<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.26 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-campbell-oauth-rfc7523redux-00" category="std" consensus="true" submissionType="IETF" updates="7523, 7522, 7521, 9126" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.0 -->
  <front>
    <title abbrev="Client Assertion Auth Redux">Updates to OAuth 2.0 Client Asseertion Authentication and Assertion Based Authorization Grants</title>
    <seriesInfo name="Internet-Draft" value="draft-campbell-oauth-rfc7523redux-00"/>
    <author fullname="Michael B. Jones">
      <organization>Self-Issued Consulting</organization>
      <address>
        <email>michael_b_jones@hotmail.com</email>
        <uri>https://self-issued.info/</uri>
      </address>
    </author>
    <author fullname="Chuck Mortimore">
      <organization>Disney</organization>
      <address>
        <email>charliemortimore@gmail.com</email>
      </address>
    </author>
    <author fullname="Brian Campbell">
      <organization>Ping Identity</organization>
      <address>
        <email>bcampbell@pingidentity.com</email>
      </address>
    </author>
    <date year="2025" month="March" day="21"/>
    <area>Security</area>
    <workgroup>Web Authorization Protocol</workgroup>
    <keyword>OAuth</keyword>
    <keyword>audience</keyword>
    <keyword>JWT</keyword>
    <keyword>client authentication</keyword>
    <abstract>
      <?line 73?>

<t>TODO Abstract</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://bc-pi.github.io/7523redux/draft-campbell-oauth-rfc7523redux.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-campbell-oauth-rfc7523redux/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Web Authorization Protocol Working Group mailing list (<eref target="mailto:oauth@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/oauth/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/oauth/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/bc-pi/7523redux"/>.</t>
    </note>
  </front>
  <middle>
    <?line 78?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>TODO Introduction that mentions <xref target="AUDIENCE-TAKES-SHOW"/> and mayby a bit of context/history and
motivation for this doc that will update/patch <xref target="RFC7523"/>, <xref target="RFC7522"/>, and <xref target="RFC9126"/>.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="the-updates">
      <name>The Updates</name>
      <section anchor="jwt-client-authentication">
        <name>JWT Client Authentication</name>
        <t><tt>aud</tt> must solely contain the authorization server's issuer identifier.</t>
        <t>Explicit typing of the Client Authentication JWT as a good thing to do in general but also allowing for
observerability and controle during the transition period.</t>
      </section>
      <section anchor="saml-client-authentication">
        <name>SAML Client Authentication</name>
        <t>This hasn't been used in practice and this document will say not to ever use it going forward.</t>
      </section>
      <section anchor="assertion-based-authorization-grants">
        <name>Assertion Based Authorization Grants</name>
        <t>Advise client to ensure that the audience of the assertion makes sense with respect to where it’s being sent,
which might Token endpoint URL, Issuer Identifier, SAML Entity ID.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This specification tightens assertion audience handling directives as a mitigation for
potential attacks arising from the exploitation of ambiguities in authorization server
identification allowed by <xref target="RFC7523"/>, <xref target="RFC7522"/>, <xref target="RFC7521"/>, and compounded by <xref target="RFC9126"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="oauth-uri-registry-updates">
        <name>OAuth URI Registry Updates</name>
        <t>IANA is requested to update the "OAuth URI" registry <xref target="IANA.OAuth.Parameters"/> for the following entriest to add [[this specfication]]
as an addtional refernce:</t>
        <ul spacing="normal">
          <li>
            <t><tt>urn:ietf:params:oauth:grant-type:jwt-bearer</tt></t>
          </li>
          <li>
            <t><tt>urn:ietf:params:oauth:client-assertion-type:jwt-bearer</tt></t>
          </li>
          <li>
            <t><tt>urn:ietf:params:oauth:grant-type:saml2-bearer</tt></t>
          </li>
          <li>
            <t><tt>urn:ietf:params:oauth:client-assertion-type:saml2-bearer</tt></t>
          </li>
        </ul>
      </section>
      <section anchor="media-type-registration">
        <name>Media Type Registration</name>
        <t>Registration is requested for the following media type in the IANA
"Media Types" registry <xref target="IANA.MediaTypes"/> in the manner described in <xref target="RFC6838"/>.</t>
        <t>TODO for <tt>application/client-authentication+jwt</tt></t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC7521">
          <front>
            <title>Assertion Framework for OAuth 2.0 Client Authentication and Authorization Grants</title>
            <author fullname="B. Campbell" initials="B." surname="Campbell"/>
            <author fullname="C. Mortimore" initials="C." surname="Mortimore"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="Y. Goland" initials="Y." surname="Goland"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This specification provides a framework for the use of assertions with OAuth 2.0 in the form of a new client authentication mechanism and a new authorization grant type. Mechanisms are specified for transporting assertions during interactions with a token endpoint; general processing rules are also specified.</t>
              <t>The intent of this specification is to provide a common framework for OAuth 2.0 to interwork with other identity systems using assertions and to provide alternative client authentication mechanisms.</t>
              <t>Note that this specification only defines abstract message flows and processing rules. In order to be implementable, companion specifications are necessary to provide the corresponding concrete instantiations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7521"/>
          <seriesInfo name="DOI" value="10.17487/RFC7521"/>
        </reference>
        <reference anchor="RFC7522">
          <front>
            <title>Security Assertion Markup Language (SAML) 2.0 Profile for OAuth 2.0 Client Authentication and Authorization Grants</title>
            <author fullname="B. Campbell" initials="B." surname="Campbell"/>
