Movatterモバイル変換


[0]ホーム

URL:


Skip to main content

Application-Agnostic Demonstration Proof of Possession (DPoP) Framework
draft-nandakumar-oauth-dpop-proof-00

This document is an Internet-Draft (I-D). Anyone may submit an I-D to the IETF. This I-D isnot endorsed by the IETF and hasno formal standing in theIETF standards process.
DocumentTypeActive Internet-Draft (individual)
AuthorsSuhas Nandakumar,Cullen Fluffy Jennings
Last updated 2025-09-15
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state(No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state I-D Exists
Telechat date (None)
Responsible AD (None)
Send notices to (None)
Email authors IPR References Referenced by Nits Search email archive
draft-nandakumar-oauth-dpop-proof-00
OAuth Working Group                                        S. NandakumarInternet-Draft                                               C. JenningsIntended status: Standards Track                           Cisco SystemsExpires: 20 March 2026                                 16 September 2025Application-Agnostic Demonstration Proof of Possession (DPoP) Framework                  draft-nandakumar-oauth-dpop-proof-00Abstract   This document describes a generic framework for Demonstrating Proof   of Possession (DPoP) that extends beyond HTTP-specific   implementations.  Building upon RFC 9449, this framework provides a   protocol-agnostic approach for sender-constraining tokens through   cryptographic proof of possession, enabling secure token binding   across various application protocols and contexts.About This Document   This note is to be removed before publishing as an RFC.   The latest revision of this draft can be found at https://oauth-   wg.github.io/oauth-dpop-generic/draft-generic-dpop-framework.html.   Status information for this document may be found at   https://datatracker.ietf.org/doc/draft-nandakumar-oauth-dpop-proof/.   Discussion of this document takes place on the OAuth Working Group   Working Group mailing list (mailto:oauth@ietf.org), which is archived   at https://mailarchive.ietf.org/arch/browse/oauth/.  Subscribe at   https://www.ietf.org/mailman/listinfo/oauth/.   Source for this draft and an issue tracker can be found at   https://github.com/oauth-wg/oauth-dpop-generic.Status of This Memo   This Internet-Draft is submitted in full conformance with the   provisions of BCP 78 and BCP 79.   Internet-Drafts are working documents of the Internet Engineering   Task Force (IETF).  Note that other groups may also distribute   working documents as Internet-Drafts.  The list of current Internet-   Drafts is at https://datatracker.ietf.org/drafts/current/.Nandakumar & Jennings     Expires 20 March 2026                 [Page 1]Internet-Draft                 dpop-proof                 September 2025   Internet-Drafts are draft documents valid for a maximum of six months   and may be updated, replaced, or obsoleted by other documents at any   time.  It is inappropriate to use Internet-Drafts as reference   material or to cite them other than as "work in progress."   This Internet-Draft will expire on 20 March 2026.Copyright Notice   Copyright (c) 2025 IETF Trust and the persons identified as the   document authors.  All rights reserved.   This document is subject to BCP 78 and the IETF Trust's Legal   Provisions Relating to IETF Documents (https://trustee.ietf.org/   license-info) in effect on the date of publication of this document.   Please review these documents carefully, as they describe your rights   and restrictions with respect to this document.  Code Components   extracted from this document must include Revised BSD License text as   described in Section 4.e of the Trust Legal Provisions and are   provided without warranty as described in the Revised BSD License.Table of Contents   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   3     1.1.  Conventions and Terminology . . . . . . . . . . . . . . .   3   2.  Protocol Overview and Concept . . . . . . . . . . . . . . . .   4   3.  Application Protocol Requirements . . . . . . . . . . . . . .   6     3.1.  Binding Fields Definition . . . . . . . . . . . . . . . .   6     3.2.  Nonce Support . . . . . . . . . . . . . . . . . . . . . .   7     3.3.  Security Requirements . . . . . . . . . . . . . . . . . .   7     3.4.  Example Binding Implementation  . . . . . . . . . . . . .   7   4.  Application-Agnostic DPoP Proof Structure . . . . . . . . . .   8     4.1.  Authorization Context Object  . . . . . . . . . . . . . .   8       4.1.1.  Authorization Context Object Structure  . . . . . . .   8     4.2.  JWT Header Requirements . . . . . . . . . . . . . . . . .   8     4.3.  JWT Payload Requirements  . . . . . . . . . . . . . . . .   9   5.  Protocol Type Registry  . . . . . . . . . . . . . . . . . . .   9     5.1.  MOQ Context Type  . . . . . . . . . . . . . . . . . . . .   9       5.1.1.  Required Fields . . . . . . . . . . . . . . . . . . .   9       5.1.2.  Optional Fields . . . . . . . . . . . . . . . . . . .  10       5.1.3.  String Encoding for Binary Data . . . . . . . . . . .  10       5.1.4.  Validation Requirements . . . . . . . . . . . . . . .  11   6.  Application-Agnostic DPoP Proof JWT Examples  . . . . . . . .  11     6.1.  Example: MOQ Context DPoP Proof . . . . . . . . . . . . .  11     6.2.  Comparing with HTTP DPoP  . . . . . . . . . . . . . . . .  12   7.  Relationship to RFC 9449  . . . . . . . . . . . . . . . . . .  12     7.1.  Extensions to Section 7 (Protected Resource Access) . . .  12       7.1.1.  Key Differences from RFC 9449 Section 7 . . . . . . .  13Nandakumar & Jennings     Expires 20 March 2026                 [Page 2]Internet-Draft                 dpop-proof                 September 2025       7.1.2.  Compatibility with RFC 9449 . . . . . . . . . . . . .  13       7.1.3.  Migration Path  . . . . . . . . . . . . . . . . . . .  13   8.  Security Considerations . . . . . . . . . . . . . . . . . . .  14     8.1.  Context Type Validation . . . . . . . . . . . . . . . . .  14     8.2.  Protocol-Specific Security Requirements . . . . . . . . .  14     8.3.  Cross-Context Token Binding . . . . . . . . . . . . . . .  14     8.4.  Application Separation Requirements . . . . . . . . . . .  14   9.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  15     9.1.  DPoP Authorization Context Types Registry . . . . . . . .  15       9.1.1.  Registration Template . . . . . . . . . . . . . . . .  15       9.1.2.  Initial Registry Contents . . . . . . . . . . . . . .  16     9.2.  JWT Claims Registration . . . . . . . . . . . . . . . . .  16     9.3.  Media Types Registration  . . . . . . . . . . . . . . . .  16       9.3.1.  application/dpop-proof+jwt  . . . . . . . . . . . . .  16   10. References  . . . . . . . . . . . . . . . . . . . . . . . . .  17     10.1.  Normative References . . . . . . . . . . . . . . . . . .  17     10.2.  Informative References . . . . . . . . . . . . . . . . .  18   Appendix A.  Acknowledgments  . . . . . . . . . . . . . . . . . .  18   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  181.  Introduction   RFC 9449 [RFC9449] defines a mechanism for sender-constraining OAuth   2.0 tokens via a proof-of-possession mechanism on the application   level.  DPoP as defined in RFC 9449 has two separable parts: the   first part (covered in sections 4, 5, 6, and 8) describes how a   client obtains a DPoP-bound token from an authorization server, while   the second part (covered in sections 7 and 9) describes how the   client proves control of the private key associated with a DPoP token   when accessing protected resources.   This specification defines bindings for Media Over QUIC Transport   (MOQT) and presents a generic framework that abstracts the core   concepts of DPoP into a protocol-agnostic approach.  While keeping   the first part unchanged, this framework generalizes the second part   to enable proof-of-possession token binding for various application   contexts beyond HTTP while maintaining the security properties   established in RFC 9449.1.1.  Conventions and Terminology   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and   "OPTIONAL" in this document are to be interpreted as described in   BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all   capitals, as shown here.Nandakumar & Jennings     Expires 20 March 2026                 [Page 3]Internet-Draft                 dpop-proof                 September 2025   The terms "access token", "refresh token", "authorization server",   "resource server", "client", and "public client" are defined by "The   OAuth 2.0 Authorization Framework" [RFC6749].   The terms "JSON Web Token (JWT)", "JOSE Header", and "JWS" are   defined in [RFC7519] and [RFC7515].   Application protocol:  The protocol which uses DPoP tokens as proof      of authorization.  This may be HTTP (as in RFC 9449) or any other      application-layer protocol that requires proof-of-possession token      binding.2.  Protocol Overview and Concept   The Generic DPoP Framework extends the DPoP mechanism to work across   various application protocols beyond HTTP.  The basic flow involves a   client obtaining a DPoP-bound token from an authorization server,   then using that token with an application protocol by providing proof   of possession of the associated private key.   +--------+                                          +---------------+   |        |--(A)-- Token Request ------------------->|               |   | Client |        (Generic DPoP Proof)              | Authorization |   |        |                                          |     Server    |   |        |<-(B)-- DPoP-Bound Access Token ----------|               |   |        |        (token_type=DPoP)                 +---------------+   |        |   |        |   |        |                                          +---------------+   |        |--(C)-- Application Protocol Request --->|               |   | Client |        (DPoP-Bound Access Token +       | Application   |   |        |         Generic DPoP Proof with         |   Protocol    |   |        |         Binding Fields)                 |    Server     |   |        |<-(D)-- Application Protocol Response ---|               |   +--------+                                          +---------------+                        Figure 1: Generic DPoP Flow   The main data structure introduced by this specification is a generic   DPoP proof JWT that can be used across various application protocols   and contexts, as described in detail below.  A client uses a generic   DPoP proof JWT to prove the possession of a private key corresponding   to a certain public key.   Roughly speaking, a generic DPoP proof is a signature over:   *  protocol-specific authorization context data,Nandakumar & Jennings     Expires 20 March 2026                 [Page 4]Internet-Draft                 dpop-proof                 September 2025   *  a timestamp,   *  a unique identifier,   *  an optional server-provided nonce, and   *  a hash of the associated access token when an access token is      present within the request.   The application protocol needs to define binding fields that make the   proof JWT unique to a specific protocol interaction.  These binding   fields replace the HTTP method (htm) and HTTP URI (htu) fields used   in RFC 9449, providing protocol-specific context that prevents replay   attacks across different protocol operations.   Key aspects of the protocol:   1.  *Token Acquisition (Steps A-B)*: Uses the same mechanism as RFC       9449 sections 4, 5, 6, and 8   2.  *Proof of Possession (Steps C-D)*: Generalizes RFC 9449 sections       7 and 9 with protocol-specific binding fields   3.  *Binding Fields*: Each application protocol must define how to       bind the proof to specific protocol operations to ensure       uniqueness   The basic steps of a protocol flow with generic DPoP (without the   optional nonce) are shown in Figure 1.   A.  In the token request, the client sends an authorization grant   (e.g., an authorization code, refresh token, etc.) to the   authorization server in order to obtain an access token (and   potentially a refresh token).  The client attaches a generic DPoP   proof to the request.   B.  The authorization server binds (sender-constrains) the access   token to the public key claimed by the client in the DPoP proof; that   is, the access token cannot be used without proving possession of the   respective private key.  If a refresh token is issued to a public   client, it is also bound to the public key of the DPoP proof.   C.  To use the access token, the client has to prove possession of   the private key by, again, providing a generic DPoP proof for that   request to the protocol server.  The protocol server needs to receive   information about the public key to which the access token is bound.   This information may be encoded directly into the access token (for   JWT-structured access tokens) or provided via token introspectionNandakumar & Jennings     Expires 20 March 2026                 [Page 5]Internet-Draft                 dpop-proof                 September 2025   endpoint (not shown).  The protocol server verifies that the public   key to which the access token is bound matches the public key of the   DPoP proof.  It also verifies that the access token hash in the DPoP   proof matches the access token presented in the request.   D.  The protocol server refuses to serve the request if the signature   check fails or if the data in the DPoP proof is wrong, e.g., the   authorization context does not match the expected context for the   protocol operation.  The access token itself, of course, must also be   valid in all other respects.   The generic DPoP mechanism presented herein is not a client   authentication method.  In fact, a primary use case of DPoP is for   public clients (e.g., single-page applications and applications on a   user's device) that do not use client authentication.  Nonetheless,   generic DPoP is designed to be compatible with private_key_jwt and   all other client authentication methods.   Generic DPoP does not directly ensure message integrity, but it   relies on the underlying transport security layer (such as TLS) for   that purpose.  See Section 8 for details.3.  Application Protocol Requirements   Application protocols that wish to use this generic DPoP framework   MUST define the following elements to ensure secure proof-of-   possession token binding:3.1.  Binding Fields Definition   Each application protocol MUST specify:   1.  *Required Binding Fields*: The mandatory fields within the       Authorization Context (actx) object that uniquely identify and       bind the proof to a specific protocol operation   2.  *Field Semantics*: Clear definitions of what each binding field       represents and how it relates to protocol messages and operations   3.  *Uniqueness Requirements*: How the combination of binding fields       ensures that each proof is unique to a specific protocol       interactionNandakumar & Jennings     Expires 20 March 2026                 [Page 6]Internet-Draft                 dpop-proof                 September 20253.2.  Nonce Support   Application protocols SHOULD provide a mechanism for servers to   supply nonces to clients for replay protection, similar to Section 9   of RFC 9449.  When nonce support is provided, the protocol   specification MUST define:   1.  How nonces are communicated from server to client   2.  The lifetime and scope of nonces   3.  How clients incorporate nonces into DPoP proofs3.3.  Security Requirements   Application protocol specifications MUST include:   1.  *Replay Attack Prevention*: How the binding fields prevent replay       of proofs across different protocol operations   2.  *Cross-Protocol Security*: Measures to prevent proofs from being       valid across different application protocols   3.  *Protocol-Specific Threat Model*: Analysis of security threats       specific to the application protocol context3.4.  Example Binding Implementation   For illustration, an application protocol might define binding fields   such as:   *  operation: The specific protocol operation being authorized   *  resource_identifier: A unique identifier for the resource being      accessed   *  timestamp_context: Protocol-specific temporal context information   The combination of these fields would ensure that a DPoP proof is   valid only for the specific operation, resource, and temporal context   for which it was generated.Nandakumar & Jennings     Expires 20 March 2026                 [Page 7]Internet-Draft                 dpop-proof                 September 20254.  Application-Agnostic DPoP Proof Structure   This proof structure has the same general structure as a standard   DPoP proof as defined in RFC 9449, with the key difference being that   the HTTP-specific claims (htm for HTTP method and htu for HTTP URI)   are replaced with the Authorization Context (actx) object to provide   application protocol-specific binding information.4.1.  Authorization Context Object   The core extension introduced by this framework is the Authorization   Context (actx) object, which replaces protocol-specific fields in the   DPoP proof JWT payload.   A generic DPoP proof JWT MUST contain an Authorization Context object   (actx) that specifies the protocol or context for which the proof is   being generated.4.1.1.  Authorization Context Object Structure   The Authorization Context (actx) object MUST contain:   *  type (string): A registered identifier specifying the protocol or      context type   *  Additional fields as defined by the specific context type      specification   {     "actx": {       "type": "protocol-identifier"     }   }4.2.  JWT Header Requirements   The JWT header for a generic DPoP proof MUST contain the same   elements as specified in [RFC9449]:   *  typ: MUST be "dpop-proof+jwt"   *  alg: An asymmetric signature algorithm identifier   *  jwk: The public key used for verificationNandakumar & Jennings     Expires 20 March 2026                 [Page 8]Internet-Draft                 dpop-proof                 September 20254.3.  JWT Payload Requirements   The JWT payload for a generic DPoP proof MUST contain:   *  jti: A unique identifier for the JWT   *  iat: Issued-at time   *  actx: Authorization Context object (if not using HTTP binding)   Additional claims MAY be included based on context requirements:   *  nonce: Server-provided nonce for replay protection   *  ath: Access token hash (when presenting access tokens)5.  Protocol Type Registry   This framework establishes a registry for protocol type identifiers   used in the actx.type field.  Each registered type MUST specify:   1.  The additional required and optional fields for the Authorization       Context   2.  The semantic meaning and validation rules for those fields   3.  Security considerations specific to the protocol context   4.  Examples of usage5.1.  MOQ Context Type   This section defines the normative authorization context for Media   Over QUIC (MOQ) as specified in this framework.   Type Identifier: "moq"5.1.1.  Required Fields   The MOQ authorization context MUST contain the following fields:   action:   A string specifying the MOQ operation (Section 9 of [MOQTransport]   being authorized.   