Closed Zegnat closed 1 month ago
I believe this has been highlighted by @aaronpk in #94 - with the move to replace the IndieAuth Token Verification flow with RFC 7662, this should be resolved?
I think it's resolved when we merge #94
We merged introspection.. does that resolve this?
Closing this, as all verification is now following RFC 7662.
In IndieAuth, Access Token Verification is the alternative to Token Introspection. Both are meant as ways for resource servers that are not integrated with the token endpoint to be able to check tokens they recieve for validity.
OAuth 2.0 Simplified has a section on Security Considerations for Token Introspection, and the Token Introspection spec itself (RFC 7662) has Security Considerations and Privacy Considerations sections.
One of my main take aways is the fact that the endpoint for verification reasons might have to share more data than it would be willing to share with the public at large. I am not sure we are hitting this point just yet, but with discussions surrounding expiry times for refresh, as well as subject and resources data for TicketAuth, I wonder if this might be an example of a footgun.
If the same security considerations do apply, would there be reasons to pull them inline with eachother? If yes, is there any reason IndieAuth cannot do the same as for revocation and point at the existing Introspection spec?
I would also be interested in hearing: