-
Notifications
You must be signed in to change notification settings - Fork 4
Description
Issue #79 moved the request_object_signing_alg response from optional to mandatory in order to explicitly inform the ADR what signing algorithm is to be used for request objects.
Further work is required to determine alignment to upstream standards and ensure appropriateness for each of the different negotiation types.
OpenID Connect Dynamic Client Registration 1.0 states the following:
request_object_signing_alg
OPTIONAL. JWS [JWS] alg algorithm [JWA] that MUST be used for signing Request Objects sent to the OP. All Request Objects from this Client MUST be rejected, if not signed with this algorithm. Request Objects are described in Section 6.1 of OpenID Connect Core 1.0 [OpenID.Core]. This algorithm MUST be used both when the Request Object is passed by value (using the request parameter) and when it is passed by reference (using the request_uri parameter). Servers SHOULD support RS256. The value none MAY be used. The default, if omitted, is that any algorithm supported by the OP and the RP MAY be used.
This last sentence:
The default, if omitted, is that any algorithm supported by the OP and the RP MAY be used.
raises the question, is the behaviour defined by issuer #79 appropriate?
The following questions needs to be discussed and outcomes defined to ensure signing negotiation is well defined
- Should we be aligning to the OpenID Connect Dynamic Client Registration 1.0 specification?
- Should this behaviour align for the field
token_endpoint_auth_signing_alg? - How does the negotiation pattern differ for
id_token_signed_response_alg,id_token_encrypted_response_algandid_token_encrypted_response_encand why?
This issue has been raised to encourage collaboration and collate feedback.