Skip to content

Commit 390651e

Browse files
committed
put refresh token section in the right place
it got moved in the merge conflict
1 parent a895f52 commit 390651e

File tree

1 file changed

+11
-10
lines changed

1 file changed

+11
-10
lines changed

draft-ietf-oauth-identity-assertion-authz-grant.md

Lines changed: 11 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -472,6 +472,17 @@ The Resource Authorization Server's token endpoint responds with an OAuth 2.0 To
472472
"scope": "chat.read chat.history"
473473
}
474474

475+
### Refresh Token
476+
477+
The Resource Authorization Server SHOULD NOT return a Refresh Token when an Identity Assertion JWT Authorization is exchanged for an Access Token per {{Section 5.2 of I-D.ietf-oauth-identity-chaining}}.
478+
479+
When the access token has expired, clients SHOULD re-submit the original Identity Assertion JWT Authorization Grant to obtain a new Access Token. The ID-JAG replaces the use Refresh Token for the Resource Authorization Server.
480+
481+
If the ID-JAG has expired, the Client SHOULD request a new ID-JAG from the IdP Authorization Server before presenting it to the Resource Authorization Sever using the original Identity Assertion from the IdP (e.g ID Token)
482+
483+
If the ID Token is expired, the Client MAY use the Refresh Token obtained from the IdP during SSO to obtain a new ID Token which it can exchange for a new ID-JAG. If the Client is unable to obtain a new Identity Assertion with a Refresh Token then it SHOULD re-authenticate the user by redirecting to the IdP.
484+
485+
475486
# Cross-Domain Client ID Handling {#client-id-mapping}
476487

477488
There are three separate OAuth/OpenID Connect/SAML relationships involved in this flow:
@@ -490,16 +501,6 @@ Note: The IdP Authorization Server is also responsible for mapping subject iden
490501

491502
Alternatively, if clients use "Client ID Metadata Document" {{I-D.ietf-oauth-client-id-metadata-document}} as their client identifiers, this acts as a shared global namespace of Client IDs and removes the need for the IdP Authorization Server to maintain a mapping of each client registration.
492503

493-
### Refresh Token
494-
495-
The Resource Authorization Server SHOULD NOT return a Refresh Token when an Identity Assertion JWT Authorization is exchanged for an Access Token per {{Section 5.2 of I-D.ietf-oauth-identity-chaining}}.
496-
497-
When the access token has expired, clients SHOULD re-submit the original Identity Assertion JWT Authorization Grant to obtain a new Access Token. The ID-JAG replaces the use Refresh Token for the Resource Authorization Server.
498-
499-
If the ID-JAG has expired, the Client SHOULD request a new ID-JAG from the IdP Authorization Server before presenting it to the Resource Authorization Sever using the original Identity Assertion from the IdP (e.g ID Token)
500-
501-
If the ID Token is expired, the Client MAY use the Refresh Token obtained from the IdP during SSO to obtain a new ID Token which it can exchange for a new ID-JAG. If the Client is unable to obtain a new Identity Assertion with a Refresh Token then it SHOULD re-authenticate the user by redirecting to the IdP.
502-
503504
# Authorization Server (IdP) Metadata {#idp-metadata}
504505

505506
An IdP can advertise its support for this profile in its OAuth Authorization Server Metadata {{RFC8414}}. Identity and Authorization Chaining Across Domains {{I-D.ietf-oauth-identity-chaining}} defines a new metadata property `identity_chaining_requested_token_types_supported` for this purpose.

0 commit comments

Comments
 (0)