Skip to content

Commit 521e129

Browse files
authored
Merge pull request #259 from oauth-wg/PieterKas-patch-5
Remove prohibition on returning expires_in and scope
2 parents f02bdaf + 82931f8 commit 521e129

File tree

1 file changed

+1
-3
lines changed

1 file changed

+1
-3
lines changed

draft-ietf-oauth-transaction-tokens.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -597,7 +597,7 @@ A successful response to a Txn-Token Request by a Transaction Token Service is c
597597
* The `access_token` value MUST be the Txn-Token JWT
598598
* The `issued_token_type` value MUST bet set to `urn:ietf:params:oauth:token-type:txn_token`
599599

600-
The Txn-Token Response MUST NOT include the values `expires_in`, `refresh_token` and `scope`
600+
The Txn-Token Response MUST NOT include the `refresh_token` value.
601601

602602
{{figtxtokenresponse}} shows a non-normative example of a Txn-Token Response.
603603

@@ -668,8 +668,6 @@ A Txn-Token is not resistant to replay attacks. A long-lived Txn-Token therefore
668668

669669
Because Txn-Tokens are short-lived, the Txn-Token response from the Txn-Token service does not contain the `refresh_token` field. A Txn-Token cannot be issued by presenting a `refresh_token`.
670670

671-
The `expires_in` field of the OAuth 2.0 Token Exchange specification {{RFC8693}} is not used in Txn-Token responses since the issued token has an `exp` field, which indicates the token lifetime.
672-
673671
## Access Tokens
674672
When creating Txn-Tokens, the Txn-Token MUST NOT contain the Access Token presented to the external endpoint. If an Access Token is included in a Txn-Token, an attacker may extract the Access Token from the Txn-Token, and replay it to any Resource Server that can accept that Access Token. Txn-Token expiry does not protect against this attack since the Access Token may remain valid even after the Txn-Token has expired.
675673

0 commit comments

Comments
 (0)