<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-parecki-oauth-jwt-dpop-grant-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="JWT Authorization Grant with DPoP">OAuth 2.0 JWT Authorization Grant with DPoP Binding</title>
    <seriesInfo name="Internet-Draft" value="draft-parecki-oauth-jwt-dpop-grant-00"/>
    <author fullname="Aaron Parecki">
      <organization>Okta</organization>
      <address>
        <email>aaron@parecki.com</email>
      </address>
    </author>
    <date year="2025" month="October" day="18"/>
    <area>Security</area>
    <workgroup>Web Authorization Protocol</workgroup>
    <keyword>jwt</keyword>
    <keyword>dpop</keyword>
    <keyword>authorization</keyword>
    <abstract>
      <?line 46?>

<t>This specification defines a new OAuth 2.0 authorization grant type
that uses a JSON Web Token (JWT) assertion to request an access token
that is bound to a specific key using the Demonstration of Proof-of-Possession (DPoP)
mechanism. This provides a higher level of security than a simple bearer token,
as the client must prove possession of the key to use the access token.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://drafts.aaronpk.com/oauth-jwt-dpop-grant/draft-parecki-oauth-jwt-dpop-grant.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-parecki-oauth-jwt-dpop-grant/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Web Authorization Protocol Working Group mailing list (<eref target="mailto:oauth@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/oauth/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/oauth/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/aaronpk/oauth-jwt-dpop-grant"/>.</t>
    </note>
  </front>
  <middle>
    <?line 54?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication
and Authorization Grants <xref target="RFC7523"/> defines the use of a JWT as an
authorization grant, using the grant type <tt>urn:ietf:params:oauth:grant-type:jwt-bearer</tt>.
This grant type describes the use of a JWT authorization grant as a
bearer token, which is susceptible to reuse by any party that obtains one.</t>
      <t>OAuth 2.0 Demonstration of Proof-of-Possession at the Application
Layer (DPoP) <xref target="RFC9449"/> defines a mechanism to bind access tokens to a
specific cryptographic key. This prevents the token from being used by
any party that does not have access to the private key.</t>
      <t>This specification extends the proof-of-possession concept to the
authorization grant itself. It defines a new grant type,
<tt>urn:ietf:params:oauth:grant-type:jwt-dpop</tt>, for cases where the JWT
assertion is already bound to a DPoP key. To exchange the assertion
for an access token, the client must provide a DPoP proof demonstrating
possession of the key to which the assertion is bound. This makes the
JWT assertion a sender-constrained credential.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<section anchor="terminology">
        <name>Terminology</name>
        <t>This specification uses the terminology of <xref target="RFC6749"/>, <xref target="RFC7521"/>, <xref target="RFC7523"/>, and <xref target="RFC9449"/>.</t>
      </section>
    </section>
    <section anchor="http-parameter-bindings-for-transporting-assertions">
      <name>HTTP Parameter Bindings for Transporting Assertions</name>
      <t>The OAuth Assertion Framework <xref target="RFC7521"/> defines generic HTTP
parameters for transporting assertions (a.k.a. security tokens)
during interactions with a token endpoint.  This section defines
specific parameters and treatments of those parameters for use with
JWT DPoP-Bound Tokens.</t>
      <section anchor="using-dpop-bound-jwts-as-authorization-grants">
        <name>Using DPoP-Bound JWTs as Authorization Grants</name>
        <t>To use a DPoP-bound JWT as an authorization grant, the client uses an
access token request as defined in <xref section="4" sectionFormat="of" target="RFC7521"/>
with the following specific parameter values and encodings.</t>
        <dl>
          <dt><tt>grant_type</tt>:</dt>
          <dd>
            <t><bcp14>REQUIRED</bcp14> - The value <bcp14>MUST</bcp14> be <tt>urn:ietf:params:oauth:grant-type:jwt-dpop</tt></t>
          </dd>
          <dt><tt>assertion</tt>:</dt>
          <dd>
            <t><bcp14>REQUIRED</bcp14> - A single JWT, as defined in <xref target="RFC7519"/>, that contains a
<tt>cnf</tt> claim as described in <xref target="cnf"/>.</t>
          </dd>
          <dt><tt>scope</tt>:</dt>
          <dd>
            <t><bcp14>OPTIONAL</bcp14> - The <tt>scope</tt> parameter may be used, as defined in <xref target="RFC7521"/>,
to indicate the requested scope.</t>
          </dd>
        </dl>
        <t>Authentication of the client is optional, as described in
<xref section="3.2.1" sectionFormat="of" target="RFC6749"/> and consequently, the
<tt>client_id</tt> is only needed when a form of client authentication that
relies on the parameter is used.</t>
        <t>The client <bcp14>MUST</bcp14> also include a DPoP header as defined in <xref section="4" sectionFormat="of" target="RFC9449"/>,
which constitutes a proof of possession for the key to which the assertion is bound.</t>
        <t>The following example demonstrates an access token request with a JWT
as an authorization grant (with extra line breaks for display
purposes only):</t>
        <artwork><![CDATA[
POST /token HTTP/1.1
Host: as.example.com
Content-Type: application/x-www-form-urlencoded
DPoP: eyJ0eXAiOiJkcG9wK2p3dCIsImFsZyI6IkVTMjU2IiwiandrI...

grant_type=urn%3Aietf%3Aparams%3Aoauth%3Agrant-type%3Ajwt-dpop
&assertion=eyJhbGciOiJFUzI1NiIsImtpZCI6IjE2In0.
eyJpc3Mi[...omitted for brevity...].
J9l-ZhwP[...omitted for brevity...]
]]></artwork>
      </section>
    </section>
    <section anchor="cnf">
      <name>JWT Format and Processing Requirements</name>
      <t>The authorization server <bcp14>MUST</bcp14> validate the JWT according to the criteria
below. Application of additional restrictions and policy are at the
discretion of the authorization server.</t>
      <ol spacing="normal" type="1"><li>
          <t>The authorization server <bcp14>MUST</bcp14> validate the DPoP proof in the DPoP
header as described in <xref section="4" sectionFormat="of" target="RFC9449"/>. The <tt>htm</tt> claim
of the DPoP JWT <bcp14>MUST</bcp14> be <tt>POST</tt>, and the <tt>htu</tt> claim must match
the token endpoint URL.</t>
        </li>
        <li>
          <t>The authorization server <bcp14>MUST</bcp14> validate the JWT assertion according
to the processing rules in <xref section="3.1" sectionFormat="of" target="RFC7523"/> and <xref section="4" sectionFormat="of" target="I-D.ietf-oauth-rfc7523bis"/>.</t>
        </li>
        <li>
          <t>The authorization server <bcp14>MUST</bcp14> verify that the JWT assertion contains
a <tt>cnf</tt> claim as defined in <xref target="RFC7800"/>. This <tt>cnf</tt>
claim <bcp14>MUST</bcp14> contain a <tt>jwk</tt> property representing a public key.</t>
        </li>
        <li>
          <t>The authorization server <bcp14>MUST</bcp14> verify that the public key in the
<tt>jwk</tt> property of the <tt>cnf</tt> claim of the JWT assertion exactly
matches the public key in the <tt>jwk</tt> header of the DPoP proof.</t>
        </li>
      </ol>
      <t>If any of these validation steps fail, the authorization server <bcp14>MUST</bcp14>
return an <tt>invalid_grant</tt> error response.</t>
      <section anchor="access-token-response">
        <name>Access Token Response</name>
        <t>If the request is valid, the authorization server issues an access
token. The issued access token <bcp14>SHOULD</bcp14> also be DPoP-bound to the same
key from the DPoP proof. In this case, the <tt>token_type</tt> of the access
token <bcp14>MUST</bcp14> be <tt>DPoP</tt>, and the response <bcp14>MUST</bcp14> include a <tt>token_type</tt>
parameter with the value <tt>DPoP</tt>. If a bearer token is issued, the
<tt>token_type</tt> <bcp14>MUST</bcp14> be <tt>Bearer</tt>.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations described within the following
specifications are all applicable to this document:
"Assertion Framework for OAuth 2.0 Client Authentication and Authorization Grants" <xref target="RFC7521"/>,
"JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication and Authorization Grants" <xref target="RFC7523"/>,
"Updates to OAuth 2.0 JSON Web Token (JWT) Client Authentication and Assertion-Based Authorization Grants" <xref target="I-D.ietf-oauth-rfc7523bis"/>,
"OAuth 2.0 Demonstrating Proof of Possession (DPoP)" <xref target="RFC9449"/>,
"The OAuth 2.0 Authorization Framework" <xref target="RFC6749"/>,
and "JSON Web Token (JWT)" <xref target="RFC7519"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="oauth-uri-registration">
        <name>OAuth URI Registration</name>
        <t>This specification requests registration of the following value in the
"OAuth URI" registry established by <xref target="RFC6755"/>.</t>
        <ul spacing="normal">
          <li>
            <t>URN: <tt>urn:ietf:params:oauth:grant-type:jwt-dpop</tt></t>
          </li>
          <li>
            <t>Common Name: DPoP-bound JWT Authorization Grant</t>
          </li>
          <li>
            <t>Change Controller: IESG</t>
          </li>
          <li>
            <t>Specification Document(s): this document</t>
          </li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC6755">
        <front>
          <title>An IETF URN Sub-Namespace for OAuth</title>
          <author fullname="B. Campbell" initials="B." surname="Campbell"/>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
          <date month="October" year="2012"/>
          <abstract>
            <t>This document establishes an IETF URN Sub-namespace for use with OAuth-related specifications. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6755"/>
        <seriesInfo name="DOI" value="10.17487/RFC6755"/>
      </reference>
      <reference anchor="RFC6749">
        <front>
          <title>The OAuth 2.0 Authorization Framework</title>
          <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
          <date month="October" year="2012"/>
          <abstract>
            <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6749"/>
        <seriesInfo name="DOI" value="10.17487/RFC6749"/>
      </reference>
      <reference anchor="RFC7519">
        <front>
          <title>JSON Web Token (JWT)</title>
          <author fullname="M. Jones" initials="M." surname="Jones"/>
          <author fullname="J. Bradley" initials="J." surname="Bradley"/>
          <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
          <date month="May" year="2015"/>
          <abstract>
            <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7519"/>
        <seriesInfo name="DOI" value="10.17487/RFC7519"/>
      </reference>
      <reference anchor="RFC7521">
        <front>
          <title>Assertion Framework for OAuth 2.0 Client Authentication and Authorization Grants</title>
          <author fullname="B. Campbell" initials="B." surname="Campbell"/>
          <author fullname="C. Mortimore" initials="C." surname="Mortimore"/>
          <author fullname="M. Jones" initials="M." surname="Jones"/>
          <author fullname="Y. Goland" initials="Y." surname="Goland"/>
          <date month="May" year="2015"/>
          <abstract>
            <t>This specification provides a framework for the use of assertions with OAuth 2.0 in the form of a new client authentication mechanism and a new authorization grant type. Mechanisms are specified for transporting assertions during interactions with a token endpoint; general processing rules are also specified.</t>
            <t>The intent of this specification is to provide a common framework for OAuth 2.0 to interwork with other identity systems using assertions and to provide alternative client authentication mechanisms.</t>
            <t>Note that this specification only defines abstract message flows and processing rules. In order to be implementable, companion specifications are necessary to provide the corresponding concrete instantiations.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7521"/>
        <seriesInfo name="DOI" value="10.17487/RFC7521"/>
      </reference>
      <reference anchor="RFC7523">
        <front>
          <title>JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication and Authorization Grants</title>
          <author fullname="M. Jones" initials="M." surname="Jones"/>
          <author fullname="B. Campbell" initials="B." surname="Campbell"/>
          <author fullname="C. Mortimore" initials="C." surname="Mortimore"/>
          <date month="May" year="2015"/>
          <abstract>
            <t>This specification defines the use of a JSON Web Token (JWT) Bearer Token as a means for requesting an OAuth 2.0 access token as well as for client authentication.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7523"/>
        <seriesInfo name="DOI" value="10.17487/RFC7523"/>
      </reference>
      <reference anchor="RFC7800">
        <front>
          <title>Proof-of-Possession Key Semantics for JSON Web Tokens (JWTs)</title>
          <author fullname="M. Jones" initials="M." surname="Jones"/>
          <author fullname="J. Bradley" initials="J." surname="Bradley"/>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
          <date month="April" year="2016"/>
          <abstract>
            <t>This specification describes how to declare in a JSON Web Token (JWT) that the presenter of the JWT possesses a particular proof-of- possession key and how the recipient can cryptographically confirm proof of possession of the key by the presenter. Being able to prove possession of a key is also sometimes described as the presenter being a holder-of-key.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7800"/>
        <seriesInfo name="DOI" value="10.17487/RFC7800"/>
      </reference>
      <reference anchor="I-D.ietf-oauth-rfc7523bis">
        <front>
          <title>Updates to OAuth 2.0 JSON Web Token (JWT) Client Authentication and Assertion-Based Authorization Grants</title>
          <author fullname="Michael B. Jones" initials="M. B." surname="Jones">
            <organization>Self-Issued Consulting</organization>
          </author>
          <author fullname="Brian Campbell" initials="B." surname="Campbell">
            <organization>Ping Identity</organization>
          </author>
          <author fullname="Chuck Mortimore" initials="C." surname="Mortimore">
            <organization>Disney</organization>
          </author>
          <author fullname="Filip Skokan" initials="F." surname="Skokan">
            <organization>Okta</organization>
          </author>
          <date day="7" month="October" year="2025"/>
          <abstract>
            <t>   This specification updates the requirements for audience values in
   OAuth 2.0 Client Assertion Authentication and Assertion-based
   Authorization Grants to address a security vulnerability identified
   in the previous requirements for those audience values in multiple
   OAuth 2.0 specifications.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-rfc7523bis-03"/>
      </reference>
      <reference anchor="RFC9449">
        <front>
          <title>OAuth 2.0 Demonstrating Proof of Possession (DPoP)</title>
          <author fullname="D. Fett" initials="D." surname="Fett"/>
          <author fullname="B. Campbell" initials="B." surname="Campbell"/>
          <author fullname="J. Bradley" initials="J." surname="Bradley"/>
          <author fullname="T. Lodderstedt" initials="T." surname="Lodderstedt"/>
          <author fullname="M. Jones" initials="M." surname="Jones"/>
          <author fullname="D. Waite" initials="D." surname="Waite"/>
          <date month="September" year="2023"/>
          <abstract>
            <t>This document describes a mechanism for sender-constraining OAuth 2.0 tokens via a proof-of-possession mechanism on the application level. This mechanism allows for the detection of replay attacks with access and refresh tokens.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9449"/>
        <seriesInfo name="DOI" value="10.17487/RFC9449"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
    <?line 207?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
