-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Discussion: Profiles support #16
Comments
A concrete example of a profile that would define additional claims and add mandatory and inter-claim constraints is Arm PSA token: https://datatracker.ietf.org/doc/html/draft-tschofenig-rats-psa-token-05 |
It looks like there are two obvious options:
I'd personally prefer the (less intrusive, inherently distributed) "compose" approach , however, I think Submods of the "non-token" type, which are recursively defined in terms of |
I second the the preference for composition. However I don't think claims should be contained within the profile. The profile should wrap the token as a whole, and then provide interpretation and validation of the underlying claims, but it should not contain any of the "data"; and therefore, there would be no need for JSON/CBOR tag for the profile -- the only thing that gets serialised is the Somewhat orthogonal to the Profiles, is the need for the EAT token to contain arbitrary claims -- this is specified by the spec itself and is not an extension to the format (well, strictly speaking, any CWT or JWT claims, rather than completely arbitrary). However, as we cannon provide strong type definitions for such claims, they would have to be deserialised into something like a The Profile would then allow interpreting those "generic" claims as strongly typed and named values. However, the "master" value for each claim should be contained within the |
EAT (https://ietf-rats-wg.github.io/eat/draft-ietf-rats-eat.html) allows the use of any claims defined by CWT or JWT, in addition to those expressly defined by the EAT standard. All claims are considered optional by EAT.
It is impractical to try to evaluate all the possible claims (as the set is essentially unbounded). Also, specific applications may require certain claims to always be present or have additional constraints on their values. It is proposed that this additional functionality is handled via EAT token "profiles".
A profile will handle the following:
This thread is to discuss how such profiles might be added to the existing Eat implementation.
The text was updated successfully, but these errors were encountered: