Skip to content
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
34 changes: 31 additions & 3 deletions draft-ietf-oauth-rfc7523bis.xml
Original file line number Diff line number Diff line change
Expand Up @@ -49,7 +49,7 @@
</address>
</author>

<date day="22" month="July" year="2025" />
<date day="20" month="December" year="2025" />

<area>Security</area>
<workgroup>OAuth Working Group</workgroup>
Expand Down Expand Up @@ -268,6 +268,18 @@
<spanx style="verb">client-authentication+jwt</spanx>
or another more specific explicit type value defined by a specification profiling this specification.
</t>
<t>
The introduction of strong typing for JWTs (using explicit <spanx style="verb">typ</spanx>
values) serves as a signal to distinguish between tokens produced in accordance with
specifications published prior to these updates and those incorporating them. However,
the primary security protection comes from the tightened audience requirements. Since
strong typing alone does not prevent the attacks described in <xref
target="private_key_jwt.Disclosure" /> and <xref target="Audience.Injection" />, the
use of explicit typing is RECOMMENDED for clients, enabling them to signal their intention of sending
a JWT conforming to the requirements herein. This approach balances security signaling with practical
deployment considerations, avoiding disruption to client deployments that already
conform to the tightened audience requirements but have not yet adopted explicit typing.
</t>
</list>
</t>
<t>
Expand Down Expand Up @@ -427,11 +439,17 @@
the primary security protection comes from the tightened audience requirements. Since
strong typing alone does not prevent the attacks described in <xref
target="private_key_jwt.Disclosure" /> and <xref target="Audience.Injection" />, the
use of explicit typing is suggestion for clients enabling them to signal their intention of sending
use of explicit typing is RECOMMENDED for clients, enabling them to signal their intention of sending
a JWT conforming to the requirements herein. This approach balances security signaling with practical
deployment considerations, avoiding disruption to client deployments that already
conform to the tightened audience requirements but have not yet adopted explicit typing.
</t>
<t>
Client authentication JWTs SHOULD be explicitly typed by using the
<spanx style="verb">typ</spanx> header parameter value
<spanx style="verb">client-authentication+jwt</spanx>
or another more specific explicit type value defined by a specification profiling this specification.
</t>
</list>
</t>
</section>
Expand Down Expand Up @@ -769,6 +787,15 @@
[[ to be removed by the RFC Editor before publication as an RFC ]]
</t>

<t>
-04
<list style="symbols">
<t>
Applied editorial suggestions by Jamshid Khosravian.
</t>
</list>
</t>

<t>
-03
<list style="symbols">
Expand Down Expand Up @@ -853,12 +880,13 @@
<t>
We would like to acknowledge the contributions of the following
people to this specification:
Brock Allen
Brock Allen,
John Bradley,
Ralph Bragg,
Joseph Heenan,
Pedram Hosseyni,
Pieter Kasselman,
Jamshid Khosravian,
Ralf Küsters,
Martin Lindström,
Aaron Parecki,
Expand Down