Skip to content

Commit 57b1cf3

Browse files
committed
add sentences for freshness / replay protection
1 parent e741ce3 commit 57b1cf3

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

draft-ietf-oauth-attestation-based-client-auth.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -504,7 +504,9 @@ Upon receiving a Client Attestation, the receiving server MUST ensure the follow
504504
7. The signature of the Client Attestation PoP JWT verifies with the public key contained in the `cnf` claim of the Client Attestation JWT.
505505
8. If the server provided a challenge value to the client, the `challenge` claim is present in the Client Attestation PoP JWT and matches the server-provided challenge value.
506506
9. The creation time of the Client Attestation PoP JWT as determined by either the `iat` claim or a server managed timestamp via the challenge claim, is within an acceptable window.
507-
10. The audience claim in the Client Attestation PoP JWT is the issuer identifier URL of the authorization server as described in {{RFC8414}} .
507+
10. The audience claim in the Client Attestation PoP JWT is the issuer identifier URL of the authorization server as described in {{RFC8414}}.
508+
11. The Client Attestation JWT is fresh enough for the policies of the authorization server by checking the `iat` or `exp` claims.
509+
12. Depending on the security requirements of the deployment, additional checks to guarantee replay protection for the Client Attestation PoP JWT might need to be applied (see [](#security-consideration-replay) for more details).
508510

509511
# Implementation Considerations
510512

0 commit comments

Comments
 (0)