #731

Open
mmccool opened this issue May 31, 2019 · 8 comments
Open

[At-Risk] Implementations of PoPSecurityScheme needed #731

mmccool opened this issue May 31, 2019 · 8 comments
Assignees
Labels
Defer to TD 2.0 Has Use Case Potential The use case can be extracted and explained Security

Comments

@mmccool
Copy link
Contributor

mmccool commented May 31, 2019

The PoPSecurityScheme is currently at risk.

  • 2 implementations of all features are needed
@mmccool mmccool added Testing by PR transition Comments addressed during the CR period at-risk labels May 31, 2019
@mkovatsc mkovatsc removed the by PR transition Comments addressed during the CR period label Jun 19, 2019
@mkovatsc
Copy link
Contributor

I am removing the "by PR transition" label, as these at-risk features will be dropped given the implementation report.

@sebastiankb
Copy link
Contributor

@mmccool If I'm correct there is no PoPSecurityScheme implementation yet, right?

Shall we still wait for PR transition?

@mmccool
Copy link
Contributor Author

mmccool commented Oct 18, 2019

Updated for CR2... this is still at risk, with 0 implementations. Actually, the results are a little odd, since there is 1 manual assertion for PoP default values but no TDs that use it in the test cases.

@mmccool
Copy link
Contributor Author

mmccool commented Oct 18, 2019

PoP however is basically an experimental security scheme so it can be removed without much practical impact in this round. We probably do want to try again in the next round.

A little off-topic, but Cert and Public probably should be removed, as they are not very well defined.

@sebastiankb sebastiankb added the by PR transition Comments addressed during the CR period label Oct 18, 2019
@sebastiankb
Copy link
Contributor

@mmccool I think there are no 2 implementations, right? we should start to remove the parts from the TD spec

@sebastiankb
Copy link
Contributor

PoPSecurityScheme is removed from v1.0. will be addressed for v.1.1

@sebastiankb sebastiankb added Defer to next TD spec version This topic is not covered in this charter, maybe included for the next TD version. and removed Testing at-risk by PR transition Comments addressed during the CR period labels Dec 6, 2019
@mmccool
Copy link
Contributor Author

mmccool commented Jul 4, 2022

We did not include PoP in TD 1.1. However, there is some activity in IETF to extend the authentication protocols for OAuth2 to include a means for demonstrating possession of bearer tokens (see below) rather than introducing a new kind of token. We can push it off to TD 2.0 - we have to wait to see if the IETF comes up with something. See below:

https://www.ietf.org/id/draft-ietf-oauth-dpop-09.html#name-compatibility-with-the-bear

@mmccool mmccool added Defer to TD 2.0 and removed Defer to next TD spec version This topic is not covered in this charter, maybe included for the next TD version. labels Jul 4, 2022
@egekorkan egekorkan added the Has Use Case Potential The use case can be extracted and explained label Jan 30, 2024
@egekorkan
Copy link
Contributor

I have added the use case potential but I would prefer if someone creates a use case mentioning pop security scheme instead of the TD TF doing that. We had put it before but there was no implementations of it so there was no need raised by anyone to include it.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Defer to TD 2.0 Has Use Case Potential The use case can be extracted and explained Security
Projects
None yet
Development

No branches or pull requests

4 participants