tns:Nandakumar & Jennings     Expires 20 March 2026                 [Page 9]Internet-Draft                 dpop-proof                 September 2025   Track Namespace as defined in Section 2.4.1 of [MOQTransport].5.1.2.  Optional Fields   The MOQ authorization context MAY contain the following fields:   tn:   Track Name as defined in Section 2.4.1 of [MOQTransport].   parameters:   An object containing additional MOQ-specific parameters relevant to   the operation.  The structure and contents of this field are context-   dependent.5.1.3.  String Encoding for Binary Data   As defined in Section 2.4.1 of [MOQTransport], Track Namespace is an   ordered N-tuple of bytes (where N can be between 1 and 32), and Track   Name is a sequence of bytes.  Both are not constrained to specific   encoding and carry arbitrary byte sequences that are compared by   exact byte matching.   For representation in the JSON tns and tn fields of the Authorization   Context, the following encoding approach MUST be used:   1.  *Track Namespace Tuple Encoding*: The Track Namespace tuple MUST       be encoded as a URL-safe string where:       *  Each tuple field is base64url-encoded (without padding)       *  Tuple fields are separated by forward slashes ("/")       *  The entire namespace is prefixed with "moq://"   2.  *Track Name Encoding*: The Track Name bytes MUST be base64url-       encoded (without padding) when containing non-printable bytes or       when exact byte preservation is required   *TODO:* A better way to encode that promotes readability is being   thought about   Example encodings:   *  Namespace tuple [0x01, 0x02], [0x03, 0x04]: "moq://AQ/Aw"   *  ASCII track name: "camera1"Nandakumar & Jennings     Expires 20 March 2026                [Page 10]Internet-Draft                 dpop-proof                 September 2025   *  Binary track name [0xFF, 0xFE]: "_v4"   *  UTF-8 track name with special chars: "música%20en%20vivo" (URL      percent-encoded)5.1.4.  Validation Requirements   Servers processing MOQ authorization contexts MUST:   1.  Verify that the action field contains a recognized MOQ operation   2.  Validate that the tns field represents a properly formatted track       namespace tuple encoding as specified above   3.  If present, validate that the tn field contains properly encoded       track name bytes   4.  Ensure the requested action is permitted for the specified track       namespace tuple   5.  If present, ensure the requested action is permitted for the       specified track name   6.  If present, validate any parameters according to usage context6.  Application-Agnostic DPoP Proof JWT Examples   This section provides complete examples of application-agnostic DPoP   proof JWTs, illustrating the use of the Authorization Context object   in place of HTTP-specific claims.6.1.  Example: MOQ Context DPoP Proof   The following example shows a complete DPoP proof JWT for a MOQ   context:   JWT Header:   {     "typ": "dpop-proof+jwt",     "alg": "ES256",     "jwk": {       "kty": "EC",       "x": "l8tFrhx-34tV3hRICRDY9zCkDlpBhF42UQUfWVAWBFs",       "y": "9VE4jf_Ok_o64zbTTlcuNJajHmt6v9TDVrU0CdvGRDA",       "crv": "P-256"     }   }Nandakumar & Jennings     Expires 20 March 2026                [Page 11]Internet-Draft                 dpop-proof                 September 2025   JWT Payload:   {     "jti": "unique-request-id-789",     "iat": 1705123456,     "actx": {       "type": "moq",       "action": "SUBSCRIBE",       "tns": "moq://example.com/app/scope/video",       "tn": "camera1"     },     "ath": "fUHyO2r2Z3DZ53EsNrWBb1xWXM4VbCqpW5G-o9GqC7Y"   }6.2.  Comparing with HTTP DPoP   For comparison, an equivalent HTTP DPoP proof would contain htm and   htu claims instead of the actx object:   {     "jti": "unique-request-id-789",     "iat": 1705123456,     "htm": "POST",     "htu": "https://media.example.com/subscribe",     "ath": "fUHyO2r2Z3DZ53EsNrWBb1xWXM4VbCqpW5G-o9GqC7Y"   }   The key difference is that the application-agnostic framework uses   the actx object to provide protocol-specific authorization context,   while HTTP DPoP uses htm and htu for HTTP method and URI.7.  Relationship to RFC 9449   This framework extends and generalizes the concepts defined in RFC   9449 [RFC9449] while maintaining full backward compatibility with   HTTP-based DPoP implementations.7.1.  Extensions to Section 7 (Protected Resource Access)   RFC 9449 Section 7 defines protected resource access specifically for   HTTP contexts.  This framework extends those concepts to support non-   HTTP protocols while preserving the core security model.Nandakumar & Jennings     Expires 20 March 2026                [Page 12]Internet-Draft                 dpop-proof                 September 20257.1.1.  Key Differences from RFC 9449 Section 7   1.  *Authorization Context vs HTTP Parameters*: Instead of requiring       htm (HTTP method) and htu (HTTP URI) claims, this framework uses       the Authorization Context (actx) object to specify protocol-       specific request context.   2.  *Protocol-Agnostic Token Binding*: While RFC 9449 Section 7.1       defines the DPoP authentication scheme for HTTP Authorization       headers, this framework enables token binding for protocols that       may not use HTTP-style headers.   3.  *Flexible Proof Validation*: The validation rules in RFC 9449       Section 4.3 are adapted to work with the actx object rather than       HTTP-specific claims, allowing servers to validate proofs       according to their protocol requirements.7.1.2.  Compatibility with RFC 9449   This framework is designed to coexist with RFC 9449 implementations:   *  HTTP-based DPoP proofs continue to work unchanged using htm and      htu claims   *  Generic DPoP proofs use the actx object for non-HTTP contexts   *  The same key pairs and token binding mechanisms apply to both      approaches   *  Authorization servers MAY support both HTTP and generic DPoP proof      formats simultaneously7.1.3.  Migration Path   Existing RFC 9449 implementations can adopt this framework   incrementally:   1.  *HTTP-Only Phase*: Continue using standard RFC 9449 DPoP for HTTP       resources   2.  *Hybrid Phase*: Support both HTTP DPoP (with htm/htu) and generic       DPoP (with actx)   3.  *Generic Phase*: Migrate to using Authorization Context objects       for all protocols, including HTTPNandakumar & Jennings     Expires 20 March 2026                [Page 13]Internet-Draft                 dpop-proof                 September 2025   The typ header value dpop-proof+jwt (instead of dpop+jwt) signals   support for the generic framework while maintaining the same   cryptographic properties and security model.8.  Security Considerations   This framework inherits all security considerations from [RFC9449].   Additional considerations specific to the generic framework include:8.1.  Context Type Validation   Servers MUST validate that the actx.type field corresponds to a   registered and supported context type.  Unknown or unsupported   context types MUST be rejected.8.2.  Protocol-Specific Security Requirements   Each registered context type MUST specify its own security   requirements and threat model.  The generic framework does not impose   additional security properties beyond those provided by the   underlying JWT signature.8.3.  Cross-Context Token Binding   DPoP tokens bound using this framework SHOULD be validated only   within their intended context type.  Servers MUST NOT accept a DPoP   proof with one context type as valid for a different context type.8.4.  Application Separation Requirements   Clients MUST use different DPoP proofs for different applications.   This separation ensures that a DPoP proof generated for one   application protocol cannot be reused or replayed in the context of   another application protocol.  Implementations SHOULD enforce this   by:   1.  *Distinct Key Pairs*: Using separate key pairs for different       application protocols where feasible   2.  *Context-Specific Binding*: Ensuring that Authorization Context       (actx) objects contain fields that uniquely identify the       application protocol   3.  *Proof Validation*: Rejecting proofs that contain context       information from other application protocolsNandakumar & Jennings     Expires 20 March 2026                [Page 14]Internet-Draft                 dpop-proof                 September 2025   This requirement prevents cross-application attacks where an attacker   might attempt to use a valid DPoP proof from one application context   in a different application context.9.  IANA Considerations9.1.  DPoP Authorization Context Types Registry   This document establishes the "DPoP Authorization Context Types"   registry within the "JSON Web Token (JWT)" registry group.   Registry Name: DPoP Authorization Context Types   Registration Policy: Specification Required   Expert Review Guidelines:   Specifications submitted for registration MUST include:   1.  A complete specification of required and optional fields   2.  Semantic definitions and validation rules for all fields   3.  Security considerations specific to the context type   4.  At least one complete example of usage   5.  Considerations for interoperability with existing DPoP       implementations   Reference Format: The reference MUST be to a published RFC or an   Internet-Draft that has been adopted by a working group.9.1.1.  