-
Notifications
You must be signed in to change notification settings - Fork 13
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Clients should be required to support need_info
section of UMA2 to better meet authorization goals
#189
Comments
To stay focused on AuthN we don't want to go beyond pushing a DPoP-bound ID Token.
Currently, UMA2 is the only claims pushing mechanism mentioned by Solid-OIDC, what exactly do you mean by non-UMA2 clients? |
I'm not contesting the focus on Authn, I agree with that fully. The way I understood Solid-OIDC spec and the discussions related to UMA2 is the following:
Now compare this with how UMA2 would likely implement authorization for Solid clients:
As you can see, unless I'm wrong somewhere, it's not just about pushing the claim. It's more about the interactive authorization process. If the client isn't required to understand UMA2, I will be vary of enabling UMA2 as the authorizing mechanism in my server (note that I can still enable UMA2 for The OAuth2 interactive process cannot help here, because as per Solid-OIDC the client initiates the Token endpoint directly, and not the Authorization endpoint (in case of resource server's AS). |
A very related scenario is Authorization Panel sec 3.1.5 |
Currently, the Solid-OIDC spec does not require its clients to comply with UMA2. Yes, it calls out specific features of UMA2, e.g. As an example of this, Solid-OIDC spec makes zero references to This gives an impression that I can create a Solid compliant client, without honouring UMA2's user-interaction protocols ( |
Thank you for all the details @amodm I will see if we can arrange a panel meeting for next Monday and discuss it /cc @acoburn It ties nicely into a direction where AuthZ would not require ID Token at all and the client shouldn't push it as a claim eagerly. The mini spec using UMA in Solid-OIDC should most likely build on
We are in a process of discussing Authorization Grants and reconciling them with Data Grants defined by the interop panel. This is out of scope for AuthN panel but we need to make sure that Solid composes all the specifications in a way that is consistent, this includes the usage of claims pushing mechanisms like UMA2. |
@elf-pavlik just checking in to see if any progress was made here. I'd logged into the meeting a few times after this issue was created, but the meetings weren't happening at that time it seems. |
This also fits in nicely with the objectives being discussed at solid/authorization-panel#46 I've modified the title to better reflect what I'm proposing here. |
need_info
section of UMA2 to better meet authorization goals
As per the current Solid-OIDC draft sec 9.1:
However, there's no equivalent of
If the client doesn't understand UMA2 (in particular,
need_info
etc), the client wouldn't be able to fulfil UMA2's authorization requirements, culminating in a 401/403. Or am I reading UMA2 specs incorrectly?This puts the Pod Provider in a spot. One can easily see the users complain that (non-UMA2) clients work with other pod providers, but not this server (which supports UMA2). This disincentivizes pod providers to support UMA2, while placing no incentives for clients to support it.
Given that Solid-OIDC concerns itself only with authentication, and not authorization, as stated by @acoburn in #158, the recommendation for servers to support UMA2 seems either out of place, or should be done only in conjunction with requiring clients to support UMA2. Personally, I'd prefer the latter.
The text was updated successfully, but these errors were encountered: