Conversation
| 3. There is no OAuth-Client-Attestation-PoP HTTP request header field present. | ||
|
|
||
| Provided the above conditions are meet the following additional rules apply: | ||
| 1. The public key located in the DPoP proof MUST match the public key located in the `cnf` claim of the Client Attestation JWT. |
There was a problem hiding this comment.
Should we be more specific around how this matching should occur, e.g if both JWK use thumbprint etc?
|
we're also missing the considerations for challenge/DPoP nonce |
|
This should either
Anything towards the end of not having any AS support optionality. I am supportive of this in theory but if its not MTI for the AS I would not bother implementing the client side for it. |
favorite direction would be to create two distinct token_endpoint_auth_methods, which could be independtly signaled using token_endpoint_auth_methods_supported, therefore leaving the AS the clear option to support either or both. What do you think about this option? @panva |
|
@paulbastian yes that's acceptable (I think?). |
|
I agree with @panva I'm going to update the PR in the direction of making the combined mode required when the AS supports both DPoP and Client Attestation. |
f4fb47b to
61d793e
Compare
|
I've made a few changes to this PR
|
Initial draft at this proposal, things to discuss include
Fixes #69