<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-emelia-oauth-authorization-management-uri-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="oauth-auth-management-uri">OAuth Authorization Management URI</title>
    <seriesInfo name="Internet-Draft" value="draft-emelia-oauth-authorization-management-uri-00"/>
    <author fullname="Emelia Smith">
      <organization/>
      <address>
        <email>emelia@brandedcode.com</email>
        <uri>https://thisismissem.social</uri>
      </address>
    </author>
    <date year="2025" month="November" day="17"/>
    <area>Security</area>
    <workgroup>Web Authorization Protocol</workgroup>
    <keyword>oauth</keyword>
    <abstract>
      <?line 60?>

<t>This specification defines a <tt>authorization_management_uri</tt> property for the OAuth Authorization Server Metadata (<xref target="RFC8414"/>), which allows an authorization server to specify a URI through which the user may manage the authorized clients that have access to their account.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://drafts.thisismissem.social/draft-emelia-oauth-authorization-management-uri.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-emelia-oauth-authorization-management-uri/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Web Authorization Protocol Working Group mailing list (<eref target="mailto:oauth@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/oauth/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/oauth/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ThisIsMissEm/draft-oauth-authorization-management-uri"/>.</t>
    </note>
  </front>
  <middle>
    <?line 64?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>An OAuth 2.0 <xref target="RFC6749"/> client may wish to provide access to a web-based UI at which a user can manage the applications authorized to access their account with the Authorization Server. This is a feature many Authorization Servers already support, however, when you don't have a primary service for the Authorization Server, there may be no clear path for a user to access this management page. This is especially true for decentralized social web applications where the mapping between Authorization Servers and Clients is many to many.</t>
      <t>This specification defines the new property of <tt>authorization_management_uri</tt> for the OAuth Authorization Server Metadata, as defined in <xref target="RFC8414"/>. This URI should point to a website at which the user can manage the authorizations that they have granted with their Authorization Server (for example, to revoke any client or active session, or review the security history of their account).</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="authorization-management-ui">
      <name>Authorization Management UI</name>
      <t>An Authorization Server may provide a user interface through which users can manage the OAuth Clients that have access to their account, such that users can manage their account security with the Authorization Server. This user interface is typically at an URI specific to the Authorization Server implementation, and requires authentication to access.</t>
      <t>This specification does not define specifics of the user interface, however, recommends that the user interface allows a user to manage their account security and authorized clients with the Authorization Server, for example, allowing them to see all authorized clients that have access to their account.</t>
      <t>To allow OAuth Clients to discover the URI of this user interface, this specification defines the new property <tt>authorization_management_uri</tt> for the OAuth Authorization Server Metadata, as defined in <xref target="RFC8414"/>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This specification does not define how the Authorization Server should security the authorization management UI. Authorization Servers should take appropriate measures to ensure that the user is authenticated and authorized to view the authorization management UI.</t>
      <t>The OAuth Client <bcp14>MUST NOT</bcp14> open the <tt>authorization_management_uri</tt> in a webview or similar embedded browser, and instead delegate that to the users' default browser, such that the OAuth Client has no access to the account credentials or to other sensitive data.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="oauth-authorization-server-metadata-registry">
        <name>OAuth Authorization Server Metadata Registry</name>
        <t>The following authorization server metadata value is defined by this specification and registered in the IANA "OAuth Authorization Server Metadata" registry established in OAuth 2.0 Authorization Server Metadata <xref target="RFC8414"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Metadata Name: authorization_management_uri</t>
          </li>
          <li>
            <t>Metadata Description: URI of the authorization management user interface provided by the Authorization Server.</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Specification Document: [draft-emelia-oauth-authorization-management-uri-00]</t>
          </li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC6749">
        <front>
          <title>The OAuth 2.0 Authorization Framework</title>
          <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
          <date month="October" year="2012"/>
          <abstract>
            <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6749"/>
        <seriesInfo name="DOI" value="10.17487/RFC6749"/>
      </reference>
      <reference anchor="RFC8414">
        <front>
          <title>OAuth 2.0 Authorization Server Metadata</title>
          <author fullname="M. Jones" initials="M." surname="Jones"/>
          <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
          <author fullname="J. Bradley" initials="J." surname="Bradley"/>
          <date month="June" year="2018"/>
          <abstract>
            <t>This specification defines a metadata format that an OAuth 2.0 client can use to obtain the information needed to interact with an OAuth 2.0 authorization server, including its endpoint locations and authorization server capabilities.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8414"/>
        <seriesInfo name="DOI" value="10.17487/RFC8414"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
