Internet DRAFT - draft-richer-oauth-json-request

draft-richer-oauth-json-request







Web Authorization Protocol                                     J. Richer
Internet-Draft                                       Bespoke Engineering
Intended status: Standards Track                             9 July 2020
Expires: 10 January 2021


                         OAuth 2.0 JSON Request
                   draft-richer-oauth-json-request-00

Abstract

   This document specifies a method for sending requests to OAuth
   endpoints as a JSON document instead of a form-encoded document.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on 10 January 2021.

Copyright Notice

   Copyright (c) 2020 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents (https://trustee.ietf.org/
   license-info) in effect on the date of publication of this document.
   Please review these documents carefully, as they describe your rights
   and restrictions with respect to this document.  Code Components
   extracted from this document must include Simplified BSD License text
   as described in Section 4.e of the Trust Legal Provisions and are
   provided without warranty as described in the Simplified BSD License.







Richer                   Expires 10 January 2021                [Page 1]

Internet-Draft             oauth-json-request                  July 2020


Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
     1.1.  Conventions and Terminology . . . . . . . . . . . . . . .   2
   2.  Formatting a request as JSON  . . . . . . . . . . . . . . . .   3
     2.1.  Token Endpoint Parameters . . . . . . . . . . . . . . . .   3
   3.  Sending a request as JSON . . . . . . . . . . . . . . . . . .   3
   4.  Examples  . . . . . . . . . . . . . . . . . . . . . . . . . .   3
   5.  Metadata  . . . . . . . . . . . . . . . . . . . . . . . . . .   6
   6.  Security Considerations . . . . . . . . . . . . . . . . . . .   6
   7.  Privacy Considerations  . . . . . . . . . . . . . . . . . . .   6
   8.  Acknowledgements  . . . . . . . . . . . . . . . . . . . . . .   7
   9.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .   7
   10. Normative References  . . . . . . . . . . . . . . . . . . . .   7
   11. Informative References  . . . . . . . . . . . . . . . . . . .   7
   Appendix A.  Document History . . . . . . . . . . . . . . . . . .   8
   Author's Address  . . . . . . . . . . . . . . . . . . . . . . . .   8

1.  Introduction

   The OAuth 2.0 authorization framework [RFC6749] uses form encoding
   for requests to the token endpoint, and several extensions including
   [RFC7009] and [RFC7662] also use this format for their own endpoints.
   Additionally, due to this choice, several parameters such as the
   "scope" parameter have a special serialization defined in the
   protocol to allow it to be expressed within the string-based form
   encoding format.

   This draft defines a method for encoding all inputs to form-based
   endpoints in the OAuth 2 protocol as JSON [RFC8259].

1.1.  Conventions and Terminology

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in BCP
   14 [RFC2119] [RFC8174] when, and only when, they appear in all
   capitals, as shown here.

   This specification uses the terms "access token", "refresh token",
   "authorization server", "resource server", "authorization endpoint",
   "authorization request", "authorization response", "token endpoint",
   "grant type", "access token request", "access token response", and
   "client" defined by The OAuth 2.0 Authorization Framework [RFC6749].







Richer                   Expires 10 January 2021                [Page 2]

Internet-Draft             oauth-json-request                  July 2020


2.  Formatting a request as JSON

   The sender creates a JSON object to contain all parameters to the
   target endpoint.  For each parameter to be sent, the parameter name
   is used as the object member name within that object.  The value of
   each parameter is encoded in JSON dependent on which parameter is
   being sent.

   Parameters that have a specific JSON encoding will have an indication
   of the defining specification in the "json_encoding" column of the
   IANA parameters registry table.  If any element does not have a
   specific encoding, its value MUST be the string value that would have
   been used without this extension, without form-encoding.

2.1.  Token Endpoint Parameters

   JSON encoding of token endpoint parameters are defined as follows.

   "scope":  An array containing individual scope values, represented as
      strings.

   "authorization_details":  An array of JSON objects as defined by
      "draft-ietf-oauth-rar", without additional string encoding.

3.  Sending a request as JSON

   The requester sets an HTTP "Content-Type" header indicating that the
   content is in JSON.  The entity body MUST be the serialization of the
   JSON object as defined in Section 2.

   If the request is rejected with "415 Unsupported Media Type", the
   requester MAY repeat the request using form encoding instead.

4.  Examples

   This example shows a request to the token endpoint for the
   authorization code grant type.

   POST /token HTTP/1.1
   Host: as.example.com
   Authorization: Basic czZCaGRSa3F0MzpnWDFmQmF0M2JW
   Content-Type: application/json

   {
       "grant_type": "authorization_code",
       "code": "SplxlOBeZQQYbYS6WxSbIA",
       "redirect_uri": "https://client.example.com/cb"
   }



Richer                   Expires 10 January 2021                [Page 3]

Internet-Draft             oauth-json-request                  July 2020


   This example shows a request to the token endpoint with a refresh
   token, the client's credentials, and a scope parameter.

   POST /token HTTP/1.1
   Host: as.example.com
   Content-Type: application/json

   {
       "grant_type": "refresh_token",
       "refresh_token": "tGzv3JOkF0XG5Qx2TlKWIA",
       "client_id": "s6BhdRkqt3",
       "client_secret": "7Fjfp0ZBr1KtDRbnfVdmIw",
       "scope": [ "read", "write" ]
   }

   This example shows a rich authorization request "draft-ietf-oauth-
   rar" to the token endpoint.


































Richer                   Expires 10 January 2021                [Page 4]

Internet-Draft             oauth-json-request                  July 2020


   POST /token HTTP/1.1
   Host: as.example.com
   Authorization: Basic czZCaGRSa3F0MzpnWDFmQmF0M2JW
   Content-Type: application/json

   {
       "grant_type": "authorization_code",
       "code": "SplxlOBeZQQYbYS6WxSbIA",
       "redirect_uri": "https://client.example.com/cb",
       "authorization_details": [
         {
            "type": "account_information",
            "actions": [
               "list_accounts",
               "read_balances",
               "read_transactions"
            ],
            "locations": [
               "https://example.com/accounts"
            ]
         },
         {
            "type": "payment_initiation",
            "actions": [
               "initiate",
               "status",
               "cancel"
            ],
            "locations": [
               "https://example.com/payments"
            ],
            "instructedAmount": {
               "currency": "EUR",
               "amount": "123.50"
            },
            "creditorName": "Merchant123",
            "creditorAccount": {
               "iban": "DE02100100109307118603"
            },
            "remittanceInformationUnstructured": "Ref Number Merchant"
         }
      ]
   }

   This example shows a request to the introspection endpoint as defined
   in [RFC7662].





Richer                   Expires 10 January 2021                [Page 5]

Internet-Draft             oauth-json-request                  July 2020


   POST /introspect HTTP/1.1
   Host: as.example.com
   Content-Type: application/json

   {
       "token": "2YotnFZFEjr1zCsicMWpAA"
   }

   This example shows a request to the revocation endpoint as defined in
   [RFC7009].

   POST /revoke HTTP/1.1
   Host: as.example.com
   Content-Type: application/json

   {
       "token": "45ghiukldjahdnhzdauz",
       "token_type_hint": "refresh_token"
   }

   This example shows a request to the device authorization endpoint as
   defined in [RFC8628].

   POST /device_authorization HTTP/1.1
   Host: as.example.com
   Content-Type: application/json

   {
       "client_id": "1406020730",
       "scope": [ "example_scope" ]
   }

5.  Metadata

   The AS advertises support for JSON encoding using the metadata
   parameter "json_input_supported" of type boolean.  Absence of this
   parameter indicates absence of support.

6.  Security Considerations

   As this specification provides an alternate encoding for existing
   parameters, there are no additional security considerations.

7.  Privacy Considerations

   As this specification provides an alternate encoding for existing
   parameters, there are no additional privacy considerations.




Richer                   Expires 10 January 2021                [Page 6]

Internet-Draft             oauth-json-request                  July 2020


8.  Acknowledgements

   The authors would like to thank the engineering team of Authlete for
   feedback and support.

9.  IANA Considerations

   TBD

   *  "json_input_supported" as metadata parameter

   *  "json_encoding" as column in OAuth parameters table

10.  Normative References

   [RFC8174]  Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
              2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
              May 2017, <https://www.rfc-editor.org/info/rfc8174>.

   [RFC8628]  Denniss, W., Bradley, J., Jones, M., and H. Tschofenig,
              "OAuth 2.0 Device Authorization Grant", RFC 8628,
              DOI 10.17487/RFC8628, August 2019,
              <https://www.rfc-editor.org/info/rfc8628>.

   [RFC6749]  Hardt, D., Ed., "The OAuth 2.0 Authorization Framework",
              RFC 6749, DOI 10.17487/RFC6749, October 2012,
              <https://www.rfc-editor.org/info/rfc6749>.

   [RFC7009]  Lodderstedt, T., Ed., Dronia, S., and M. Scurtescu, "OAuth
              2.0 Token Revocation", RFC 7009, DOI 10.17487/RFC7009,
              August 2013, <https://www.rfc-editor.org/info/rfc7009>.

   [RFC7662]  Richer, J., Ed., "OAuth 2.0 Token Introspection",
              RFC 7662, DOI 10.17487/RFC7662, October 2015,
              <https://www.rfc-editor.org/info/rfc7662>.

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <https://www.rfc-editor.org/info/rfc2119>.

11.  Informative References

   [RFC8259]  Bray, T., Ed., "The JavaScript Object Notation (JSON) Data
              Interchange Format", STD 90, RFC 8259,
              DOI 10.17487/RFC8259, December 2017,
              <https://www.rfc-editor.org/info/rfc8259>.




Richer                   Expires 10 January 2021                [Page 7]

Internet-Draft             oauth-json-request                  July 2020


Appendix A.  Document History

   [[ To be removed from the final specification ]]

   -00

   *  Initial draft

Author's Address

   Justin Richer
   Bespoke Engineering

   Email: ietf@justin.richer.org





































Richer                   Expires 10 January 2021                [Page 8]