<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-parecki-oauth-client-id-prefix-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.29.0 -->
  <front>
    <title abbrev="Client ID Prefix">OAuth 2.0 Client ID Prefix</title>
    <seriesInfo name="Internet-Draft" value="draft-parecki-oauth-client-id-prefix-00"/>
    <author fullname="Aaron Parecki">
      <organization>Okta</organization>
      <address>
        <email>aaron@parecki.com</email>
      </address>
    </author>
    <author fullname="Daniel Fett">
      <organization>Authlete</organization>
      <address>
        <email>mail@danielfett.de</email>
      </address>
    </author>
    <author fullname="Joseph Heenan">
      <organization>Authlete</organization>
      <address>
        <email>joseph@heenan.me.uk</email>
      </address>
    </author>
    <date year="2025" month="July" day="04"/>
    <area>Security</area>
    <workgroup>Web Authorization Protocol</workgroup>
    <keyword>oauth</keyword>
    <abstract>
      <?line 86?>

<t>This specification defines the concept of a Client Identifier Prefix to enable Authorization Servers and Clients to use more than one mechanism to obtain and validate Client metadata.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://drafts.aaronpk.com/oauth-client-id-prefix/draft-parecki-oauth-client-id-prefix.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-parecki-oauth-client-id-prefix/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Web Authorization Protocol Working Group mailing list (<eref target="mailto:oauth@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/oauth/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/oauth/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/aaronpk/oauth-client-id-prefix"/>.</t>
    </note>
  </front>
  <middle>
    <?line 90?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>A Client Identifier is used by an OAuth 2.0 Client to identify itself to an Authorization Server. The Client Identifier is used in the Authorization Request and various other places throughout OAuth flows. In ecosystems where more than one method of obtaining and validating Client metadata is used, it is necessary to indicate unambiguously which method is used. This specification defines a structure for Client Identifiers that includes a prefix indicating the Client Identifier Prefix.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="client-identifier-prefix">
      <name>Client Identifier Prefix</name>
      <t>This specification defines the concept of a Client Identifier Prefix that indicates how an Authorization Server is supposed to interpret the Client Identifier and associated data in the process of Client identification, authentication, and authorization. The Client Identifier Prefix enables deployments of this specification to use different mechanisms to obtain and validate metadata of the Client beyond the scope of <xref target="RFC6749"/>.</t>
      <t>The Client Identifier Prefix is a string that <bcp14>MAY</bcp14> be communicated by the Client in a prefix within the <tt>client_id</tt> parameter in the Authorization Request. A fallback to pre-registered Clients as in <xref target="RFC6749"/> or a default Client Identifier Prefix is in place as a default mechanism in case no Client Identifier Prefix was provided. A certain Client Identifier Prefix may require the Client to sign the Authorization Request as means of authentication and/or pass additional parameters and require the Authorization Server to process them.</t>
      <section anchor="syntax">
        <name>Syntax</name>
        <t>In the <tt>client_id</tt> Authorization Request parameter and other places where the Client Identifier is used, the Client Identifier Prefixes are prefixed to the usual Client Identifier, separated by a <tt>:</tt> (colon) character:</t>
        <artwork><![CDATA[
<client_id_prefix>:<orig_client_id>
]]></artwork>
        <t>Here, <tt>&lt;client_id_prefix&gt;</tt> is the Client Identifier Prefix and <tt>&lt;orig_client_id&gt;</tt> is an identifier for the Client within the namespace of that prefix. See <xref target="client_identifier_prefixes"/> for Client Identifier Prefixes defined by this specification.</t>
        <t>Authorization Servers <bcp14>MUST</bcp14> use the presence of a <tt>:</tt> (colon) character and the content preceding it to determine whether a Client Identifier Prefix is used. If a <tt>:</tt> character is present, and the content preceding it is a recognized and supported Client Identifier Prefix value, the Authorization Server <bcp14>MUST</bcp14> interpret the Client Identifier according to the given Client Identifier Prefix. The Client Identifier Prefix is defined as the string before the (first) <tt>:</tt> character. If the Authorization Server does not support the Client Identifier Prefix, the Authorization Server <bcp14>MUST</bcp14> refuse the request.</t>
        <t>For example, an Authorization Request might contain <tt>client_id=client_attestation:example-client</tt> to indicate that the <tt>client_attestation</tt> Client Identifier Prefix is to be used and that within this prefix, the Client can be identified by the string <tt>example-client</tt>.</t>
        <t>Note that the Client may need to determine which Client Identifier Prefixes the Authorization Server supports prior to sending the Authorization Request in order to ensure the client's preferred prefix is supported.</t>
      </section>
      <section anchor="fallback-for-unrecognized-client-id-prefixes">
        <name>Fallback for Unrecognized Client ID Prefixes</name>
        <t>If a <tt>:</tt> character is not present in the Client Identifier, the Authorization Server <bcp14>MUST</bcp14> treat the Client Identifier as referencing a pre-registered client. This is equivalent to the <xref target="RFC6749"/> default behavior, i.e., the Client Identifier needs to be known to the Authorization Server in advance of the Authorization Request. The Client metadata is pre-registered using <xref target="RFC7591"/> or through out-of-band mechanisms.</t>
        <t>For example, if an Authorization Request contains <tt>client_id=example-client</tt>, the Authorization Server would interpret the Client Identifier as referring to a pre-registered client.</t>
        <t>If a <tt>:</tt> character is present in the Client Identifier but the value preceding it is not a recognized and supported Client Identifier Prefix value, the Authorization Server <bcp14>MAY</bcp14> treat the Client Identifier as having a default Client Identifier Prefix.</t>
        <t>For example, an Authorization Request containing a <tt>client_id</tt> value of <tt>https://client.example.com/metadata.json</tt> could be interpreted by the Authorization Server as referring to a Client ID Metadata Document <xref target="I-D.draft-parecki-oauth-client-id-metadata-document"/>, with the default Client Identifier Prefix being <tt>client-id-metadata-document</tt>.</t>
        <t>From this definition, it follows that pre-registered clients <bcp14>MUST NOT</bcp14> contain a <tt>:</tt> character preceded immediately by a supported Client Identifier Prefix value in the first part of their Client Identifier.</t>
        <section anchor="example">
          <name>Example</name>
          <t>Deployments that use <tt>https</tt> URLs as client IDs and that have only one way to resolve client metadata from the URL, <bcp14>MAY</bcp14> use only the full https URL as the client ID. If there is only one way to resolve client metadata then there is no ambiguity in which metadata retrieval method to use, and are not susceptible to client identifier mixup attacks as described in <xref target="client-id-mixups"/>.</t>
          <t>For example, an authorization server using only the Client ID Metadata Document <xref target="I-D.draft-parecki-oauth-client-id-metadata-document"/> method to retrieve client metadata <bcp14>MAY</bcp14> accept client IDs such as:</t>
          <artwork><![CDATA[
https://client.example.com/metadata.json
]]></artwork>
          <t>This results in this non-normative example of an authorization request:</t>
          <artwork><![CDATA[
GET /authorize?
  response_type=code
  &client_id=https%3A%2F%2Fclient.example.org%2Fmetadata.json
  &redirect_uri=https%3A%2F%2Fclient.example.org%2Fcallback
  &code_challenge=GdE4nqBrwRxQfN2Y8fq3rrYk_kkpwg6tQ74J94-2nHw
  &code_challenge_method=S256
  &scope=write
]]></artwork>
        </section>
      </section>
      <section anchor="client_identifier_prefixes">
        <name>Defined Client Identifier Prefixes</name>
        <t>This specification defines the following Client Identifier Prefixes, followed by the examples where applicable:</t>
        <ul spacing="normal">
          <li>
            <t><tt>redirect_uri</tt>: This value indicates that the Client Identifier (without the prefix <tt>redirect_uri:</tt>) is the Client's Redirect URI (or Response URI when Response Mode <tt>direct_post</tt> is used). The Authorization Request <bcp14>MUST NOT</bcp14> be signed. The Client <bcp14>MAY</bcp14> omit the <tt>redirect_uri</tt> Authorization Request parameter. Example Client Identifier: <tt>redirect_uri:https%3A%2F%2Fclient.example.org%2Fcb</tt>.</t>
          </li>
          <li>
            <t><tt>client_id_metadata_document</tt>: This value indicates that the Client Identifer (without the prefix <tt>client_id_metadata_document:</tt>) is the client's Client ID Metadata Document <xref target="I-D.draft-parecki-oauth-client-id-metadata-document"/>.</t>
          </li>
          <li>
            <t><tt>https</tt>: This Client Identifier Prefix <bcp14>MUST NOT</bcp14> be registered.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="example-1">
      <name>Example</name>
      <t>The following is a non-normative example of an authorization request with the <tt>client_id_metadata_document</tt> Client ID Prefix:</t>
      <artwork><![CDATA[
GET /authorize?
  response_type=code
  &client_id=client_id_metadata_document:https%3A%2F%2Fclient.example.org%2Fmetadata.json
  &redirect_uri=https%3A%2F%2Fclient.example.org%2Fredirect
  &code_challenge=GdE4nqBrwRxQfN2Y8fq3rrYk_kkpwg6tQ74J94-2nHw
  &code_challenge_method=S256
  &scope=write
]]></artwork>
    </section>
    <section anchor="as-metadata">
      <name>Authorization Server Metadata</name>
      <t>Authorization servers that publish Authorization Server Metadata (<xref target="RFC8414"/>) <bcp14>MUST</bcp14> include the following properties to indicate support for client ID prefixes as described in this specification.</t>
      <dl>
        <dt><tt>client_id_prefixes_supported</tt>:</dt>
        <dd>
          <t><bcp14>REQUIRED</bcp14>. A JSON array of strings indicating the registered client ID prefixes supported by this authorization server.</t>
        </dd>
      </dl>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="client-id-mixups">
        <name>Client Identifier Mixups</name>
        <t>Confusing Clients using a Client Identifier Prefix with those using none can lead to various mixup attacks. Therefore, Authorization Servers <bcp14>MUST</bcp14> always use the full Client Identifier, including the prefix if provided, within the context of the Authorization Server or its responses to identify the client. This refers in particular to places where the Client Identifier is used in <xref target="RFC6749"/> as well as in any artifacts such as the <tt>aud</tt> claim of JWT access tokens <xref target="RFC9068"/>.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="oauth-authorization-server-metadata-registry">
        <name>OAuth Authorization Server Metadata Registry</name>
        <t>The following authorization server metadata value is defined by this specification and (TBD) registered in the IANA "OAuth Authorization Server Metadata" registry established in OAuth 2.0 Authorization Server Metadata <xref target="RFC8414"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Metadata Name: <tt>client_id_prefixes_supported</tt></t>
          </li>
          <li>
            <t>Metadata Description: A JSON array of strings indicating the client ID prefixes supported by the authorization server.</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Specification Document: <xref target="as-metadata"/> of [[ this specification ]]</t>
          </li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="RFC8414">
          <front>
            <title>OAuth 2.0 Authorization Server Metadata</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <date month="June" year="2018"/>
            <abstract>
              <t>This specification defines a metadata format that an OAuth 2.0 client can use to obtain the information needed to interact with an OAuth 2.0 authorization server, including its endpoint locations and authorization server capabilities.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8414"/>
          <seriesInfo name="DOI" value="10.17487/RFC8414"/>
        </reference>
        <reference anchor="DID-Core" target="https://www.w3.org/TR/did-core/">
          <front>
            <title>DID Core</title>
            <author>
              <organization/>
            </author>
            <date year="2022" month="July" day="19"/>
          </front>
        </reference>
        <reference anchor="OpenID.Federation" target="https://openid.net/specs/openid-federation-1_0.html">
          <front>
            <title>OpenID Federation 1.0</title>
            <author initials="R." surname="Hedberg" fullname="R. Hedberg">
              <organization>independent</organization>
            </author>
            <author initials="M.B." surname="Jones" fullname="M.B. Jones">
              <organization>Self-Issued Consulting</organization>
            </author>
            <author initials="A.Å." surname="Solberg" fullname="A.Å. Solberg">
              <organization>Sikt</organization>
            </author>
            <author initials="J." surname="Bradley" fullname="J. Bradley">
              <organization>Yubico</organization>
            </author>
            <author initials="G. D." surname="Marco" fullname="G. De Marco">
              <organization>independent</organization>
            </author>
            <author initials="V." surname="Dzhuvinov" fullname="V. Dzhuvinov">
              <organization>Connect2id</organization>
            </author>
            <date year="2024" month="May" day="17"/>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7591">
          <front>
            <title>OAuth 2.0 Dynamic Client Registration Protocol</title>
            <author fullname="J. Richer" initials="J." role="editor" surname="Richer"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="M. Machulak" initials="M." surname="Machulak"/>
            <author fullname="P. Hunt" initials="P." surname="Hunt"/>
            <date month="July" year="2015"/>
            <abstract>
              <t>This specification defines mechanisms for dynamically registering OAuth 2.0 clients with authorization servers. Registration requests send a set of desired client metadata values to the authorization server. The resulting registration responses return a client identifier to use at the authorization server and the client metadata values registered for the client. The client can then use this registration information to communicate with the authorization server using the OAuth 2.0 protocol. This specification also defines a set of common client metadata fields and values for clients to use during registration.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7591"/>
          <seriesInfo name="DOI" value="10.17487/RFC7591"/>
        </reference>
        <reference anchor="RFC9068">
          <front>
            <title>JSON Web Token (JWT) Profile for OAuth 2.0 Access Tokens</title>
            <author fullname="V. Bertocci" initials="V." surname="Bertocci"/>
            <date month="October" year="2021"/>
            <abstract>
              <t>This specification defines a profile for issuing OAuth 2.0 access tokens in JSON Web Token (JWT) format. Authorization servers and resource servers from different vendors can leverage this profile to issue and consume access tokens in an interoperable manner.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9068"/>
          <seriesInfo name="DOI" value="10.17487/RFC9068"/>
        </reference>
        <reference anchor="I-D.draft-parecki-oauth-client-id-metadata-document">
          <front>
            <title>OAuth Client ID Metadata Document</title>
            <author fullname="Aaron Parecki" initials="A." surname="Parecki">
              <organization>Okta</organization>
            </author>
            <author fullname="Emelia Smith" initials="E." surname="Smith">
         </author>
            <date day="9" month="January" year="2025"/>
            <abstract>
              <t>   This specification defines a mechanism through which an OAuth client
   can identify itself to authorization servers, without prior dynamic
   client registration or other existing registration.  This is through
   the usage of a URL as a client_id in an OAuth flow, where the URL
   refers to a document containing the necessary client metadata,
   enabling the authorization server to fetch the metadata about the
   client as needed.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-parecki-oauth-client-id-metadata-document-02"/>
        </reference>
        <reference anchor="OpenID" target="https://openid.net/specs/openid-connect-core-1_0.html">
          <front>
            <title>OpenID Connect Core 1.0</title>
            <author initials="N." surname="Sakimura" fullname="N. Sakimura">
              <organization>NAT.Consulting</organization>
            </author>
            <author initials="J." surname="Bradley" fullname="J. Bradley">
              <organization>Yubico</organization>
            </author>
            <author initials="M." surname="Jones" fullname="M. Jones">
              <organization>Self-Issued Consulting</organization>
            </author>
            <author initials="B. de" surname="Medeiros" fullname="B. de Medeiros">
              <organization>Google</organization>
            </author>
            <author initials="C." surname="Mortimore" fullname="C. Mortimore">
              <organization>Disney</organization>
            </author>
            <date year="2023" month="December" day="15"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 223?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank the following people for their contributions and
reviews of this specification:</t>
      <t>Brian Campbell, Emelia Smith.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
