Skip to content

Conversation

@paulbastian
Copy link
Collaborator

Closes #130

@paulbastian paulbastian linked an issue Sep 3, 2025 that may be closed by this pull request
1. The JWT MAY contain other claims. All claims that are not understood by implementations MUST be ignored.

2. The JWT MUST be digitally signed using an asymmetric cryptographic algorithm. The authorization server MUST reject the JWT if it is using a Message Authentication Code (MAC) based algorithm. The authorization server MUST reject JWTs with an invalid signature.
2. The JWT MUST be digitally signed using an asymmetric cryptographic algorithm. The authorization server MUST reject JWTs with an invalid signature.
Copy link
Member

@c2bo c2bo Sep 3, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

That would still not allow MAC I believe?

Something like this is used in JWT RFC:

[...] be digitally signed or integrity protected with a Message Authentication Code (MAC) [...]

Copy link
Collaborator Author

@paulbastian paulbastian Sep 3, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The question is if we want to allow public key derived MACs or MACs in general? The former relies on asymmetric mechanism and would be included imo

Copy link
Member

@c2bo c2bo Sep 3, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I haven't thought too much about this yet, but my gut feeling would be to allow MAC - people need to understand their deployments and requirements, but I could see something like this used in a context where attestation server and AS are operated by the same entity.
I would agree for the PoP (to not allow MACs)

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I agree with @c2bo there are lots of Oauth deployments that use MAC to say secure the AT and I think the Client attestation could be treated somewhat similar in certain deployments but asymmetric is required for the PoP.

Co-authored-by: Christian Bormann <[email protected]>
@paulbastian paulbastian merged commit 11f1b2c into main Sep 12, 2025
2 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Allow MAC as signature algorithms?

4 participants