Registration Template   To register a new DPoP Authorization Context Type, the following   template MUST be completed:   Type Identifier:  The string identifier used in the actx.type field   Description:  A brief description of the context type and its      intended use   Required Fields:  List of mandatory fields in the authorization      context object   Optional Fields:  List of optional fields in the authorization      context objectNandakumar & Jennings     Expires 20 March 2026                [Page 15]Internet-Draft                 dpop-proof                 September 2025   Validation Rules:  Specific validation requirements for the context      type   Security Considerations:  Context-specific security requirements and      threat model9.1.2.  Initial Registry Contents     +=========+=================+==========+============+===========+     | Type    | Description     | Required | Optional   | Reference |     |         |                 | Fields   | Fields     |           |     +=========+=================+==========+============+===========+     | moq     | Media Over QUIC | action,  | tn,        |           |     |         | authorization   | tns      | parameters |           |     |         | context         |          |            |           |     +---------+-----------------+----------+------------+-----------+     | RFCXXXX |                 |          |            |           |     +---------+-----------------+----------+------------+-----------+                                  Table 19.2.  JWT Claims Registration   This document registers the following JWT claim in the "JSON Web   Token Claims" registry:   Claim Name: actx   Claim Description: Authorization Context Object   Claim Value Type: Object   Change Controller: IETF   Specification Document: This document, Section 4.19.3.  Media Types Registration9.3.1.  application/dpop-proof+jwt   This document registers the "application/dpop-proof+jwt" media type   for generic DPoP proof JWTs in the "Media Types" registry.   Type Name: application   Subtype Name: dpop-proof+jwt   Required Parameters: noneNandakumar & Jennings     Expires 20 March 2026                [Page 16]Internet-Draft                 dpop-proof                 September 2025   Optional Parameters: none   Encoding Considerations: Binary; base64url encoding of JWT   Security Considerations: See Section 8 of this document   Interoperability Considerations: Multi-Protocol DPoP proofs extend   HTTP-specific DPoP while maintaining backward compatibility   Published Specification: This document Applications that use this   media type: Applications implementing generic DPoP authorization   Fragment Identifier Considerations: none   Additional Information: none   Person and email address to contact: OAuth Working Group   oauth@ietf.org (mailto:oauth@ietf.org)   Intended Usage: COMMON   Restrictions on Usage: none   Author: OAuth Working Group   Change Controller: IETF10.  References10.1.  Normative References   [MOQTransport]              Nandakumar, S., Vasiliev, V., Swett, I., and A. Frindell,              "Media over QUIC Transport", Work in Progress, Internet-              Draft, draft-ietf-moq-transport-13, 7 July 2025,              <https://datatracker.ietf.org/doc/html/draft-ietf-moq-              transport-13>.   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate              Requirement Levels", BCP 14, RFC 2119,              DOI 10.17487/RFC2119, March 1997,              <https://www.rfc-editor.org/rfc/rfc2119>.   [RFC7515]  Jones, M., Bradley, J., and N. Sakimura, "JSON Web              Signature (JWS)", RFC 7515, DOI 10.17487/RFC7515, May              2015, <https://www.rfc-editor.org/rfc/rfc7515>.Nandakumar & Jennings     Expires 20 March 2026                [Page 17]Internet-Draft                 dpop-proof                 September 2025   [RFC7519]  Jones, M., Bradley, J., and N. Sakimura, "JSON Web Token              (JWT)", RFC 7519, DOI 10.17487/RFC7519, May 2015,              <https://www.rfc-editor.org/rfc/rfc7519>.   [RFC8174]  Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC              2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,              May 2017, <https://www.rfc-editor.org/rfc/rfc8174>.   [RFC9449]  Fett, D., Campbell, B., Bradley, J., Lodderstedt, T.,              Jones, M., and D. Waite, "OAuth 2.0 Demonstrating Proof of              Possession (DPoP)", RFC 9449, DOI 10.17487/RFC9449,              September 2023, <https://www.rfc-editor.org/rfc/rfc9449>.10.2.  Informative References   [RFC6749]  Hardt, D., Ed., "The OAuth 2.0 Authorization Framework",              RFC 6749, DOI 10.17487/RFC6749, October 2012,              <https://www.rfc-editor.org/rfc/rfc6749>.Appendix A.  Acknowledgments   Thanks for Richard Barnes for the reviews and suggestions on the   protocol context design.Authors' Addresses   Suhas Nandakumar   Cisco Systems   Email: snandaku@cisco.com   Cullen Jennings   Cisco Systems   Email: fluffy@cisco.comNandakumar & Jennings     Expires 20 March 2026                [Page 18]

[8]ページ先頭

©2009-2026 Movatter.jp