Open jgarciahospital opened 1 week ago
Add DPoP
Authorization and resource servers SHOULD use mechanisms for sender-constraining access tokens, such as Mutual TLS for OAuth 2.0 [RFC8705] or OAuth 2.0 Demonstrating Proof of Possession (DPoP) [RFC9449] (see Section 4.10.1), to prevent misuse of stolen and leaked access tokens.
Problem description
The objective of Number Verification API is being able to authenticate the device of the customer for ensuring that is using the line associated with the phone number that the third party or application is using as identity.
For such purpose, the API needs to validate the connection (current method) or the SIM (evolution towards Operator Token TS.43) during the authentication process, to later validate that token associated to the actual line identifier with the one provided by the developer in the API request.
Based on that purpose, it is expected that the developer will trigger a new authentication process any time that the API is to be called, ensuring that a proper identification of the line/SIM over the current device is always done before the API call.
One of the use cases to be controlled/avoided is a device changing the SIM card and reusing a token created with the previous SIM: the previous token (linked to the mobile phone number of the old SIM card) would be the one used for the Number Verification evaluation, which is not correct.
Expected action
Include security policy in the API description to ensure that:
Text proposal (inclusion of point 2):