Skip to content

Commit 3adbdd8

Browse files
authored
Merge pull request #15 from panva/back-to-scope
2 parents e0b345f + 6d2baa4 commit 3adbdd8

File tree

1 file changed

+23
-7
lines changed

1 file changed

+23
-7
lines changed

draft-ietf-oauth-rfc7523bis.xml

Lines changed: 23 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -355,9 +355,6 @@
355355
used as the audience of the JWT;
356356
this includes that the token endpoint URL of the authorization server
357357
MUST NOT be used as an audience value.
358-
To simplify implementations,
359-
the <spanx style="verb">aud</spanx> claim value MUST
360-
be a JSON string, and not a single-valued JSON array.
361358
The authorization server MUST reject any JWT that does not
362359
contain its issuer identifier as its sole audience value.
363360
</t>
@@ -375,12 +372,10 @@
375372
the following requirement is added:
376373
<list style="empty">
377374
<t>
378-
Client authentication JWTs MUST be explicitly typed by using the
375+
Client authentication JWTs SHOULD be explicitly typed by using the
379376
<spanx style="verb">typ</spanx> header parameter value
380377
<spanx style="verb">client-authentication+jwt</spanx>
381-
another more specific explicit type value defined by a specification profiling this specification.
382-
Client authentication JWTs not using the explicit type value
383-
MUST be rejected by the authorization server.
378+
or another more specific explicit type value defined by a specification profiling this specification.
384379
</t>
385380
</list>
386381
</t>
@@ -529,6 +524,18 @@
529524
The authorization server MUST reject any such JWT that does not
530525
contain its own issuer identifier as the sole audience value.
531526
</t>
527+
<t>
528+
The introduction of strong typing for JWTs (using explicit <spanx style="verb">typ</spanx>
529+
values) serves as a signal to distinguish between tokens produced in accordance with
530+
specifications published prior to these updates and those incorporating them. However,
531+
the primary security protection comes from the tightened audience requirements. Since
532+
strong typing alone does not prevent the attacks described in <xref
533+
target="private_key_jwt.Disclosure" /> and <xref target="Audience.Injection" />, the
534+
use of explicit typing is suggestion for clients enabling them to signal their intention of sending
535+
a JWT conforming to the requirements herein. This approach balances security signaling with practical
536+
deployment considerations, avoiding disruption to client deployments that already
537+
conform to the tightened audience requirements but have not yet adopted explicit typing.
538+
</t>
532539
</list>
533540
</t>
534541
</section>
@@ -799,6 +806,15 @@
799806
</t>
800807

801808
<t>
809+
-03
810+
<list style="symbols">
811+
<t>
812+
Relaxed client requirement to use strong typed JWTs. SHOULD instead of MUST.
813+
</t>
814+
<t>
815+
Do not restrict the "aud" claim's type. Allow it to be a an array with a single member.
816+
</t>
817+
</list>
802818
-02
803819
<list style="symbols">
804820
<t>

0 commit comments

Comments
 (0)