solid / authentication-panel

GitHub repository for the Solid Authentication Panel
MIT License
11 stars 15 forks source link

consider methods to obtain access tokens from an authorization server instead of making them in the client #12

Closed zenomt closed 3 years ago

zenomt commented 5 years ago

in the current POP token scheme, the client directly manufactures an access token to present to the server with the "Bearer" method. as discussed on the 2019-08-26 and other calls and in #1, i believe there are numerous problems with the current POP token scheme.

several issues raised in #1 can at least be partially addressed by approaches discussed in #3, #9, #10. a summary of the most important remaining problems specifically with the client making access tokens:

obtaining an access token from the resource server's authorization server instead of using an access token made by the client addresses the above and has the following benefits:

with the following cost:

elf-pavlik commented 4 years ago

Latest draft relies on DPoP-bound Access Token issued by user's IdP. While client doesn't create access tokens any more, just DPoP Proofs, it still doesn't follow approach suggested in this issue. Maybe we could rename this issue to clearly propose that RS associated Authorization Server should issue Access Tokens.

elf-pavlik commented 4 years ago

BTW maybe OAuth 2.0 Token Exchange would still allow RS to delegate some responsibilities to AS server of its choice. I guess RS would still need to do the DPoP verification but could leave all the rest to AS it exchanges tokens with.

acoburn commented 3 years ago

This is an old issue that has been discussed and it is more in line with classic OAuth2 than OpenID Connect. Marking as closed as the Solid-OIDC proposal relies significantly on DPoP.