Skip to content

Commit 6228a82

Browse files
authored
Merge pull request #145 from oauth-wg/pb-clarify-refresh-token-binding
Pb clarify refresh token binding
2 parents 0f7f35f + 3c1dcef commit 6228a82

File tree

1 file changed

+3
-2
lines changed

1 file changed

+3
-2
lines changed

draft-ietf-oauth-attestation-based-client-auth.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -531,7 +531,7 @@ Implementers should be aware that the design of this authentication mechanism de
531531

532532
## Refresh token binding
533533

534-
Authorization servers issuing a refresh token in response to a token request using the client attestation mechanism as defined by this draft MUST bind the refresh token to the Client Instance, and NOT just the client as specified in section 6 {{RFC6749}}. To prove this binding, the Client Instance MUST use the client attestation mechanism when refreshing an access token. The client MUST also use the same key that was present in the "cnf" claim of the client attestation that was used when the refresh token was issued.
534+
Authorization servers issuing a refresh token in response to a token request using the client attestation mechanism as defined by this draft MUST bind the refresh token to the Client Instance and its associated public key, and NOT just the client as specified in section 6 {{RFC6749}}. To prove this binding, the Client Instance MUST use the client attestation mechanism when refreshing an access token. The client MUST also use the same key that was present in the "cnf" claim of the client attestation that was used when the refresh token was issued.
535535

536536
## Web Server Default Maximum HTTP Header Sizes
537537

@@ -579,7 +579,7 @@ In any case the Authorization Server SHOULD ensure the freshness of the Client A
579579

580580
The approach using a challenge explicitly provided by the Authorization Server gives stronger replay attack detection guarantees, however support by the Authorization Server is OPTIONAL to simplify mandatory implementation requirements. The `jti` value is mandatory and hence acts as a default fallback.
581581

582-
# Appendix A IANA Considerations
582+
# IANA Considerations
583583

584584
## OAuth Parameters Registration
585585

@@ -640,6 +640,7 @@ This section requests registration of the following scheme in the "Hypertext Tra
640640

641641
* require `iat` in Client Attestation PoP JWT
642642
* clarify `use_attestation_challenge` and add `invalid_client_attestation`
643+
* clarify refresh token binding
643644
* check client_id at PAR endpoint
644645

645646
-06

0 commit comments

Comments
 (0)