datatracker.ietf.org
Sign in
Version 5.3.1, 2014-04-16
Report a bug

OAuth 2.0 Registered JWT Profile 1.0
draft-sakimura-oauth-rjwtprof-01

Document type: Active Internet-Draft (individual)
Document stream: No stream defined
Last updated: 2013-11-06
Intended RFC status: Unknown
Other versions: plain text, pdf, html

Stream State:No stream defined
Document shepherd: No shepherd assigned

IESG State: I-D Exists
Responsible AD: (None)
Send notices to: No addresses provided

INTERNET-DRAFT                                              Nat Sakimura
Intended Status: Proposed Standard             Nomura Research Institute
Expires: May 10, 2014                                   November 6, 2013

                 OAuth 2.0 Registered JWT Profile 1.0 
                    draft-sakimura-oauth-rjwtprof-01

Abstract

   This specification defines a profile of OAuth 2.0 framework that
   provides the holder of key facility for the compliant client. It
   achieves this without channel binding but solely based on the
   application protocol to make it easy for the client developers to
   develop such client. 

Status of this Memo

   This Internet-Draft is submitted to IETF in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as
   Internet-Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/1id-abstracts.html

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html

Copyright and License Notice

   Copyright (c) 2013 IETF Trust and the persons identified as the
   document authors. All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
 

Nat Sakimura              Expires May 10, 2014                  [Page 1]
INTERNET DRAFT    OAuth 2.0 Registered JWT Profile 1.0  November 6, 2013

   publication of this document. Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document. Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1  Introduction  . . . . . . . . . . . . . . . . . . . . . . . . .  3
     1.1  Notational Conventions  . . . . . . . . . . . . . . . . . .  3
     1.2 Terminology  . . . . . . . . . . . . . . . . . . . . . . . .  3
   2.  Registered JWT . . . . . . . . . . . . . . . . . . . . . . . .  3
   3. Obtaining the Registered JWT  . . . . . . . . . . . . . . . . .  4
   4.  Use of Registered JWT  . . . . . . . . . . . . . . . . . . . .  5
     4.1 Use of Registered JWT as a grant . . . . . . . . . . . . . .  5
       4.1.1 Token request  . . . . . . . . . . . . . . . . . . . . .  6
       4.1.2 Token response . . . . . . . . . . . . . . . . . . . . .  6
       4.1.3 Token error response . . . . . . . . . . . . . . . . . .  6
     4.2 Use of Registered JWT as an access token . . . . . . . . . .  6
       4.2.1 Resource request . . . . . . . . . . . . . . . . . . . .  6
       4.2.2 Resource request verification  . . . . . . . . . . . . .  7
       4.2.3 Positive Response  . . . . . . . . . . . . . . . . . . .  7
       4.2.4 Error Response . . . . . . . . . . . . . . . . . . . . .  7
   3  Security Considerations . . . . . . . . . . . . . . . . . . . .  8
   4  IANA Considerations . . . . . . . . . . . . . . . . . . . . . .  8
   5  References  . . . . . . . . . . . . . . . . . . . . . . . . . .  8
     5.1  Normative References  . . . . . . . . . . . . . . . . . . .  8
     5.2  Informative References  . . . . . . . . . . . . . . . . . .  8
   Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . .  8

 

Nat Sakimura              Expires May 10, 2014                  [Page 2]
INTERNET DRAFT    OAuth 2.0 Registered JWT Profile 1.0  November 6, 2013

1  Introduction

   OAuth 2.0 Bearer Token Usage follows the "Bearer Instrument" pattern
   that the token is not registered to any party, thus the token can be
   used by any party that act as a bearer. The flexibility provided by
   this pattern is very flexible. However, when it has its weakness in
   the cases of token loss. This draft addresses the issue with another
   very popular pattern in the area of financial instruments called
   "registered instruments". In this case, the token is registered to a
   user, thus it will not be usable by any other party than the
   registered user whose identity can be verified through evidence of
   identity.

   To achieve the same effect as the "registered instruments", this

[include full document text]