Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Authorization code binding to client instance #56

Open
cobward opened this issue Oct 24, 2023 · 3 comments
Open

Authorization code binding to client instance #56

cobward opened this issue Oct 24, 2023 · 3 comments

Comments

@cobward
Copy link
Contributor

cobward commented Oct 24, 2023

Currently, section 5.2 "Refresh token binding" gives requirements for how an authorization server must bind the client instance to the refresh token. Could we reuse this mechanism to bind the authorization code to the client instance in the case that client auth was performed in the authorization request?

@tplooker
Copy link
Collaborator

@cobward do you mean in the event we are using something like a signed PAR request?

@paulbastian
Copy link
Collaborator

If I understand you correctly, you get a similar set of assurances like with PKCE, so I'm unsure if we want to duplicate this mechanism.

@cobward
Copy link
Contributor Author

cobward commented Nov 6, 2023

@cobward do you mean in the event we are using something like a signed PAR request?

I'm not sure that it only applies to signed PAR request. I mean just generally that if client authentication is required at the authorization endpoint then the same requirements of binding the client instance to the authorization code still apply.

If I understand you correctly, you get a similar set of assurances like with PKCE, so I'm unsure if we want to duplicate this mechanism.

If that is the case then would it make sense to add text to that effect? Something along the lines of:

The Authorization Server is not required to bind the client instance to the authorization code, as PKCE provides sufficient mitigation of security risks.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants