-
Notifications
You must be signed in to change notification settings - Fork 12
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
httpsig and short-lived bearer tokens as alternative to sharedSecret #98
Conversation
This would allow for some more modern security best practices like pre-registering clients and making the access token short-lived and client-bound
I think we should use a GNAP grant request instead. Will update. |
GNAP is more appropriate here because it makes way less assumptions about the interaction (in particular it doesn't assume the use of browser redirects)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Makes sense. Looking forward to see how this section about the access procedure can be made more "standardized" compared to the current free-form text!
We can reuse the format of the WWW-Authenticate header defined for GNAP in section 9.1 of https://datatracker.ietf.org/doc/draft-ietf-gnap-core-protocol/ so then it would be |
See cs3org/ocm-test-suite#88 (comment) for a demo of how this would work |
Nice to see you already have your ocm-stub doing this. Would you add |
…98) * OAuth code as alternative to sharedSecret This would allow for some more modern security best practices like pre-registering clients and making the access token short-lived and client-bound * whitespace * typo * GNAP instead of OAuth 2.0 Authorization Code flow GNAP is more appropriate here because it makes way less assumptions about the interaction (in particular it doesn't assume the use of browser redirects) * camel case * simplify from GNAP to httpsig+bearer * clarify language * `<OCM endpoint>/token`
This would allow for some more modern security best practices like pre-registering clients and making the access token short-lived and client-bound