-
Notifications
You must be signed in to change notification settings - Fork 5.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support Certificate-Bound (POP) JWT Access Token Validation #10538
Comments
I think the move here (for reactive at least) would be to implement an extension of Then the API would be a method on I'm guessing most of these have analogous implementation on the non-reactive side of things. |
Another implementation option might be to add a static method to |
@segevmalool We're planning on implementing this on the Authorization Server side in spring-authorization-server#101. We'll then implement the Resource Server side validation. |
This feature has been merged via 644cfa9. Added a new Relevant specification: |
https://datatracker.ietf.org/doc/html/draft-ietf-oauth-pop-architecture-08
https://tools.ietf.org/id/draft-ietf-oauth-pop-key-distribution-04.html
Expected Behavior
Proof of possession enables client authentication on requests to resource servers. The oauth2 authorization server signs a JWT-formatted access token which includes the public key of client. The resource server verifies the access token against the AS JWKS, and also verifies the access token (or some part of it) against the client's public key (contained in the
cnf
claim, or confirmation).I'm not fully clear on how the client would pass the signature (or shared secret and hash in the case of symmetric), so would need to figure that out for an implementation. Does anyone know a standard for this?
With some boot or web integrations, this feature could be enabled easily by a spring security user with (some variation) of the following (reactive) code:
Current Behavior
Would have to implement custom token validation or some such to make it work.
Context
Client to resource server authentication is becoming a best practice in the industry and would enhance spring security greatly.
The text was updated successfully, but these errors were encountered: