Discussion
Loading...

Post

Log in
  • About
  • Code of conduct
  • Privacy
  • Users
  • Instances
  • About Bonfire
django
django
@django@social.coop  ·  activity timestamp 2 weeks ago

deep dive into the oauth RFCs this morning ☕

#c2s

  • Copy link
  • Flag this post
  • Block
django
django
@django@social.coop replied  ·  activity timestamp 2 weeks ago

I found and filed a bug in Pleroma Dynamic Client Registration code

https://git.pleroma.social/pleroma/pleroma/-/issues/3390

  • Copy link
  • Flag this comment
  • Block
django
django
@django@social.coop replied  ·  activity timestamp 2 weeks ago

Hacked away at C2S authorization in Fedbox with @mariusor 💪

  • Copy link
  • Flag this comment
  • Block
django
django
@django@social.coop replied  ·  activity timestamp 2 weeks ago

and just discovered @evan lovely oauth decision tree diagram

https://github.com/swicg/activitypub-api/issues/1#issuecomment-3708524521

Oauth decision tree diagram
Oauth decision tree diagram
Oauth decision tree diagram
  • Copy link
  • Flag this comment
  • Block
Evan Prodromou
Evan Prodromou
@evan@cosocial.ca replied  ·  activity timestamp 2 weeks ago

@django the part I'm not sure of is the protected resource metadata. I think that's what you use to use SaaS authorization like Okta or Auth0, or if you use a separate server like Keycloak. So, it doesn't assume that the API server is the authorization server.

  • Copy link
  • Flag this comment
  • Block
django
django
@django@social.coop replied  ·  activity timestamp 2 weeks ago

@evan I see what you mean, I hadn’t considered a fedi server using a saas for auth.

An escrow from the decision tree focusing on discovery of the authorization server
An escrow from the decision tree focusing on discovery of the authorization server
An escrow from the decision tree focusing on discovery of the authorization server
  • Copy link
  • Flag this comment
  • Block
django
django
@django@social.coop replied  ·  activity timestamp 2 weeks ago

@evan there doesn't seem to be anything in rfc8414 that prevents a redirect to a different auth server.

I suppose the response could also be hardcoded remote urls for `registration_endpoint`, `authorization_endpoint` and `token_endpoint`
ditto for the actor.endpoints

  • Copy link
  • Flag this comment
  • Block
django
django
@django@social.coop replied  ·  activity timestamp 2 weeks ago

@evan it seems like the `issuer` field of rfc8414 and the `iss` field of rfc9207 are for this type of use-case

https://datatracker.ietf.org/doc/rfc9207/

#oauth2 #oauth

IETF Datatracker

RFC 9207: OAuth 2.0 Authorization Server Issuer Identification

This document specifies a new parameter called iss. This parameter is used to explicitly include the issuer identifier of the authorization server in the authorization response of an OAuth authorization flow. The iss parameter serves as an effective countermeasure to "mix-up attacks".
  • Copy link
  • Flag this comment
  • Block
django
django
@django@social.coop replied  ·  activity timestamp 2 weeks ago

I found and filed a bug in Pleroma Dynamic Client Registration code

https://git.pleroma.social/pleroma/pleroma/-/issues/3390

  • Copy link
  • Flag this comment
  • Block

bonfire.cafe

A space for Bonfire maintainers and contributors to communicate

bonfire.cafe: About · Code of conduct · Privacy · Users · Instances
Bonfire social · 1.0.1-beta.35 no JS en
Automatic federation enabled
Log in
  • Explore
  • About
  • Members
  • Code of Conduct