<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-brossard-oauth-rar-authzen-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.22.0 -->
  <front>
    <title abbrev="AuthZEN RAR Profile">AuthZEN Request/Response Profile for OAuth 2.0 Rich Authorization Requests</title>
    <seriesInfo name="Internet-Draft" value="draft-brossard-oauth-rar-authzen-00"/>
    <author fullname="David Brossard">
      <organization>Axiomatics</organization>
      <address>
        <email>david.brossard@axiomatics.com</email>
      </address>
    </author>
    <author fullname="Omri Gazitt">
      <organization>Aserto</organization>
      <address>
        <email>omri@aserto.com</email>
      </address>
    </author>
    <author fullname="Alex Babeanu">
      <organization>3Edges</organization>
      <address>
        <email>alex@3edges.com</email>
      </address>
    </author>
    <date year="2024" month="July" day="04"/>
    <area>Security</area>
    <workgroup>Web Authorization Protocol</workgroup>
    <keyword>authorization</keyword>
    <keyword>abac</keyword>
    <keyword>authzen</keyword>
    <keyword>openid</keyword>
    <abstract>
      <?line 124?>

<t>This specification defines a profile of OAuth 2.0 Rich Authorization Requests leveraging the OpenID AuthZEN authorization request/response formats within the authorization_details JSON object. Authorization servers and resource servers from different vendors can leverage this profile to request and receive relevant authorization decisions from an AuthZEN-compatible PDP in an interoperable manner.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://davidjbrossard.github.io/authzen-rar-profile/draft-brossard-oauth-rar-authzen.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-brossard-oauth-rar-authzen/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Web Authorization Protocol Working Group mailing list (<eref target="mailto:oauth@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/oauth/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/oauth/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/davidjbrossard/authzen-rar-profile"/>.</t>
    </note>
  </front>
  <middle>
    <?line 128?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>OpenID AuthZEN is a Working Group under the OpenID Foundation which aims to increase interoperability and standardization in the authorization realm. In particular, AuthZEN aims to:
- build standards-based authorization APIs
- define standard design patterns for authorization
- produce educational material to help raise awareness of externalized authorization.</t>
      <t>The aim of this profile is to define an AuthZEN-conformant profile of the OAuth 2.0 Rich Authorization Requests <xref target="RFC9396"/>. <xref target="RFC9396"/> introduces a new parameter authorization_details that allows clients to specify their fine-grained authorization requirements using the expressiveness of JSON <xref target="RFC8259"/> data structures.</t>
      <t>This specification introduces a more structured format for the authorization_details parameter. The new format is also JSON <xref target="RFC8259"/> as a result of which this specification is conformant with <xref target="RFC9396"/> and is merely a stricter profile.</t>
      <t>For example the authorization request for a credit transfer mentioned in <xref target="RFC9396"/> would now be structured as follows</t>
      <figure>
        <name>Source Authorization Request</name>
        <sourcecode type="language-json" markers="false"><![CDATA[
{
    "subject": {
        "type": "user",
        "id": "Alice"
    },
    "resource": {
        "type": "payment_initiation",
        "id": "123",
        "recipient": {
            "creditorName": "Merchant A",
            "creditorAccount": {
                "bic": "ABCIDEFFXXX",
                "iban": "DE02100100109307118603"
            }
        }
    },
    "action": {
        "name": "transfer",
        "instructedAmount": {
            "currency": "EUR",
            "amount": "123.50"
        }
    },
    "context": {
        "remittance": "Ref Number Merchant"
    }
}
]]></sourcecode>
      </figure>
      <t>Using AuthZEN as a format for authorization_details will increase the usability and the interoperability of <xref target="RFC9396"/>. In particular, it will be possible for the AS to forward the contents of the authorization_details parameter to an AuthZEN-conformant Policy Decision Point (PDP).</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This specification uses the terms "access token", "refresh token", "authorization server" (AS), "resource server" (RS), "authorization endpoint", "authorization request", "authorization response", "token endpoint", "grant type", "access token request", "access token response", and "client" defined by "The OAuth 2.0 Authorization Framework" <xref target="RFC6749"/>.
This specification uses the terms "PDP" and "PEP" defined by <xref target="ABAC"/> and <xref target="XACML"/>.</t>
    </section>
    <section anchor="request-parameter-authorizationdetails">
      <name>Request Parameter "authorization_details"</name>
      <t>In <xref target="RFC9396"/>, the request parameter authorization_details contains, in JSON
notation, an array of objects.  Each JSON object contains the data to
specify the authorization requirements for a certain type of
resource. This specification defines the format for each one of these objects
such that it conforms to <xref target="AUTHZEN"/> and <xref target="RFC9396"/>.</t>
      <t><xref target="AUTHZEN"/> groups JSON datastructures into 4 JSON objects:
- subject: A Subject is the user or robotic principal about whom the Authorization API is being invoked. The Subject may be requesting access at the time the Authorization API is invoked.
- resource: A Resource is the target of an access request. It is a JSON (<xref target="RFC8259"/>) object that is constructed similar to a Subject entity.
- action: An Action is the type of access that the requester intends to perform. Action is a JSON (<xref target="RFC8259"/>) object that contains at least a name field.
- context: The Context object is a set of attributes that represent environmental or contextual data about the request such as time of day. It is a JSON (<xref target="RFC8259"/>) object.</t>
      <t>Note: the aforementioned is indicative only. Always refer to <xref target="AUTHZEN"/> for the formal definition of each element.</t>
      <section anchor="authorizationdetails-structure">
        <name>"authorization_details" Structure</name>
        <t>Because <strong>type</strong> is <strong><bcp14>REQUIRED</bcp14></strong>, the new <em>authorization_details</em> structure is as follows:</t>
        <ul spacing="normal">
          <li>
            <t>type:
An identifier for the authorization details type as a string. The value for this profile is "authzen". The value is case-insensitive. This field is <strong><bcp14>REQUIRED</bcp14></strong>.</t>
          </li>
          <li>
            <t>request:
this field contains the entire AuthZEN-conformant authorization request. This field is <strong><bcp14>REQUIRED</bcp14></strong>.</t>
          </li>
        </ul>
      </section>
      <section anchor="authorization-details-types">
        <name>Authorization Details Types</name>
        <t>This profile declares a new value for the <em>type</em> field as stated in the previous section. The value for this profile is "authzen". This indicates there will be a field called request and its value will be an AuthZEN-conformant authorization request.</t>
        <t>AuthZEN also defines a <em>type</em> field in the Subject and Resource categories. This field is meant to describe the type of user and/or resource required.</t>
      </section>
      <section anchor="common-data-fields">
        <name>Common Data Fields</name>
        <t>No field other than type and authzen shall be allowed in authorization_details when the type is "authzen". All other fields such as the ones mentioned in <xref target="RFC9396"/> shall be inserted inside the AuthZEN request in the relevant object (Subject, Resource, Action, or Context).</t>
      </section>
    </section>
    <section anchor="authorization-request">
      <name>Authorization Request</name>
      <t>Conformant to <xref target="RFC9396"/>, the authorization_details authorization request parameter can be used to specify authorization requirements in all places where the scope parameter is used for the same purpose, examples include:</t>
      <ul spacing="normal">
        <li>
          <t>authorization requests as specified in <xref target="RFC6749"/></t>
        </li>
        <li>
          <t>device authorization requests as specified in <xref target="RFC8628"/></t>
        </li>
        <li>
          <t>backchannel authentication requests as defined in <xref target="OID-CIBA"/></t>
        </li>
      </ul>
      <t>Parameter encoding follows the exact same rules as <xref target="RFC9396"/>.</t>
      <section anchor="example-non-normative">
        <name>Example (non-normative)</name>
        <figure>
          <name>Source Authorization Request</name>
          <sourcecode type="language-json" markers="false"><![CDATA[
{
  "type": "authzen",
  "request":
    {
        "subject": {
            "type": "user",
            "id": "Alice"
        },
        "resource": {
            "type": "payment_initiation",
            "id": "123",
            "recipient": {
                "creditorName": "Merchant A",
                "creditorAccount": {
                    "bic": "ABCIDEFFXXX",
                    "iban": "DE02100100109307118603"
                }
            }
        },
        "action": {
            "name": "transfer",
            "instructedAmount": {
                "currency": "EUR",
                "amount": "123.50"
            }
        },
        "context": {
            "remittance": "Ref Number Merchant"
        }
    }
}
]]></sourcecode>
        </figure>
      </section>
    </section>
    <section anchor="support-for-multiple-authorization-requests">
      <name>Support for Multiple Authorization Requests</name>
      <t><xref target="AUTHZEN"/> supports a profile that allows the expression of multiple authorization requests in a single JSON object. As a result, this
profile recommends the use of a single <tt>authorization_details</tt> object containing <em>boxcarred</em> requests as described in <xref target="BOXCAR"/> when
possible and the use of the <tt>authorization_details</tt> array otherwise.</t>
      <section anchor="example-non-normative-1">
        <name>Example (non-normative)</name>
        <t>This example is based on the one in <xref target="RFC9396"/> under section 3.  Authorization Request.</t>
        <sourcecode type="language-json"><![CDATA[
[
  {
    "type": "authzen",
    "request":
    {
      "subject": {
        "id": "alice@acmecorp.com",
        "type": "user"
      },
      "resource":{
        "id": "123",
        "type": "account_information",
        "location": "https://example.com/accounts"
      },
      "evaluations": {
        "eval-1": {
          "action": {
            "name": "list_accounts"
          }
        },
        "eval-2": {
          "action": {
            "name": "read_balances"
          }
        },
        "eval-3": {
          "action": {
            "name": "read_transactions"
          }
        }
      }
    }
  },
  {
    "type": "authzen",
    "request":
    {
      "subject": {
        "id": "alice@acmecorp.com",
        "type": "user"
      },
      "resource":{
        "id": "123",
        "type": "payment_initiation",
        "location": "https://example.com/payments",
        "recipient": {
            "creditorName": "Merchant A",
            "creditorAccount": {
                "bic": "ABCIDEFFXXX",
                "iban": "NL02RABO2228161411"
            }
        }
      },
      "context":{
        "remittance": "Ref Number Merchant"
      },
      "evaluations": {
        "eval-1": {
          "action": {
            "name": "initiate",
            "instructedAmount": {
            "currency": "EUR",
            "amount": "123.50"
            }
          }
        },
        "eval-2": {
          "action": {
            "name": "status"
          }
        },
        "eval-3": {
          "action": {
            "name": "cancel"
          }
        }
      }
    }
  }
]
]]></sourcecode>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The Security Considerations of <xref target="RFC9396"/>, <xref target="RFC6749"/>, <xref target="RFC7662"/>, and <xref target="RFC8414"/> all apply.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC7662">
          <front>
            <title>OAuth 2.0 Token Introspection</title>
            <author fullname="J. Richer" initials="J." role="editor" surname="Richer"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This specification defines a method for a protected resource to query an OAuth 2.0 authorization server to determine the active state of an OAuth 2.0 token and to determine meta-information about this token. OAuth 2.0 deployments can use this method to convey information about the authorization context of the token from the authorization server to the protected resource.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7662"/>
          <seriesInfo name="DOI" value="10.17487/RFC7662"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC8414">
          <front>
            <title>OAuth 2.0 Authorization Server Metadata</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <date month="June" year="2018"/>
            <abstract>
              <t>This specification defines a metadata format that an OAuth 2.0 client can use to obtain the information needed to interact with an OAuth 2.0 authorization server, including its endpoint locations and authorization server capabilities.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8414"/>
          <seriesInfo name="DOI" value="10.17487/RFC8414"/>
        </reference>
        <reference anchor="RFC8628">
          <front>
            <title>OAuth 2.0 Device Authorization Grant</title>
            <author fullname="W. Denniss" initials="W." surname="Denniss"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="August" year="2019"/>
            <abstract>
              <t>The OAuth 2.0 device authorization grant is designed for Internet- connected devices that either lack a browser to perform a user-agent- based authorization or are input constrained to the extent that requiring the user to input text in order to authenticate during the authorization flow is impractical. It enables OAuth clients on such devices (like smart TVs, media consoles, digital picture frames, and printers) to obtain user authorization to access protected resources by using a user agent on a separate device.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8628"/>
          <seriesInfo name="DOI" value="10.17487/RFC8628"/>
        </reference>
        <reference anchor="RFC9396">
          <front>
            <title>OAuth 2.0 Rich Authorization Requests</title>
            <author fullname="T. Lodderstedt" initials="T." surname="Lodderstedt"/>
            <author fullname="J. Richer" initials="J." surname="Richer"/>
            <author fullname="B. Campbell" initials="B." surname="Campbell"/>
            <date month="May" year="2023"/>
            <abstract>
              <t>This document specifies a new parameter that is used to carry fine-grained authorization data in OAuth messages.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9396"/>
          <seriesInfo name="DOI" value="10.17487/RFC9396"/>
        </reference>
        <reference anchor="AUTHZEN" target="https://openid.github.io/authzen/">
          <front>
            <title>OpenID AuthZEN Authorization API</title>
            <author initials="O." surname="Gazitt" fullname="Omri Gazitt">
              <organization>Aserto</organization>
            </author>
            <author initials="D." surname="Brossard" fullname="David Brossard">
              <organization>Axiomatics</organization>
            </author>
            <author initials="A." surname="Tulshibagwale" fullname="Atul Tulshibagwale">
              <organization>SGNL</organization>
            </author>
            <date year="2024" month="July"/>
          </front>
        </reference>
        <reference anchor="BOXCAR" target="https://openid.github.io/authzen/authorization-api-1_1#name-access-evaluations-api">
          <front>
            <title>OpenID AuthZEN Authorization API</title>
            <author initials="O." surname="Gazitt" fullname="Omri Gazitt">
              <organization>Aserto</organization>
            </author>
            <author initials="D." surname="Brossard" fullname="David Brossard">
              <organization>Axiomatics</organization>
            </author>
            <author initials="A." surname="Tulshibagwale" fullname="Atul Tulshibagwale">
              <organization>SGNL</organization>
            </author>
            <date year="2024" month="July"/>
          </front>
        </reference>
        <reference anchor="OID-CIBA" target="https://openid.net/specs/openid-client-initiated-backchannel-authentication-core-1_0.html">
          <front>
            <title>OpenID Connect Client-Initiated Backchannel Authentication Flow - Core 1.0</title>
            <author initials="G." surname="Fernandez" fullname="G. Fernandez">
              <organization/>
            </author>
            <author initials="F." surname="Walter" fullname="F. Walter">
              <organization/>
            </author>
            <author initials="A." surname="Nennker" fullname="A. Nennker">
              <organization/>
            </author>
            <author initials="D." surname="Tonge" fullname="D. Tonge">
              <organization/>
            </author>
            <author initials="B." surname="Campbell" fullname="B. Campbell">
              <organization/>
            </author>
            <date year="2021" month="September"/>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="XACML" target="https://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-spec-os-en.html">
          <front>
            <title>eXtensible Access Control Markup Language (XACML) Version 3.0, OASIS Standard</title>
            <author initials="E." surname="Rissanen" fullname="Erik Rissanen">
              <organization>Axiomatics AB</organization>
            </author>
            <date year="2013" month="January"/>
          </front>
        </reference>
        <reference anchor="ABAC" target="https://doi.org/10.6028/NIST.SP.800-162">
          <front>
            <title>Guide to Attribute Based Access Control (ABAC) Definition and Considerations - NIST Special Publication 800-162</title>
            <author initials="V." surname="Hu" fullname="Vincent Hu">
              <organization>NIST</organization>
            </author>
            <author initials="D." surname="Ferraiolo" fullname="David Ferraiolo">
              <organization>NIST</organization>
            </author>
            <date year="2014" month="January"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 388?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank members of the OpenID AuthZEN Working Group for their
   valuable feedback during the preparation of this specification. In particular
   our thanks go to Gerry Gebel and Allan Foster.</t>
      <t>We would also like to thank Justin Richer and Pieter Kasselman for their
   guidance on this spec and the overall IETF process.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
