-
Notifications
You must be signed in to change notification settings - Fork 1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support OAuth DPoP #651
Comments
I'm excited to see the discussion around introducing DPoP support into the x/oauth2 package and I would love to start working on a prototype but I have a few questions and thoughts about the proposal that I hope you could help clarify @hickford
Your insights would be greatly appreciated. |
@theadell You can use this library for confidential or public clients. A client is confidential if it can keep the secret confidential. So server-side web apps are confidential clients. Native apps such as desktop apps are public clients. |
That's right. I overlooked that use case. |
Hi! Just wanted to chime in to voice more support for this, as the request hasn't been updated in some time. One emerging use-case for DPoP is with dynamically-configured clients, for example in the AT Protocol and SOLID protocol ecosystems. In these contexts, there is no existing relationships between the developers or operators of the "home server" and "client apps". DPoP is used for both "confidential" and "public" clients. In terms of most useful implementation details for AT Protocol (which I work on), generating and validating DPoP headers on individual resources requests and token requests would be the most helpful, both for clients and servers. Managing nonces would be very helpful. Parsing Auth Server metadata and "negotiating" use of DPoP algorithm values would be helpful, but only happens during the authorization flow and could potentially be done by calling code? |
Is anyone working on OAuth 2.0 Demonstrating Proof-of-Possession at the Application Layer (DPoP) support? RFC 9449 https://datatracker.ietf.org/doc/html/rfc9449 was published 2023.
Of course, the API will have to go through the Go change proposal process.
The text was updated successfully, but these errors were encountered: