Skip to content

Commit d05faa5

Browse files
aaronpkbc-pi
andauthored
update draft name (#76)
* update draft name closes #67 * Update draft-ietf-oauth-identity-chaining.md Co-authored-by: Brian Campbell <[email protected]> * Incorporate Arndt's suggestion into the Introduction --------- Co-authored-by: Brian Campbell <[email protected]> Co-authored-by: Brian Campbell <[email protected]>
1 parent 95a954d commit d05faa5

File tree

1 file changed

+8
-7
lines changed

1 file changed

+8
-7
lines changed

draft-ietf-oauth-identity-chaining.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ wg: oauth
88

99
docname: draft-ietf-oauth-identity-chaining-latest
1010

11-
title: Identity Chaining across Trust Domains
11+
title: OAuth Identity and Authorization Chaining Across Domains
1212
abbrev:
1313
lang: en
1414
kw: []
@@ -58,26 +58,26 @@ informative:
5858

5959
--- abstract
6060

61-
This specification defines a mechanism to preserve identity and call chain information across trust domains that use the OAuth 2.0 Framework.
61+
This specification defines a mechanism to preserve identity information and federate authorization across trust domains that use the OAuth 2.0 Framework.
6262

6363
--- middle
6464

6565
# Introduction
66-
Applications often require access to resources that are distributed across multiple trust domains where each trust domain has its own OAuth 2.0 authorization server. As a result, developers are often faced with the situation that a protected resource is located in a different trust domain and thus protected by a different authorization server. A request may transverse multiple resource servers in multiple trust domains before completing. All protected resources involved in such a request need to know on whose behalf the request was originally initiated (i.e. the user), what authorization was granted and optionally which other resource servers were called prior to making an authorization decision. This information needs to be preserved, even when a request crosses one or more trust domains. Preserving this information is referred to as identity chaining. This document defines a mechanism for preserving identity chaining information across trust domains using a combination of OAuth 2.0 Token Exchange {{RFC8693}} and JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication and Authorization Grants {{RFC7523}}.
66+
Applications often require access to resources that are distributed across multiple trust domains where each trust domain has its own OAuth 2.0 authorization server. As a result, developers are often faced with the situation that a protected resource is located in a different trust domain and thus protected by a different authorization server. A request may transverse multiple resource servers in multiple trust domains before completing. All protected resources involved in such a request need to know on whose behalf the request was originally initiated (i.e. the user), what authorization was granted and optionally which other resource servers were called prior to making an authorization decision. This information needs to be preserved, even when a request crosses one or more trust domains. This document referrers to this as "chaining" and defines a mechanism for preserving identity and authorization information across domains using a combination of OAuth 2.0 Token Exchange {{RFC8693}} and JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication and Authorization Grants {{RFC7523}}.
6767

6868
## Requirements Language
6969

7070
{::boilerplate bcp14-tagged}
7171

72-
# Identity Chaining Across Trust Domains
72+
# Identity and Authorization Chaining Across Domains
7373

74-
This specification describes a combination of OAuth 2.0 Token Exchange {{RFC8693}} and JWT Profile for OAuth 2.0 Client Authentication and Authorization Grants {{RFC7523}} to achieve identity chaining across trust domains.
74+
This specification describes a combination of OAuth 2.0 Token Exchange {{RFC8693}} and JWT Profile for OAuth 2.0 Client Authentication and Authorization Grants {{RFC7523}} to achieve identity and authorization chaining across domains.
7575

7676
A client in trust domain A that needs to access a resource server in trust domain B requests a JWT authorization grant from the authorization server for trust domain A via a token exchange. The client in trust domain A presents the received grant as an assertion to the authorization server in domain B in order to obtain an access token for the protected resource in domain B. The client in domain A may be a resource server, or it may be the authorization server itself.
7777

7878
## Overview
7979

80-
The Identity Chaining flow outlined below describes how a combination of OAuth 2.0 Token Exchange {{RFC8693}} and JWT Profile for OAuth 2.0 Client Authentication and Authorization Grants {{RFC7523}} are used to address the use cases identified. The appendix include two additional examples that describe how this flow is used. In one example, the resource server acts as the client and in the other, the authorization server acts as the client.
80+
The identity and authorization chaining flow outlined below describes how a combination of OAuth 2.0 Token Exchange {{RFC8693}} and JWT Profile for OAuth 2.0 Client Authentication and Authorization Grants {{RFC7523}} are used to address the use cases identified. The appendix include two additional examples that describe how this flow is used. In one example, the resource server acts as the client and in the other, the authorization server acts as the client.
8181

8282
~~~~
8383
+-------------+ +-------------+ +---------+
@@ -114,7 +114,7 @@ The Identity Chaining flow outlined below describes how a combination of OAuth 2
114114
| | | |
115115
| | | |
116116
~~~~
117-
{: title='Identity Chaining Flow'}
117+
{: title='Identity and Authorization Chaining Flow'}
118118

119119
The flow illustrated in Figure 1 shows the steps the client in trust Domain A needs to perform to access a protected resource in trust domain B. In this flow, the client has a way to discover the authorization server in Domain B and a trust relationship exists between Domain A and Domain B (e.g., through federation). It includes the following:
120120

@@ -445,6 +445,7 @@ The editors would like to thank Joe Jubinski, Justin Richer, Aaron Parecki and
445445
* added Aaron Parecki to acknowledgements
446446
* renamed section headers to be more explicit
447447
* use more specific term "JWT authorization grant"
448+
* changed name to "OAuth Identity and Authorization Chaining Across Domains"
448449
* move use cases to appendix and add continuous integration use case
449450

450451
-00

0 commit comments

Comments
 (0)