Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Scopes and claims section applicability #213

Closed
WestpacOpenBanking opened this issue May 7, 2020 · 5 comments
Closed

Scopes and claims section applicability #213

WestpacOpenBanking opened this issue May 7, 2020 · 5 comments

Comments

@WestpacOpenBanking
Copy link

Request For Clarification

The Scopes and Claims section in the Security Profile discusses a set of claims that must be supported without further context as to if they must be supported as claims for the ID Token, the userinfo endpoint or both. We note that auth_time is normally only supported in the ID token context and there is currently discussion around the authorisation request object and authorisation requests more generally in that section. We suspect that the intent is for this section to apply to the ID token claims only and request that this be clarified or, if this is not the case, then that clarification is given for each claim individually.

@pcurtisrab
Copy link

pcurtisrab commented May 8, 2020

Regional Australia Bank has read the standards to mean that there is no distinction between the claims that must be supported in the ID Token and the Userinfo Endpoint (except those specifically mentioned in the specific ID token section).

If Westpac is correct in their assumption that Scopes and Claims section only applies to the ID Token, then this has significant bearing on a previous clarification about the refresh_token_expires_at claim and current implementations, which appeared to clearly support our reasoning that the scopes and claims section applies to both the ID Token AND the Userinfo endpoint.

@CDR-API-Stream
Copy link
Collaborator

Hi @WestpacOpenBanking, the claims must be supported in the ID Token and UserInfo endpoint unless expressly excluded.

Thus, auth_time would apply to both ID Token and UserInfo.

@mperryau
Copy link

Ping Identity wishes to back Westpac's point of view on this issue. There is a reason why auth_time is defined in the ID Token section of the OIDC specification: it relates to the user's authentication event (i.e. token creation), whereas the UserInfo endpoint is intended as a protected resource that provides information about the user. Every single mention of auth_time in the OIDC specification is in the context of an ID token.

Vendors like Ping write their solutions to the specification and Data61 should not be modifying a mature, well-supported specification for a local requirement in this way. Left as it is, this will have material impact on Data Holder implementations.

We recommend that auth_time be not required to be provided by the UserInfo endpoint, to retain consistency with the OIDC specification.

@WestpacOpenBanking
Copy link
Author

Thank you @CDR-API-Stream. This position is not in alignment with OIDC or a number of vendor implementations. We have raised a new change request where we suggest that auth_time is only mandatory in the ID Token as this better aligns with international standards.

@CDR-API-Stream
Copy link
Collaborator

This change request has been adopted in v1.4.0 of the standards. This issue has been answered and it is being closed accordingly.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

5 participants