-
Notifications
You must be signed in to change notification settings - Fork 32
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Clarifications on using sender-constraint tokens DPoP #225
base: main
Are you sure you want to change the base?
Conversation
Telefónica is not in favour of implementing DPoP in CAMARA. Implementing Demonstrating Proof of Possession (DPoP) comes at a high cost with limited additional security benefits, given that other robust OIDC measures defined by the CAMARA profile are already in place. Here are the main reasons why we do NOT recommend implementing DPoP:
From Telefónica's perspective, the existing OIDC measures are sufficient. The cost and complexity of DPoP outweigh its benefits and it is not advisable to add it to our standards at this time. We have already accepted the recommendations (e.g. signed request) which we all agree have little impact on implementation given the use of private_key_jwt. But the DPop impact is much higher. |
I share the concerns of @jpengar that this proposal effectively mandates all API providers support DPoP. The cost/benefit analysis does not support this, so it will not happen. Techniques such as mTLS are more likely. For inter-operability, there is no reason to "recommend" (i.e. mandate) that API providers support DPoP, because the DPoP protocol itself allows the API provider to ignore the I anyway understood from #125 that the underlying issue was that some API providers require the API consumer to support DPoP. But for API providers that do not have this requirement, it is trivial to ignore the So the recommendation should be that API consumers support DPoP. |
The Financial API 2 Baseline Profile requires sender-constrained access tokens.
That is a baseline requirement for authorisation servers with customers from the banking industry who adaped FAPI. I assume that API Consumers with high security demands are going to demand support for sender-constraint access tokens. If an API Consumer needs EIDAS LOA high, then they probably cannot use CAMARA APIs if our APIs are not implement security baseline requirements. Rates for insurances are going to be higher if baseline security requirements are not met. |
Requirements could also be on the API Consumer. If we know at onboarding time that the API providers the API consumer is interested in - because they cover 90% of the API consumer's market - support sender-constraint tokens, then we can agree that they MUST use DPoP and that those API providers support DPoP. But business considerations are somewhat out-of-scope for ICM, right?! |
Co-authored-by: Eric Murray <[email protected]>
What type of PR is this?
Add one of the following kinds:
What this PR does / why we need it:
This PR recommends to implement sender-constraint tokens by using DPoP
Which issue(s) this PR fixes:
Fixes #125
Special notes for reviewers:
DPoP has implications on API consumers.
The API consumer can indicate in its metadata if it always uses DPoP for token request.