Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Why we don't support refresh tokens for the renewal of the digital credentials #178

Open
peppelinux opened this issue Dec 17, 2023 · 2 comments

Comments

@peppelinux
Copy link
Member

  1. The User authentication and consent is required for the issuance of a credential:
    • In OAuth 2.0 the refresh token is used without any user control
    • To request a new credential with loa high, eg: the PID, requires the user to be authenticated to the PID/EAA Provider
    • To store a PID/EAA to the secure storage, the user must be authenticated and give the consent
  2. Security concerns: A stolen refresh token together with a brand new WIA and a PID/EAA "presentation" would be enough to steal a brand new PID
@Sakurann
Copy link

if the design is where access token is sender constrained and the DPoP key is cloud HSM protected, if the user sets up a PIN that needs to be typed to generate DPoP proof, that addresses 1, and if access token is sender constrained, that would mitigate 2. (but honestly if DPoP proof is cloud HSM protected and Wallet backend key for WIA as well and the attacker can steal both, that is a bigger problem and seems to be a no-go...)

@peppelinux
Copy link
Member Author

We are supporting refresh tokens according to #538

@peppelinux peppelinux removed the wontfix This will not be worked on label Feb 5, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
Development

No branches or pull requests

5 participants