            <author fullname="C. Mortimore" initials="C." surname="Mortimore"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This specification defines the use of a Security Assertion Markup Language (SAML) 2.0 Bearer Assertion as a means for requesting an OAuth 2.0 access token as well as for client authentication.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7522"/>
          <seriesInfo name="DOI" value="10.17487/RFC7522"/>
        </reference>
        <reference anchor="RFC7523">
          <front>
            <title>JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication and Authorization Grants</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="B. Campbell" initials="B." surname="Campbell"/>
            <author fullname="C. Mortimore" initials="C." surname="Mortimore"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This specification defines the use of a JSON Web Token (JWT) Bearer Token as a means for requesting an OAuth 2.0 access token as well as for client authentication.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7523"/>
          <seriesInfo name="DOI" value="10.17487/RFC7523"/>
        </reference>
        <reference anchor="RFC9126">
          <front>
            <title>OAuth 2.0 Pushed Authorization Requests</title>
            <author fullname="T. Lodderstedt" initials="T." surname="Lodderstedt"/>
            <author fullname="B. Campbell" initials="B." surname="Campbell"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <author fullname="D. Tonge" initials="D." surname="Tonge"/>
            <author fullname="F. Skokan" initials="F." surname="Skokan"/>
            <date month="September" year="2021"/>
            <abstract>
              <t>This document defines the pushed authorization request (PAR) endpoint, which allows clients to push the payload of an OAuth 2.0 authorization request to the authorization server via a direct request and provides them with a request URI that is used as reference to the data in a subsequent call to the authorization endpoint.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9126"/>
          <seriesInfo name="DOI" value="10.17487/RFC9126"/>
        </reference>
        <reference anchor="RFC6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="AUDIENCE-TAKES-SHOW" target="https://talks.secworkshop.events/osw2025/talk/R8D9BS/">
          <front>
            <title>Client Assertions Gone Wrong: When the Audience Takes Over the Show</title>
            <author initials="P." surname="Hosseyni" fullname="Pedram Hosseyni">
              <organization/>
            </author>
            <author initials="T." surname="Würtele" fullname="Tim Würtele">
              <organization/>
            </author>
            <date year="2024" month="March"/>
          </front>
        </reference>
        <reference anchor="IANA.MediaTypes" target="https://www.iana.org/assignments/media-types/">
          <front>
            <title>Media Types</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.OAuth.Parameters" target="https://www.iana.org/assignments/oauth-parameters/">
          <front>
            <title>OAuth Parameters</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC8725">
          <front>
            <title>JSON Web Token Best Current Practices</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="D. Hardt" initials="D." surname="Hardt"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>JSON Web Tokens, also known as JWTs, are URL-safe JSON-based security tokens that contain a set of claims that can be signed and/or encrypted. JWTs are being widely used and deployed as a simple security token format in numerous protocols and applications, both in the area of digital identity and in other application areas. This Best Current Practices document updates RFC 7519 to provide actionable guidance leading to secure implementation and deployment of JWTs.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="225"/>
          <seriesInfo name="RFC" value="8725"/>
          <seriesInfo name="DOI" value="10.17487/RFC8725"/>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="RFC8414">
          <front>
            <title>OAuth 2.0 Authorization Server Metadata</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <date month="June" year="2018"/>
            <abstract>
              <t>This specification defines a metadata format that an OAuth 2.0 client can use to obtain the information needed to interact with an OAuth 2.0 authorization server, including its endpoint locations and authorization server capabilities.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8414"/>
          <seriesInfo name="DOI" value="10.17487/RFC8414"/>
        </reference>
        <reference anchor="I-D.ietf-oauth-rfc7523bis">
          <front>
            <title>JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication and Authorization Grants</title>
            <author fullname="Michael B. Jones" initials="M. B." surname="Jones">
              <organization>Self-Issued Consulting</organization>
            </author>
            <author fullname="Brian Campbell" initials="B." surname="Campbell">
              <organization>Ping Identity</organization>
            </author>
            <author fullname="Chuck Mortimore" initials="C." surname="Mortimore">
              <organization>Disney</organization>
            </author>
            <date day="21" month="February" year="2025"/>
            <abstract>
              <t>   This specification defines the use of a JSON Web Token (JWT) Bearer
   Token as a means for requesting an OAuth 2.0 access token as well as
   for client authentication.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-rfc7523bis-00"/>
        </reference>
      </references>
    </references>
    <?line 152?>

<section numbered="false" anchor="document-history">
      <name>Document History</name>
      <ul empty="true">
        <li>
          <t>[[ to be removed by the RFC Editor before publication as an RFC ]]</t>
        </li>
      </ul>
      <t>draft-campbell-oauth-rfc7523redux-00:</t>
      <ul spacing="normal">
        <li>
          <t>Initial draft proposing a simipler and less distrupitve alternative to <xref target="I-D.ietf-oauth-rfc7523bis"/></t>
        </li>
      </ul>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to acknowledge the following people for their contributions to this document:
John Bradley,
Ralph Bragg,
Joseph Heenan,
Pedram Hosseyni,
Aaron Parecki,
Filip Skokan,
and Tim Würtele.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
