-
Notifications
You must be signed in to change notification settings - Fork 22
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Is client_id
optional in the requests using wallet attestation?
#366
Comments
My understanding is the following:
Thus, requests against the token and/or PAR endpoint don't need the In conclusion, I have the impression that Should authorization server reject a with a client_id different that the one extracted from the attestation? |
An update: I missed the case where PAR is placed using a signed object. It seems that PS: I find this very puzzling. It would have been easier - from the wallet perspective - to just always send the |
I believe that
As per https://www.rfc-editor.org/rfc/rfc6749#section-3.2.1 the wallet 'MAY' always send client_id, even if it is not required. The logic is basically that there is no need for the client to send client_id if it's (say) using private_key_jwt (where the client id is already in the assertion) or client_secret_basic (where the client id is in the HTTP Authorization header).
That draft is an OAuth client authentication method, so as per the above it is in that document's scope to say whether client_id is required or not. I would say that as:
then client_id is not required when using client attestations to authenticate the client. |
Hi @jogu thanks for your reply, and especially for the above hint 😄 |
@Sakurann can we close this given the above responses and that you've opened oauth-wg/draft-ietf-oauth-attestation-based-client-auth#81 now? |
IETF client attestation draft is not clear, but also it is probably out of scope of that draft..
The text was updated successfully, but these errors were encountered: