OpenID Connect Federation and OAuth metadata types

Issue #1731 resolved
Andrii Deinega created an issue

While the OpenId Connect Federation specification is mainly focused on OpenID Connect federations :) it allows defining of new metadata types. The OAuth Authorization server and OAuth-protected resource metadata types will be good examples. Two things I don’t really understand are

  1. how would an OAuth-protected resource in organization A know how to validate Bearer ATs issued by an AS in organization B of the same federation
  2. now even if we deal with self-contained ATs which include all required information about the issuer (its federation entity id) why would an OAuth-protected resource in organization A ever rely on/trust scopes provided in ATs. OAuth authorization servers in organization A have their own policies on granting/providing scopes and permissions.

Please tell me what I miss.

Comments (7)

  1. David W Chadwick

    In my opinion each AS and RS that work together need to be aware of each other. This means that a RS that receives an access token from an AS that it does not know about (in the same or other organisation, it does not really matter) will not accept the access token. One way to achieve this using JWTs is for the RS to know which JWT issuers/signers to trust, and the AS to put into the aud claim which RS (or RSs) this access token is good for. With introspection the RS will ask its AS to validate the access token and if the AS does not recognise the RS it will refuse.

  2. Michael Jones

    The spec already defines the metadata types oauth_authorization_server, oauth_client, and oauth_resource.

  3. Giuseppe De Marco

    Hi @Andrii, please let us know what’s your requirement and what are you looking for in the specs for your need, please consider that you can even adopt a token introspection endpoint to do third parties validations

  4. Andrii Deinega reporter

    @Giuseppe De Marco , I wanted to get a better understanding of how an AS and an RS could potentially work together assuming they belong to different organizations (or in other words, they aren’t aware of each other).

    I think I got all the answers thanks to the responses from you and David.

  5. Log in to comment