-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
refresh_token_expires_at claim #29
Comments
It is implied that the the |
A little OT but seems to be related, the |
@CDR-API-Stream : Thanks for responding , is refresh_token_expires_at claim different to exp: claim mentioned here under Introspection Endpoint. The name of this claim should be consistent in both locations. |
The 'refresh_token_expires_at' and 'exp' claim refer to the same thing (the expiration time of a token) but one is specific and one is generic. This difference is equivalent to the 'expires_at' and 'exp' claims applicable to an access token which are part of the normative standards. The difference in name allows for a generic introspection end point but also allows for both expiration claims to be returned in a single call to the token end point where two different tokens (access and refresh) can be returned. |
@CDR-API-Stream : Based on your last response, exp should only be included in the output for token Introspection for refresh Tokens. Thanks for clarifying this. However, the token to include refresh_token_expires_at claim is still unclear and based on OIDC or OAuth spec, adding claims to refresh tokens is not a standard practice. Can the sample output be updated to accurately reflect the expectation.
|
The non-normative sample will be updated as requested. While the inclusion of an expiry claim in a refresh token is not included in OAuth 2 or OIDC it is a relatively common practice and is also an approach adopted in the UK Open Banking standards (which uses a claim with the same name). |
As described in section 1.5 of RFC6749, refresh tokens are strings which are usually opaque to the client. As such, they cannot include claims. We think the intent of the above is not to include the |
Regional Australia Bank's view is that that the Our reasoning follows:
As an aside, we also contend that |
The analysis provided by @pcurtisrab above is an accurate reading of the standards. |
While I broadly support @pcurtisrab's feedback I note that the naming of claims is governed by JWT Sections 4.2 & 4.3. These standards give guidance that claim names should be IANA registered or use a Public Name. A public name is typically a realmed URI and is utilised by OBIE as This is particularly relevant as there is already existing implementations of If it was realmed appropriately ( |
Request For Clarification
Scopes and Claims section here , mandates the inclusion of refresh_token_expires_at claim. It is unclear which token must include this claim. It is conflicting to include this in ID token as the OIDC spec here does mention inclusion of refresh token information in Id tokens.
The text was updated successfully, but these errors were encountered: