Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Token presentation headers #104

Closed
jricher opened this issue Nov 13, 2020 · 3 comments
Closed

Token presentation headers #104

jricher opened this issue Nov 13, 2020 · 3 comments

Comments

@jricher
Copy link
Collaborator

jricher commented Nov 13, 2020

§7 Using Access Tokens: Editor's note:

I don't actually like the idea of using only one header type for differently-bound access tokens. Perhaps instead these values should somehow reflect the key binding types. Maybe there can be multiple fields after the "GNAP" keyword using structured headers? Or a set of derived headers like GNAP-mtls? This might also be better as a separate specification, like it was in OAuth 2. However, access tokens should be able to use any key binding mechanisms here, plus bearer.

@fimbault
Copy link
Collaborator

Note that structured http headers now have a RFC https://www.rfc-editor.org/rfc/rfc8941.html

@jricher
Copy link
Collaborator Author

jricher commented Dec 15, 2021

Currently discussed options:

  • keep GNAP and have the API look up the binding mechanism and proof it that way
  • use a different keyword for each type: HTTPSig, MTLS, JWS, etc.

@jricher
Copy link
Collaborator Author

jricher commented Oct 5, 2022

No real consensus to use different scheme types and instead have things tied to the token's own internal identity. The proof methods don't use parameters on the authorization header, either, so no need to overload this.

@jricher jricher closed this as completed Oct 5, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants