-
Notifications
You must be signed in to change notification settings - Fork 21
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update Diagram with RFC 9101 to secure the /authorize endpoint #93
Comments
@AxelNennker @bigludo7 @fernandopradocabrillo @ECORMAC @jgarciahospital Please review the diagram above and provide your comments. |
Hi Ming, |
I will share the aggregator version later, after the standalone version is reviewed. Please review the standalone version first and comment. |
In the YAML
In ICM auth code flow, under interaction 8 of the sequence diagram, there is a consent capturing mechanism. Will the In OIDC 3.1.2.1
Should the |
For security reasons, this authorization flow should ignore the |
There is an issue with brokering/Federated diagram. This sequence implies that code exchange from Z to Y is done before client requests code exchange from Z. This should not be the case and is wasting resources and time before the request is even made. Maybe client will never call |
@pendula95 The rational was discussed previously. |
@garciasolero |
If you want to create a diagram for a generic authorization code flow, I have nothing to add on that matter. However, for the Number Verification use case, the |
Yes, agree. The home operator should ignore the requested I believe your concern for |
GSMA have just approved a spec "ASAC.01-Seamless Authenticator subsystem enhancement for TS.43 Operator Token" which also deals with the security of the authorize endpoint. Think David W was chair of this group. The plan is that GSMA will submit it to Camara (it will probably go initially to the consent&identity group-not sure??). It may be a good idea to align the above with that initiative (they also have aggregator flows inbuilt). |
While looking at Chapter 6 API General Federated Call Flows I was wondering why many of the detailed flows use CIBA when all flows start at the user's device. It seems to me the consumption device and the authentication device are the same in many (all?) flows. Are the puml files of the diagrams public? I did not find them e.g. here https://github.com/GSMA-Open-Gateway/Open-Gateway-Documents/tree/main/SupportingDocuments Anyone willing to edit and re-create the diagrams so that they show the flow detailed above? |
And add the NumberVerification puml files to this repo somewhere, please. |
Notes on the above:
|
As requested, added in the following commit |
@AxelNennker the diagrams are codes in the respective *.MD file. |
Great proposal @mhfoo and thanks for that. Standalone:
Federated:
Very naive question @mhfoo, as I'm not an expert, but from a developer perspective when i will make the call I do not know is I'm facing the scenario standalone or federated... so it's means that I need to make my code working for both situation right? is it acceptable from their perspective? Again thanks for this great contribution. |
Proposal is from Telefónica team (Thanks to @garciasolero). See ICM Issue #128
Examples flow / use case:
The diagram is illustrating the 2nd bullet point above.
Yes.
Yes. 25 is the auth_code, 35 is the access_token.
To the developer, both the standalone and federated are the "same", as they will need to follow the API response for the HTTP 302 redirection URLs. The redirection URLs will contain the next request payload.
Thank you |
Added purpose attribute under the Request Object |
As we stated in the meeting today if we also had a flow showing an aggregator then I think we would be complete (for this discussion). Would that be possible to do? |
@ECORMAC |
@mhfoo I was thinking more a representation as they have today in the ID&Consent (API Access & user Consent-https://github.com/camaraproject/IdentityAndConsentManagement/blob/e3fb2f4619ac031eba3814f5bd0dd35d4931f4b7/documentation/CAMARA-API-access-and-user-consent.md), flow is simpler, plus step 51 in the federated above would probably go from the aggregator etc. |
@ECORMAC I understand the confusion now. Do you have access to Open Gateway Chapter 6? The federation and aggregator flows are discussed there. Federation == Aggregator in this context. Normally, the frontend application (mobile or browser) will have a corresponding application backend server, which will interact with the aggregator (which is a backend server). The diagram in ICM should remove the aggregator label and ICM (and CAMARA) normally discuss the standalone flows. |
@ECORMAC from Open Gateway Chapter 6 The flow is the same as the federated flow (but with more details). The boxes "Aggregator" and "Telco Finder" is "Operator Z" and "OGW Platform@Operator" is "Operator Y" |
That reads as if I added the puml in that commit. I did not. I view those puml files as a good starting point, BUT - I think - in Camara we are providing the north bound APIs and their documentation. I think developers do not and should not care about OpenGateway details like Telco Finder. Am I wrong? |
I have corrected the statement in the orignal comment. |
Problem description
To secure the /authorize endpoint from being abused
Possible evolution
Proposal to follow Telefonica's proposal to use RFC 9101 Signed Request Object
Alternative solution
N.A
Additional context
#71
The text was updated successfully, but these errors were encountered: