<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-oauth-first-party-apps-03" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="OAuth for First-Party Apps">OAuth 2.0 for First-Party Applications</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-first-party-apps-03"/>
    <author fullname="Aaron Parecki">
      <organization>Okta</organization>
      <address>
        <email>aaron@parecki.com</email>
      </address>
    </author>
    <author fullname="George Fletcher">
      <organization>Practical Identity LLC</organization>
      <address>
        <email>george@practicalidentity.com</email>
      </address>
    </author>
    <author fullname="Pieter Kasselman">
      <organization>Defakto Security</organization>
      <address>
        <email>pieter@defakto.security</email>
      </address>
    </author>
    <date year="2026" month="February" day="28"/>
    <area>Security</area>
    <workgroup>Web Authorization Protocol</workgroup>
    <keyword>native apps</keyword>
    <keyword>first-party</keyword>
    <keyword>oauth</keyword>
    <abstract>
      <?line 89?>

<t>This document defines the Authorization Challenge Endpoint, which supports
clients that want to control the process of obtaining authorization from the user using a native experience.</t>
      <t>In many cases, this can provide an entirely browserless OAuth 2.0 experience suited for native
applications, only delegating to the browser in unexpected, high risk, or error conditions.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://drafts.oauth.net/oauth-first-party-apps/draft-ietf-oauth-first-party-apps.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-oauth-first-party-apps/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Web Authorization Protocol Working Group mailing list (<eref target="mailto:oauth@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/oauth/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/oauth/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/oauth-wg/oauth-first-party-apps"/>.</t>
    </note>
  </front>
  <middle>
    <?line 98?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document, OAuth for First-Party Apps (FiPA),
extends the OAuth 2.0 Authorization Framework <xref target="RFC6749"/> with
a new endpoint to support
applications that want to control the process of obtaining authorization from
the user using a native experience, with browser redirection as described in
OAuth 2.0 for Native Apps <xref target="RFC8252"/> used only as a fallback when needed.</t>
      <t>The client collects any initial information from the user and POSTs that information
as well as information about the client's request to the Authorization Challenge Endpoint,
and receives either an authorization code (as defined in <xref section="1.3.1" sectionFormat="of" target="RFC6749"/> or an
error code in response. The error code
may indicate that the client can continue to prompt the user for more information,
or can indicate that the client needs to launch a browser to have the user complete
the flow in a browser.</t>
      <t>The Authorization Challenge Endpoint is used to initiate the OAuth flow in place of redirecting
or launching a browser to the authorization endpoint.</t>
      <t>While a fully-delegated approach using the redirect-based Authorization Code grant is generally
preferred, this draft provides a mechanism for the client to directly interact
with the user. This requires a high degree of trust between the authorization server
and the client, as there typically is for first-party applications.
It should be considered only when a redirect-based approach introduces usability issues, for example, when switching context between a native application and the browser, disrupting the user journey and preventing task completion.</t>
      <t>This draft also extends the token response (typically for use in response to a refresh token request) and resource server response to allow the authorization server or resource server to indicate that the client should re-request authorization from the user. This can include requesting step-up authentication by including parameters defined in <xref target="RFC9470"/> as well.</t>
      <section anchor="usage-and-applicability">
        <name>Usage and Applicability</name>
        <t>This specification is designed for the security model of first-party applications. First-party applications are applications that are controlled by the same entity as the authorization server and the user understands them both as the same entity. This specification is designed to be used by first-party native applications, which includes both mobile and desktop applications.</t>
        <t>Profiles of this specification that extend the usage to non-first-party use cases <bcp14>MUST</bcp14> describe how their application of this specification avoids the risks associated with third-party apps directly interacting with the user. For example, an extension of this specification that enables federation between native apps never actually asks any third-party app to collect credentials from the user, so avoids these risks.</t>
        <t>Using this specification in scenarios other than those described may lead to unintended security and privacy problems for users and service providers.</t>
        <t>If a service provides multiple apps, and expects users to use multiple apps on the same device, there may be better ways of sharing a user's login between the apps other than each app implementing this specification or using an SDK that implements this specification. For example, <xref target="OpenID.Native-SSO"/> provides a mechanism for one app to obtain new tokens by exchanging tokens from another app, without any user interaction. See <xref target="multiple-applications"/> for more details.</t>
        <t>Please review the entirety of <xref target="security-considerations"/>, and when more than one first-party application is supported, <xref target="multiple-applications"/>.</t>
      </section>
      <section anchor="limitations-of-this-specification">
        <name>Limitations of this specification</name>
        <t>This draft defines the overall framework for delivering a native OAuth user authentication experience. The precise client–server interactions used to authenticate the user (e.g., prompts, challenges, and step sequencing) are intentionally left to individual deployments and are out of scope for this specification.</t>
        <t>This specification is intended to be profiled to standardize specific interaction patterns enabling a complete interoperable solution.</t>
      </section>
      <section anchor="user-experience-considerations">
        <name>User Experience Considerations</name>
        <t>It is important to consider the user experience implications of different authentication challenges as well as the device with which the user is attempting to authorize.</t>
        <t>For example, requesting a user to enter a password on a limited-input device (e.g. TV) creates a lot of user friction while also exposing the user's password to anyone else in the room. On the other hand, using a challenge method that involves, for example, a fingerprint reader on the TV remote allowing for a FIDO2 passkey authentication would be a good experience.</t>
        <t>The Authorization Server <bcp14>SHOULD</bcp14> consider the user's device when presenting authentication challenges and developers <bcp14>SHOULD</bcp14> consider whether the device implementing this specification can provide a good experience for the user. If the combination of user device and authentication challenge methods creates a lot of friction or security risk, consider using a specification like OAuth 2.0 Device Authorization Grant <xref target="RFC8628"/>. If selecting OAuth 2.0 Device Authorization Grant <xref target="RFC8628"/> which uses a cross-device authorization mechanism, please incorporate the security best practices identified in Cross-Device Flows: Security Best Current Practice <xref target="I-D.ietf-oauth-cross-device-security"/>.</t>
        <t>This specification also allows for the Authorization Server (AS) to direct the user to a web browser based authorization
experience if the AS is not able to authorize the user via the requesting client app. This "redirect-to-web" experience
is necessary to allow the AS to manage the security and privacy risks associated with any specific authorization requested
by the user's client.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<section anchor="terminology">
        <name>Terminology</name>
        <t>This specification uses the terms "Access Token", "Authorization Code",
"Authorization Endpoint", "Authorization Server" (AS), "Client", "Client Authentication",
"Client Identifier", "Client Secret", "Grant Type", "Protected Resource",
"Redirection URI", "Refresh Token", "Resource Owner", "Resource Server" (RS)
and "Token Endpoint" defined by <xref target="RFC6749"/>.</t>
        <t>TODO: Replace RFC6749 references with OAuth 2.1</t>
      </section>
    </section>
    <section anchor="protocol-overview">
      <name>Protocol Overview</name>
      <t>There are three primary ways this specification extends various parts of an OAuth system.</t>
      <section anchor="initial-authorization-request">
        <name>Initial Authorization Request</name>
        <artwork type="ascii-art"><![CDATA[
                                                +-------------------+
                                                |   Authorization   |
                          (B)Authorization      |      Server       |
             +----------+    Challenge Request  |+-----------------+|
(A)Client+---|  First-  |---------------------->||  Authorization  ||
   Starts|   |  Party   |                       ||   Challenge     ||
   Flow  +-->|  Client  |<----------------------||    Endpoint     ||
             |          | (C)Authorization      ||                 ||
             |          |    Error Response     ||                 ||
             |          |         :             ||                 ||
             |          |         :             ||                 ||
             |          | (D)Authorization      ||                 ||
             |          |    Challenge Request  ||                 ||
             |          |---------------------->||                 ||
             |          |                       ||                 ||
             |          |<----------------------||                 ||
             |          | (E) Authorization     |+-----------------+|
             |          |     Code Response     |                   |
             |          |                       |                   |
             |          |                       |                   |
             |          |                       |                   |
             |          | (F) Token             |                   |
             |          |     Request           |+-----------------+|
             |          |---------------------->||      Token      ||
             |          |                       ||     Endpoint    ||
             |          |<----------------------||                 ||
             |          | (G) Access Token      |+-----------------+|
             |          |                       |                   |
             +----------+                       +-------------------+
]]></artwork>
        <t>Figure: First-Party Client Authorization Code Request</t>
        <ul spacing="normal">
          <li>
            <t>(A) The first-party client starts the flow, by presenting the user with a "sign in" button, or collecting information from the user, such as their email address or username (see <xref target="authorization-initiation"/>.</t>
          </li>
          <li>
            <t>(B) The client initiates the authorization request by making a POST request to the Authorization Challenge Endpoint (see <xref target="challenge-request"/>, optionally with information collected from the user (e.g. email or username)</t>
          </li>
          <li>
            <t>(C) The authorization server determines whether the information provided to the Authorization Challenge Endpoint is sufficient to grant authorization, and either responds with an authorization code or responds with an error (see <xref target="challenge-response"/>). In this example, it determines that additional information is needed and responds with an error. The error may contain additional information to guide the Client on what information to collect next. This pattern of collecting information, submitting it to the Authorization Challenge Endpoint and then receiving an error or authorization code may repeat several times.</t>
          </li>
          <li>
            <t>(D) The client gathers additional information (e.g. signed passkey challenge, or one-time code from email) and makes a POST request to the Authorization Challenge Endpoint.</t>
          </li>
          <li>
            <t>(E) The Authorization Challenge Endpoint returns an authorization code.</t>
          </li>
          <li>
            <t>(F) The client sends the authorization code received in step (E) to obtain a token from the Token Endpoint (see <xref target="token-request"/>).</t>
          </li>
          <li>
            <t>(G) The Authorization Server returns an Access Token from the Token Endpoint.</t>
          </li>
        </ul>
      </section>
      <section anchor="refresh-token-request">
        <name>Refresh Token Request</name>
        <t>When the client uses a refresh token to obtain a new access token, the authorization server <bcp14>MAY</bcp14> respond with an error to indicate that re-authentication of the user is required.</t>
      </section>
      <section anchor="resource-request">
        <name>Resource Request</name>
        <t>When making a resource request to a resource server, the resource server <bcp14>MAY</bcp14> respond with an error according to OAuth 2.0 Step-Up Authentication Challenge Protocol <xref target="RFC9470"/>, indicating that re-authentication of the user is required.</t>
        <t>The use of <xref target="RFC9470"/> in this specification is for interoperability with its defined error signaling and does not propose changes to <xref target="RFC9470"/> itself.</t>
      </section>
    </section>
    <section anchor="protocol-endpoints">
      <name>Protocol Endpoints</name>
      <section anchor="authorization-challenge-endpoint">
        <name>Authorization Challenge Endpoint</name>
        <t>The authorization challenge endpoint is a new endpoint defined by this specification which the first-party application uses to obtain an authorization code.</t>
        <t>The authorization challenge endpoint is an HTTP API at the authorization server that accepts HTTP POST requests with parameters in the HTTP request message body using the <tt>application/x-www-form-urlencoded</tt> format. This format has a character encoding of UTF-8, as described in Appendix B of <xref target="RFC6749"/>. The authorization challenge endpoint URL <bcp14>MUST</bcp14> use the "https" scheme.</t>
        <t>If the authorization server requires client authentication for this client on the Token Endpoint, then the authorization server <bcp14>MUST</bcp14> also require client authentication for this client on the Authorization Challenge Endpoint. See <xref target="client-authentication"/> for more details.</t>
        <t>Authorization servers supporting this specification <bcp14>SHOULD</bcp14> include the URL of their authorization challenge endpoint in their authorization server metadata document <xref target="RFC8414"/> using the <tt>authorization_challenge_endpoint</tt> parameter as defined in <xref target="authorization-server-metadata"/>.</t>
        <t>The authorization challenge endpoint <bcp14>MUST</bcp14> accept the authorization request parameters as defined in <xref target="RFC6749"/> for the authorization endpoint as well as any authorization endpoint extensions supported by the authorization server. Examples of such extensions include Proof Key for Code Exchange (PKCE) <xref target="RFC7636"/>, Resource Indicators <xref target="RFC8707"/>, and OpenID Connect <xref target="OpenID"/>. Note that some extension parameters have meaning in a web context but don't have meaning in a native mechanism (e.g. <tt>response_mode=query</tt>). It is out of scope as to what the authorization server does in the case that an extension defines a parameter that has no meaning in this use case.</t>
        <t>The client initiates the authorization flow with or without information collected from the user (e.g. a signed passkey challenge or MFA code).</t>
        <t>The authorization challenge endpoint response is either an authorization code or an error code, and may also contain an <tt>auth_session</tt> which the client uses on subsequent requests.</t>
        <t>Further communication between the client and authorization server <bcp14>MAY</bcp14> happen at the Authorization Challenge Endpoint or any other proprietary endpoints at the authorization server.</t>
      </section>
      <section anchor="token-endpoint">
        <name>Token endpoint</name>
        <t>The token endpoint is used by the client to obtain an access token by
presenting its authorization grant or refresh token, as described in
Section 3.2 of OAuth 2.0 <xref target="RFC6749"/>.</t>
        <t>This specification extends the token endpoint response to allow the authorization
server to indicate that further authentication of the user is required.</t>
      </section>
    </section>
    <section anchor="authorization-initiation">
      <name>Authorization Initiation</name>
      <t>A client may wish to initiate an authorization flow by first prompting the user for their user identifier or other account information. The authorization challenge endpoint is a new endpoint to collect this login hint and direct the client with the next steps, whether that is to do an MFA flow, or perform an OAuth redirect-based flow. If the authorization server directs the client to complete the flow using a redirect-based authorization request in a browser, the client and authorization server <bcp14>SHOULD</bcp14> follow applicable best current practices for native apps (e.g., <xref target="RFC8252"/> and its successors) for redirect URI selection and external user-agent usage.</t>
      <t>In order to preserve the security of this specification, the Authorization Server <bcp14>MUST</bcp14> verify the "first-partyness" of the client before continuing with the authentication flow. Please see <xref target="first-party-applications"/> for additional considerations.</t>
      <section anchor="challenge-request">
        <name>Authorization Challenge Request</name>
        <t>The client makes a request to the authorization challenge endpoint by adding the
following parameters, as well as parameters from any extensions, using the <tt>application/x-www-form-urlencoded</tt>
format with a character encoding of UTF-8 in the HTTP request body:</t>
        <dl>
          <dt>"client_id":</dt>
          <dd>
            <t><bcp14>REQUIRED</bcp14>, unless the client is authenticating to the authorization server in a manner that unambiguously identifies the client, or the request includes an <tt>auth_session</tt> value associated with an existing session from which the authorization server can determine the client identity. The client <bcp14>MAY</bcp14> include the <tt>client_id</tt> even when one of these conditions applies. If it does, the authorization server <bcp14>MUST</bcp14> verify that the <tt>client_id</tt> identifies the same client as otherwise determined for the request, and <bcp14>MUST</bcp14> reject the request if it does not.</t>
          </dd>
          <dt>"scope":</dt>
          <dd>
            <t><bcp14>OPTIONAL</bcp14>. The OAuth scope defined in <xref target="RFC6749"/>.</t>
          </dd>
          <dt>"auth_session":</dt>
          <dd>
            <t><bcp14>OPTIONAL</bcp14>. If the client has previously obtained an auth session, described in <xref target="auth-session"/>.</t>
          </dd>
          <dt>"code_challenge":</dt>
          <dd>
            <t><bcp14>OPTIONAL</bcp14>. The code challenge as defined by <xref target="RFC7636"/>.
See <xref target="redirect-to-web"/> for details.</t>
          </dd>
          <dt>"code_challenge_method":</dt>
          <dd>
            <t><bcp14>OPTIONAL</bcp14>. The code challenge method as defined by <xref target="RFC7636"/>.
See <xref target="redirect-to-web"/> for details.</t>
          </dd>
          <dt>"response_type":</dt>
          <dd>
            <t><bcp14>REQUIRED</bcp14>. Per section 3.1.1 of <xref target="RFC6749"/> <tt>response_type</tt> is required, and for this specification <bcp14>MUST</bcp14> contain the value of <tt>code</tt>.</t>
          </dd>
        </dl>
        <t>Specific implementations as well as extensions to this specification <bcp14>MAY</bcp14> define additional parameters to be used at this endpoint.</t>
        <t>For example, the client makes the following request to initiate a flow
given the user's phone number, line breaks shown for illustration purposes only:</t>
        <artwork><![CDATA[
POST /authorize-challenge HTTP/1.1
Host: server.example.com
Content-Type: application/x-www-form-urlencoded

login_hint=%2B1-310-123-4567&scope=profile
&client_id=bb16c14c73415
]]></artwork>
      </section>
      <section anchor="challenge-response">
        <name>Authorization Challenge Response</name>
        <t>The authorization server determines whether the information provided up to this point is sufficient to issue an authorization code, and if so responds with an authorization code. If the information is not sufficient for issuing an authorization code, then the authorization server <bcp14>MUST</bcp14> respond with an error response.</t>
        <section anchor="authorization-code-response">
          <name>Authorization Code Response</name>
          <t>The authorization server issues an authorization code
by creating an HTTP response content using the <tt>application/json</tt>
media type as defined by <xref target="RFC8259"/> with the following parameters
and an HTTP 200 (OK) status code:</t>
          <dl>
            <dt>"authorization_code":</dt>
            <dd>
              <t><bcp14>REQUIRED</bcp14>. The authorization code issued by the authorization server.</t>
            </dd>
          </dl>
          <t>For example,</t>
          <artwork><![CDATA[
HTTP/1.1 200 OK
Content-Type: application/json
Cache-Control: no-store

{
  "authorization_code": "uY29tL2F1dGhlbnRpY"
}
]]></artwork>
        </section>
        <section anchor="challenge-error-response">
          <name>Error Response</name>
          <t>If the request contains invalid parameters or incorrect data,
or if the authorization server wishes to interact with the user directly,
the authorization server responds with an HTTP 400 (Bad Request)
status code (unless specified otherwise below) and includes the following
parameters with the response.</t>
          <t>Response parameters <tt>error</tt>, <tt>error_description</tt>,
and <tt>error_uri</tt> are defined and used according to <xref target="RFC6749"/>. <tt>request_uri</tt> and
<tt>expires_in</tt> are defined and used according to <xref target="RFC9126"/>. This specification
defines the <tt>auth_session</tt> response parameter.</t>
          <dl>
            <dt>"error":</dt>
            <dd>
              <t><bcp14>REQUIRED</bcp14>.  A single ASCII <xref target="USASCII"/> error code as described in
in section <xref target="error-codes"/>
              </t>
              <t>Values for the <tt>error</tt> parameter <bcp14>MUST NOT</bcp14> include characters
outside the set %x20-21 / %x23-5B / %x5D-7E.</t>
              <t>The authorization server <bcp14>MAY</bcp14> extend these error codes with custom
messages based on the requirements of the authorization server.</t>
            </dd>
            <dt>"error_description":</dt>
            <dd>
              <t><bcp14>OPTIONAL</bcp14>.  Human-readable ASCII <xref target="USASCII"/> text providing
additional information, used to assist the client developer in
understanding the error that occurred.
Values for the <tt>error_description</tt> parameter <bcp14>MUST NOT</bcp14> include
characters outside the set %x20-21 / %x23-5B / %x5D-7E.</t>
            </dd>
            <dt>"error_uri":</dt>
            <dd>
              <t><bcp14>OPTIONAL</bcp14>.  A URI identifying a human-readable web page with
information about the error, used to provide the client
developer with additional information about the error.
Values for the <tt>error_uri</tt> parameter <bcp14>MUST</bcp14> conform to the
URI-reference syntax and thus <bcp14>MUST NOT</bcp14> include characters
outside the set %x21 / %x23-5B / %x5D-7E.</t>
            </dd>
            <dt>"auth_session":</dt>
            <dd>
              <t><bcp14>OPTIONAL</bcp14>.  The auth session allows the authorization server to
associate subsequent requests by this client with an ongoing
authorization request sequence. The client <bcp14>MUST</bcp14> include
the <tt>auth_session</tt> in follow-up requests to the authorization challenge
endpoint if it receives one along with the error response.</t>
            </dd>
            <dt>"request_uri":</dt>
            <dd>
              <t><bcp14>OPTIONAL</bcp14>.  A request URI as described by <xref target="RFC9126"/> Section 2.2.</t>
            </dd>
            <dt>"expires_in":</dt>
            <dd>
              <t><bcp14>OPTIONAL</bcp14>.  The lifetime of the <tt>request_uri</tt> in seconds, as
described by <xref target="RFC9126"/> Section 2.2.</t>
            </dd>
          </dl>
          <t>This specification requires the authorization server to define new
error codes that relate to the actions the client must take in order
to properly authenticate the user. These new error codes are specific
to the authorization server's implementation of this specification and are
intentionally left out of scope.</t>
          <t>The parameters are included in the content of the HTTP response
using the <tt>application/json</tt> media type as defined by <xref target="RFC7159"/>.  The
parameters are serialized into a JSON structure by adding each
parameter at the highest structure level.  Parameter names and string
values are included as JSON strings.  Numerical values are included
as JSON numbers.  The order of parameters does not matter and can
vary.</t>
          <t>The authorization server <bcp14>MAY</bcp14> define additional parameters in the response
depending on the implementation. The authorization server <bcp14>MAY</bcp14> also define
more specific content types for the error responses as long as the response
is JSON and conforms to <tt>application/&lt;AS-defined&gt;+json</tt>.</t>
          <section anchor="error-codes">
            <name>Error Codes</name>
            <t>This specification supports the use of error codes defined by <xref target="RFC6749"/>
and other error codes defined by OAuth extensions supported by the
Authorization Server.</t>
            <t>This specification defines the following error codes.</t>
            <t>"invalid_session":
     :     The provided <tt>auth_session</tt> is
           invalid, expired, revoked, or is otherwise invalid.</t>
            <t>"insufficient_authorization":
     :     The presented authorization is insufficient, and the authorization
           server is requesting the client to take additional steps to
           complete the authorization.</t>
            <t>"redirect_to_web":
     :     The request is not able to be fulfilled with any further
           direct interaction with the user. Instead, the client
           should initiate a new authorization code flow so that the
           user interacts with the authorization server in a web browser.
           See <xref target="redirect-to-web"/> for details.</t>
            <section anchor="redirect-to-web">
              <name>Redirect to Web Error Response</name>
              <t>The authorization server may choose to interact directly with the user based on a risk
assesment, the introduction of a new authentication method not supported
in the application, or to handle an exception flow like account recovery.
To indicate this error to the client, the authorization server returns an
error response as defined above with the <tt>redirect_to_web</tt> error code.</t>
              <t>The response <bcp14>MAY</bcp14> include a <tt>request_uri</tt>, in which case the client is expected
to use it to initiate an authorization request as described in <xref section="4" sectionFormat="of" target="RFC9126"/>.</t>
              <t>If no <tt>request_uri</tt> is returned, the client is expected to initiate a new OAuth
Authorization Code flow with PKCE according to <xref target="RFC6749"/> and <xref target="RFC7636"/>.</t>
              <t>If the client expects the frequency of this error response to be high,
the client <bcp14>SHOULD</bcp14> include a PKCE <xref target="RFC7636"/> <tt>code_challenge</tt> in the initial authorization
challenge request.</t>
              <t>If the client does not include a PKCE <tt>code_challenge</tt> in the initial authorization
challenge request, the authorization server <bcp14>MUST NOT</bcp14> return a <tt>request_uri</tt> in the
<tt>redirect_to_web</tt> error response, as that would effectively be the same as a PAR request without PKCE.</t>
            </section>
          </section>
        </section>
      </section>
      <section anchor="intermediate_requests">
        <name>Intermediate Requests</name>
        <t>If the authorization server returns an <tt>insufficient_authorization</tt> error as described
above, this is an indication that there is further information the client
should request from the user, and continue to make requests to the authorization
server until the authorization request is fulfilled and an authorization code returned.</t>
        <t>These intermediate requests are out of scope of this specification, and are expected
to be defined by the authorization server. The format of these requests is not required
to conform to the format of the initial authorization challenge requests
(e.g. the request format may be <tt>application/json</tt> rather than <tt>application/x-www-form-urlencoded</tt>).</t>
        <t>These intermediate requests <bcp14>MAY</bcp14> also be sent to proprietary endpoints at the authorization server
rather than the Authorization Challenge Endpoint.</t>
        <section anchor="auth-session">
          <name>Auth Session</name>
          <t>The <tt>auth_session</tt> is a value that the authorization server issues in order to be able to associate subsequent requests from the same client. It is intended to be analagous to how a browser cookie associates multiple requests by the same browser to the authorization server.</t>
          <t>The <tt>auth_session</tt> value is completely opaque to the client, and as such the authorization server <bcp14>MUST</bcp14> adequately protect the value from inspection by the client.</t>
          <t>If the client has an <tt>auth_session</tt>, the client <bcp14>MUST</bcp14> include it in future requests to the authorization challenge endpoint. The client <bcp14>MUST</bcp14> store the <tt>auth_session</tt> beyond the issuance of the authorization code to be able to use it in future requests.</t>
          <t>Every response defined by this specification may include a new <tt>auth_session</tt> value. Clients <bcp14>MUST NOT</bcp14> assume that <tt>auth_session</tt> values are static, and <bcp14>MUST</bcp14> be prepared to update the stored <tt>auth_session</tt> value if one is received in a response.</t>
          <t>To mitigate the risk of session hijacking, the <tt>auth_session</tt> <bcp14>SHOULD</bcp14> be bound to the device, and the authorization server <bcp14>SHOULD</bcp14> reject an <tt>auth_session</tt> if it is presented from a different device than the one it was bound to. One method of binding the <tt>auth_session</tt> to the device is described in <xref target="auth-session-dpop"/>.</t>
          <t>The AS <bcp14>MUST</bcp14> ensure that the <tt>auth_session</tt> value is unique to the session and protected from accidental collisions.
For example, if the AS is using a random string for the <tt>auth_session</tt> value, the value <bcp14>SHOULD</bcp14> have a minimum of 256 bits of entropy.</t>
          <t>See <xref target="auth-session-security"/> for additional security considerations.</t>
        </section>
      </section>
    </section>
    <section anchor="token-request">
      <name>Token Request</name>
      <t>The client makes a request to the token endpoint using the authorization code it obtained from the authorization challenge endpoint.</t>
      <t>This specification does not define any additional parameters beyond the token request parameters defined in  Section 4.1.3 of <xref target="RFC6749"/>. However, notably, the <tt>redirect_uri</tt> parameter will not be included in this request, because no <tt>redirect_uri</tt> parameter was included in the authorization request.</t>
      <section anchor="token-endpoint-successful-response">
        <name>Token Endpoint Successful Response</name>
        <t>This specification extends the OAuth 2.0 <xref target="RFC6749"/> token response
defined in Section 5.1 with the additional parameter <tt>auth_session</tt>, defined in <xref target="auth-session"/>.</t>
        <t>An example successful token response is below:</t>
        <artwork><![CDATA[
HTTP/1.1 200 OK
Content-Type: application/json
Cache-Control: no-store

{
  "access_token": "2YotnFZFEjr1zCsicMWpAA",
  "token_type": "Bearer",
  "expires_in": 3600,
  "refresh_token": "tGzv3JOkF0XG5Qx2TlKWIA",
  "auth_session": "uY29tL2F1dGhlbnRpY"
}
]]></artwork>
        <t>The response <bcp14>MAY</bcp14> include an <tt>auth_session</tt> parameter which the client is expected to include on any subsequent requests to the authorization challenge endpoint, as described in <xref target="auth-session"/>. The <tt>auth_session</tt> parameter <bcp14>MAY</bcp14> also be included even if the authorization code was obtained through a traditional OAuth authorization code flow rather than the flow defined by this specification.</t>
        <t>The <tt>auth_session</tt> mechanism described in <xref target="auth-session"/> is an optional feature the authorization server can leverage in order to enable flows such as step-up authentication <xref target="RFC9470"/>, so that the authorization server can restore the context of a previous session and prompt only for the needed step-up factors. See <xref target="step-up-sms-example"/> for an example application.</t>
      </section>
      <section anchor="token-endpoint-error-response">
        <name>Token Endpoint Error Response</name>
        <t>Upon any request to the token endpoint, including a request with a valid refresh token,
the authorization server can respond with an authorization challenge instead of a successful access token response.</t>
        <t>An authorization challenge error response is a particular type of
error response as defined in Section 5.2 of OAuth 2.0 <xref target="RFC6749"/> where
the error code is set to the following value:</t>
        <dl>
          <dt>"error": "insufficient_authorization":</dt>
          <dd>
            <t>The presented authorization is insufficient, and the authorization
server is requesting the client take additional steps to
complete the authorization.</t>
          </dd>
        </dl>
        <t>The response <bcp14>MAY</bcp14> also contain an <tt>auth_session</tt> parameter which the client is expected to include on a subsequent request to the authorization challenge endpoint.</t>
        <dl>
          <dt>"auth_session":</dt>
          <dd>
            <t><bcp14>OPTIONAL</bcp14>.  The optional auth session value allows the authorization server to
associate subsequent requests by this client with an ongoing
authorization request sequence. The client <bcp14>MUST</bcp14> include
the <tt>auth_session</tt> in follow-up requests to the challenge
endpoint if it receives one along with the error response.</t>
          </dd>
        </dl>
        <t>Additionally, the response <bcp14>MAY</bcp14> contain custom values that describe instructions for how the client should proceed to interact with the user.</t>
        <t>For example:</t>
        <artwork><![CDATA[
HTTP/1.1 403 Forbidden
Content-Type: application/json
Cache-Control: no-store

{
  "error": "insufficient_authorization",
  "auth_session": "uY29tL2F1dGhlbnRpY",
  "otp_required": true
}
]]></artwork>
      </section>
    </section>
    <section anchor="resource-server-error-response">
      <name>Resource Server Error Response</name>
      <t>Step-Up Authentication <xref target="RFC9470"/> defines error code values that a resource server can use to tell the client to start a new authorization request including <tt>acr_values</tt> and <tt>max_age</tt> from <xref target="OpenID"/>. This specification reuses the Step-Up Authentication <xref target="RFC9470"/> error response to initiate a first party authorization flow to satisfy the step-up authentication request.</t>
      <t>Upon receiving this error response, the client starts a new first-party authorization request at the authorization challenge endpoint, and includes the <tt>acr_values</tt>, <tt>max_age</tt> and <tt>scope</tt> that were returned in the error response.</t>
      <t>This specification does not update or alter <xref target="RFC9470"/> resource server error behaviour and does not define any new parameters for the resource server error response beyond those defined in <xref target="RFC9470"/> and <xref target="RFC6750"/>. It only defines first party client behavior for continuing authorization at the authorization challenge endpoint when such an error is received.</t>
    </section>
    <section anchor="authorization-server-metadata">
      <name>Authorization Server Metadata</name>
      <t>The following authorization server metadata parameters <xref target="RFC8414"/> are introduced to signal the server's capability and policy with respect to first-party applications.</t>
      <dl>
        <dt>"authorization_challenge_endpoint":</dt>
        <dd>
          <t>The URL of the authorization challenge endpoint at which a client can initiate
an authorization request and eventually obtain an authorization code.</t>
        </dd>
      </dl>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="first-party-applications">
        <name>First-Party Applications</name>
        <t>First-party applications are applications that are controlled by the same entity as the authorization server used by the application, and the user understands them both as the same entity.</t>
        <t>For first-party applications, it is important that the user recognizes the application and authorization server as belonging to the same brand. For example, a bank publishing their own mobile application.</t>
        <t>Because this specification enables a client application to interact directly with the end user, and the application handles sending any information collected from the user to the authorization server, it is expected to be used only for first-party applications when the authorization server also has a high degree of trust of the client.</t>
        <t>This specification is not prescriptive on how the Authorization Server establishes its trust in the first-partyness of the application. For mobile platforms, most support some mechanism for application attestation that can be used to identify the entity that created/signed/uploaded the app to the app store. App attestation can be combined with mechanisms such as Attestation-Based Client Authentication [<xref target="I-D.ietf-oauth-attestation-based-client-auth"/>] or Dynamic Client Registration <xref target="RFC7591"/> to enable strong client authentication in addition to client verification (first-partyness). The exact steps required are out of scope for this specification. Note that applications running inside a browser (e.g. Single Page Apps) context it is much more difficult to verify the first-partyness of the client. Please see <xref target="single-page-apps"/> for additional details.</t>
      </section>
      <section anchor="phishing">
        <name>Phishing</name>
        <t>There are two ways using this specification increases the risk of phishing.</t>
        <ol spacing="normal" type="1"><li>
            <t>Malicious application: With this specification, the client interacts directly with the end user, collecting information provided by the user and sending it to the authorization server. If an attacker impersonates the client and successfully tricks a user into using it, they may not realize they are giving their credentials to the malicious application.</t>
          </li>
          <li>
            <t>User education: In a traditional OAuth deployment using the redirect-based authorization code flow, the user will only ever enter their credentials at the authorization server, and it is straightforward to explain to avoid entering credentials in other "fake" websites. By introducing a new place the user is expected to enter their credentials using this specification, it is more complicated to teach users how to recognize other fake login prompts that might be attempting to steal their credentials.</t>
          </li>
        </ol>
        <t>Because of these risks, the authorization server <bcp14>MAY</bcp14> decide to require that the user go through a redirect-based flow at any stage of the process based on its own risk assessment.</t>
      </section>
      <section anchor="credential-attacks">
        <name>Credential Stuffing Attacks</name>
        <t>The authorization challenge endpoint is capable of directly receiving user credentials and other authentication material like OTPs. This exposes a new vector to perform credential stuffing or brute force attacks if additional measures are not taken to ensure the authenticity of the application.</t>
        <t>An authorization server may already have a combination of built-in or 3rd party security tools in place to monitor and reduce this risk in browser-based authentication flows. Implementors <bcp14>SHOULD</bcp14> consider similar security measures to reduce this risk in the authorization challenge endpoint. Additionally, the attestation APIs <bcp14>SHOULD</bcp14> be used when possible to assert a level of confidence to the authorization server that the request is originating from an application owned by the same party.</t>
        <t>Implementors <bcp14>SHOULD</bcp14> rate-limit requests from the same <tt>auth_session</tt>.</t>
      </section>
      <section anchor="client-authentication">
        <name>Client Authentication</name>
        <t>Typically, mobile and desktop applications are considered "public clients" in OAuth, since they cannot be shipped with a statically configured set of client credentials <xref target="RFC8252"/>. Because of this, client impersonation should be a concern of anyone deploying this pattern. Without client authentication, a malicious user or attacker can mimick the requests the application makes to the authorization server, pretending to be the legitimate client.</t>
        <t>Implementers <bcp14>SHOULD</bcp14> consider additional measures to limit the risk of client impersonation, such as using attestation APIs available from the operating system.</t>
      </section>
      <section anchor="sender-constrained-tokens">
        <name>Sender-Constrained Tokens</name>
        <t>Tokens issued in response to an authorization challenge request <bcp14>SHOULD</bcp14> be sender constrained to mitigate the risk of token theft and replay.</t>
        <t>Proof-of-Possession techniques constrain tokens by binding them to a cryptographic key. Whenever the token is presented, it <bcp14>MUST</bcp14> be accompanied by a proof that the client presenting the token also controls the cryptographic key bound to the token. If a proof-of-possession sender constrained token is presented without valid proof of possession of the cryptographic key, it <bcp14>MUST</bcp14> be rejected.</t>
        <section anchor="dpop-demonstrating-proof-of-possession">
          <name>DPoP: Demonstrating Proof-of-Possession</name>
          <t>DPoP <xref target="RFC9449"/> is an application-level mechanism for sender-constraining OAuth <xref target="RFC6749"/> access and refresh tokens. If DPoP is used to sender constrain tokens, the client <bcp14>SHOULD</bcp14> use DPoP for every token request to the Authorization Server and interaction with the Resource Server.</t>
          <t>DPoP includes an optional capability to bind the authorization code to the DPoP key to enable end-to-end binding of the entire authorization flow. Given the back-channel nature of this specification, there are far fewer opportunities for an attacker to access the authorization code and PKCE code verifier compared to the redirect-based Authorization Code Flow. In this specification, the Authorization Code is obtained via a back-channel request. Despite this, omitting Authorization Code binding leaves a gap in the end-to-end protection that DPoP provides, so DPoP Authorization Code binding <bcp14>SHOULD</bcp14> be used.</t>
          <t>The mechanism for Authorization Code binding with DPoP is similar as that defined for Pushed Authorization Requests (PARs) in Section 10.1 of <xref target="RFC9449"/>. In order to bind the Authorization Code with DPoP, the client <bcp14>MUST</bcp14> add the DPoP header to the Authorization Challenge Request. The authorization server <bcp14>MUST</bcp14> check the DPoP proof JWT that was included in the DPoP header as defined in Section 4.3 of <xref target="RFC9449"/>. The authorization server <bcp14>MUST</bcp14> ensure that the same key is used in all subsequent Authorization Challenge Requests and in the eventual token request. The authorization server <bcp14>MUST</bcp14> reject subsequent Authorization Challenge Requests, or the eventual token request, unless a DPoP proof for the same key presented in the original Authorization Challenge Request is provided.</t>
          <t>The above mechanism simplifies the implementation of the client, as it can attach the DPoP header to all requests to the authorization server regardless of the type of request. This mechanism provides a stronger binding than using the <tt>dpop_jkt</tt> parameter, as the DPoP header contains a proof of possession of the private key.</t>
        </section>
        <section anchor="other-proof-of-possession-mechanisms">
          <name>Other Proof of Possession Mechanisms</name>
          <t>It may be possible to use other proof of possession mechanisms to sender constrain access and refresh tokens. Defining these mechanisms are out of scope for this specification.</t>
        </section>
      </section>
      <section anchor="auth-session-security">
        <name>Auth Session</name>
        <t>Binding the <tt>auth_session</tt> to the device requesting authorization is important to prevent session hijacking and replay of the <tt>auth_session</tt> value. Without the device binding a captured <tt>auth_session</tt> could be replayed from another device. The following section describes one way to bind the <tt>auth_session</tt> to the requesting device. Other device binding methods are available and useable to prevent this potential security exposure.</t>
        <section anchor="auth-session-dpop">
          <name>Auth Session DPoP Binding</name>
          <t>If the client and authorization server are using DPoP binding of access tokens and/or authorization codes, then the <tt>auth_session</tt> value <bcp14>SHOULD</bcp14> be protected as well. The authorization server <bcp14>SHOULD</bcp14> associate the <tt>auth_session</tt> value with the DPoP public key. This removes the need for the authorization server to include additional claims in the DPoP proof, while still benefitting from the assurance that the client presenting the proof has control over the DPoP key. To associate the <tt>auth_session</tt> value with the DPoP public key, the authorization server:</t>
          <ul spacing="normal">
            <li>
              <t><bcp14>MUST</bcp14> check that the same DPoP public key is being used when the client presents the DPoP proof.</t>
            </li>
            <li>
              <t><bcp14>MUST</bcp14> verify the DPoP proof to ensure the client controls the corresponding private key whenever the client includes the <tt>auth_session</tt> in an Authorization Challenge Request as described in <xref target="challenge-request"/>.</t>
            </li>
          </ul>
          <t>DPoP binding of the <tt>auth_session</tt> value ensures that the context referenced by the <tt>auth_session</tt> cannot be stolen and reused by another device.</t>
        </section>
        <section anchor="auth-session-lifetime">
          <name>Auth Session Lifetime</name>
          <t>This specification makes no requirements or assumptions on the lifetime of the <tt>auth_session</tt> value. The lifetime and expiration is at the discretion of the authorization server, and the authorization server may choose to invalidate the value for any reason such as scheduled expiration, security events, or revocation events.</t>
          <t>Clients <bcp14>MUST NOT</bcp14> make any assumptions or depend on any particular lifetime of the <tt>auth_session</tt> value.</t>
        </section>
      </section>
      <section anchor="multiple-applications">
        <name>Multiple Applications</name>
        <t>When multiple first-party applications are supported by the AS, then it is important to consider a number of additional risks. These risks fall into two main categories: Experience Risk and Technical Risk which are described below.</t>
        <section anchor="user-experience-risk">
          <name>User Experience Risk</name>
          <t>Any time a user is asked to provide the authentication credentials in user experiences that differ, it has the effect of increasing the likelihood that the user will fall prey to a phishing attack because they are used to entering credentials in different looking experiences. When multiple first-party applications are supported, the implementation <bcp14>MUST</bcp14> ensure the native experience is identical across all the first-party applications.</t>
          <t>Another experience risk is user confusion caused by different looking experiences and behaviors. This can increase the likelihood the user will not complete the authentication experience for the first-party application.</t>
        </section>
        <section anchor="technical-risk">
          <name>Technical Risk</name>
          <t>In addition to the experience risks, multiple implementations in first-party applications increases the risk of an incorrect implementation as well as increasing the attack surface as each implementation may expose its own weaknesses.</t>
        </section>
        <section anchor="mitigation">
          <name>Mitigation</name>
          <t>To address these risks, when multiple first-party applications must be supported, and other methods such as <xref target="OpenID.Native-SSO"/> are not applicable, it is <bcp14>RECOMMENDED</bcp14> that a client-side SDK be used to ensure the implementation is consistent across the different applications and to ensure the user experience is identical for all first-party apps.</t>
        </section>
      </section>
      <section anchor="single-page-apps">
        <name>Single Page Applications</name>
        <t>Single Page Applications (SPA) run in a scripting language inside the context of a browser instance. This environment poses several unique challenges compared to native applications, in particular:</t>
        <ul spacing="normal">
          <li>
            <t>Significant attack vectors due to the possibility of Cross-Site Scripting (XSS) attacks</t>
          </li>
          <li>
            <t>Fewer options to securely attest to the first-partyness of a browser based application</t>
          </li>
        </ul>
        <t>See <xref target="I-D.ietf-oauth-browser-based-apps"/> for a detailed discussion of the risks of XSS attacks in browsers.</t>
        <t>Additionally, the nature of a Single-Page App means the user is already in a browser context, so the user experience cost of doing a full page redirect or a popup window for the traditional OAuth Authorization Code Flow is much less than the cost of doing so in a native application. The complexity and risk of implementing this specification in a browser likely does not outweigh the user experience benefits that would be gained in that context.</t>
        <t>For these reasons, it is <bcp14>NOT RECOMMENDED</bcp14> to use this specification in browser-based applications.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="oauth-parameters-registration">
        <name>OAuth Parameters Registration</name>
        <t>IANA has (TBD) registered the following values in the IANA "OAuth Parameters" registry of <xref target="IANA.oauth-parameters"/> established by <xref target="RFC6749"/>.</t>
        <t><strong>Parameter name</strong>: <tt>auth_session</tt></t>
        <t><strong>Parameter usage location</strong>: token response</t>
        <t><strong>Change Controller</strong>: IETF</t>
        <t><strong>Specification Document</strong>: Section 5.4 of this specification</t>
      </section>
      <section anchor="oauth-server-metadata-registration">
        <name>OAuth Server Metadata Registration</name>
        <t>IANA has (TBD) registered the following values in the IANA "OAuth Authorization Server Metadata" registry of <xref target="IANA.oauth-parameters"/> established by <xref target="RFC8414"/>.</t>
        <t><strong>Metadata Name</strong>: <tt>authorization_challenge_endpoint</tt></t>
        <t><strong>Metadata Description</strong>: URL of the authorization server's authorization challenge endpoint.</t>
        <t><strong>Change Controller</strong>: IESG</t>
        <t><strong>Specification Document</strong>: Section 4.1 of [[ this specification ]]</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC7159">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="March" year="2014"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7159"/>
          <seriesInfo name="DOI" value="10.17487/RFC7159"/>
        </reference>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC7591">
          <front>
            <title>OAuth 2.0 Dynamic Client Registration Protocol</title>
            <author fullname="J. Richer" initials="J." role="editor" surname="Richer"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="M. Machulak" initials="M." surname="Machulak"/>
            <author fullname="P. Hunt" initials="P." surname="Hunt"/>
            <date month="July" year="2015"/>
            <abstract>
              <t>This specification defines mechanisms for dynamically registering OAuth 2.0 clients with authorization servers. Registration requests send a set of desired client metadata values to the authorization server. The resulting registration responses return a client identifier to use at the authorization server and the client metadata values registered for the client. The client can then use this registration information to communicate with the authorization server using the OAuth 2.0 protocol. This specification also defines a set of common client metadata fields and values for clients to use during registration.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7591"/>
          <seriesInfo name="DOI" value="10.17487/RFC7591"/>
        </reference>
        <reference anchor="RFC7636">
          <front>
            <title>Proof Key for Code Exchange by OAuth Public Clients</title>
            <author fullname="N. Sakimura" initials="N." role="editor" surname="Sakimura"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Agarwal" initials="N." surname="Agarwal"/>
            <date month="September" year="2015"/>
            <abstract>
              <t>OAuth 2.0 public clients utilizing the Authorization Code Grant are susceptible to the authorization code interception attack. This specification describes the attack as well as a technique to mitigate against the threat through the use of Proof Key for Code Exchange (PKCE, pronounced "pixy").</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7636"/>
          <seriesInfo name="DOI" value="10.17487/RFC7636"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC8414">
          <front>
            <title>OAuth 2.0 Authorization Server Metadata</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <date month="June" year="2018"/>
            <abstract>
              <t>This specification defines a metadata format that an OAuth 2.0 client can use to obtain the information needed to interact with an OAuth 2.0 authorization server, including its endpoint locations and authorization server capabilities.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8414"/>
          <seriesInfo name="DOI" value="10.17487/RFC8414"/>
        </reference>
        <reference anchor="RFC8628">
          <front>
            <title>OAuth 2.0 Device Authorization Grant</title>
            <author fullname="W. Denniss" initials="W." surname="Denniss"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="August" year="2019"/>
            <abstract>
              <t>The OAuth 2.0 device authorization grant is designed for Internet- connected devices that either lack a browser to perform a user-agent- based authorization or are input constrained to the extent that requiring the user to input text in order to authenticate during the authorization flow is impractical. It enables OAuth clients on such devices (like smart TVs, media consoles, digital picture frames, and printers) to obtain user authorization to access protected resources by using a user agent on a separate device.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8628"/>
          <seriesInfo name="DOI" value="10.17487/RFC8628"/>
        </reference>
        <reference anchor="RFC8707">
          <front>
            <title>Resource Indicators for OAuth 2.0</title>
            <author fullname="B. Campbell" initials="B." surname="Campbell"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document specifies an extension to the OAuth 2.0 Authorization Framework defining request parameters that enable a client to explicitly signal to an authorization server about the identity of the protected resource(s) to which it is requesting access.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8707"/>
          <seriesInfo name="DOI" value="10.17487/RFC8707"/>
        </reference>
        <reference anchor="RFC9126">
          <front>
            <title>OAuth 2.0 Pushed Authorization Requests</title>
            <author fullname="T. Lodderstedt" initials="T." surname="Lodderstedt"/>
            <author fullname="B. Campbell" initials="B." surname="Campbell"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <author fullname="D. Tonge" initials="D." surname="Tonge"/>
            <author fullname="F. Skokan" initials="F." surname="Skokan"/>
            <date month="September" year="2021"/>
            <abstract>
              <t>This document defines the pushed authorization request (PAR) endpoint, which allows clients to push the payload of an OAuth 2.0 authorization request to the authorization server via a direct request and provides them with a request URI that is used as reference to the data in a subsequent call to the authorization endpoint.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9126"/>
          <seriesInfo name="DOI" value="10.17487/RFC9126"/>
        </reference>
        <reference anchor="RFC9449">
          <front>
            <title>OAuth 2.0 Demonstrating Proof of Possession (DPoP)</title>
            <author fullname="D. Fett" initials="D." surname="Fett"/>
            <author fullname="B. Campbell" initials="B." surname="Campbell"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="T. Lodderstedt" initials="T." surname="Lodderstedt"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="D. Waite" initials="D." surname="Waite"/>
            <date month="September" year="2023"/>
            <abstract>
              <t>This document describes a mechanism for sender-constraining OAuth 2.0 tokens via a proof-of-possession mechanism on the application level. This mechanism allows for the detection of replay attacks with access and refresh tokens.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9449"/>
          <seriesInfo name="DOI" value="10.17487/RFC9449"/>
        </reference>
        <reference anchor="RFC9470">
          <front>
            <title>OAuth 2.0 Step Up Authentication Challenge Protocol</title>
            <author fullname="V. Bertocci" initials="V." surname="Bertocci"/>
            <author fullname="B. Campbell" initials="B." surname="Campbell"/>
            <date month="September" year="2023"/>
            <abstract>
              <t>It is not uncommon for resource servers to require different authentication strengths or recentness according to the characteristics of a request. This document introduces a mechanism that resource servers can use to signal to a client that the authentication event associated with the access token of the current request does not meet its authentication requirements and, further, how to meet them. This document also codifies a mechanism for a client to request that an authorization server achieve a specific authentication strength or recentness when processing an authorization request.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9470"/>
          <seriesInfo name="DOI" value="10.17487/RFC9470"/>
        </reference>
        <reference anchor="I-D.ietf-oauth-cross-device-security">
          <front>
            <title>Cross-Device Flows: Security Best Current Practice</title>
            <author fullname="Pieter Kasselman" initials="P." surname="Kasselman">
              <organization>Defakto</organization>
            </author>
            <author fullname="Daniel Fett" initials="D." surname="Fett">
              <organization>Authlete</organization>
            </author>
            <author fullname="Filip Skokan" initials="F." surname="Skokan">
              <organization>Okta</organization>
            </author>
            <date day="23" month="January" year="2026"/>
            <abstract>
              <t>   This document describes threats against cross-device flows along with
   practical mitigations, protocol selection guidance, and a summary of
   formal analysis results identified as relevant to the security of
   cross-device flows.  It serves as a security guide to system
   designers, architects, product managers, security specialists, fraud
   analysts and engineers implementing cross-device flows.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-cross-device-security-15"/>
        </reference>
        <reference anchor="OpenID.Native-SSO" target="https://openid.net/specs/openid-connect-native-sso-1_0.html">
          <front>
            <title>OpenID Connect Native SSO for Mobile Apps</title>
            <author initials="G." surname="Fletcher">
              <organization/>
            </author>
            <date year="2022" month="November"/>
          </front>
        </reference>
        <reference anchor="OpenID" target="https://openid.net/specs/openid-connect-core-1_0.html">
          <front>
            <title>OpenID Connect Core 1.0</title>
            <author initials="N." surname="Sakimura">
              <organization/>
            </author>
            <author initials="J." surname="Bradley">
              <organization/>
            </author>
            <author initials="M." surname="Jones">
              <organization/>
            </author>
            <author initials="B." surname="de Medeiros">
              <organization/>
            </author>
            <author initials="C." surname="Mortimore">
              <organization/>
            </author>
            <date year="2014" month="November"/>
          </front>
        </reference>
        <reference anchor="IANA.oauth-parameters" target="https://www.iana.org/assignments/oauth-parameters">
          <front>
            <title>OAuth Parameters</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.JWT">
          <front>
            <title>*** BROKEN REFERENCE ***</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="USASCII">
          <front>
            <title>Coded Character Set -- 7-bit American Standard Code for Information Interchange, ANSI X3.4</title>
            <author initials="A. N. S." surname="Institute" fullname="American National Standards Institute">
              <organization/>
            </author>
            <date year="1986"/>
          </front>
        </reference>
        <reference anchor="SHS" target="http://dx.doi.org/10.6028/NIST.FIPS.180-4">
          <front>
            <title>"Secure Hash Standard (SHS)", FIPS PUB 180-4, DOI 10.6028/NIST.FIPS.180-4</title>
            <author initials="N. I. of S. and" surname="Technology" fullname="National Institute of Standards and Technology">
              <organization/>
            </author>
            <date year="2015" month="August"/>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC6750">
          <front>
            <title>The OAuth 2.0 Authorization Framework: Bearer Token Usage</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="D. Hardt" initials="D." surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>This specification describes how to use bearer tokens in HTTP requests to access OAuth 2.0 protected resources. Any party in possession of a bearer token (a "bearer") can use it to get access to the associated resources (without demonstrating possession of a cryptographic key). To prevent misuse, bearer tokens need to be protected from disclosure in storage and in transport. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6750"/>
          <seriesInfo name="DOI" value="10.17487/RFC6750"/>
        </reference>
        <reference anchor="RFC8252">
          <front>
            <title>OAuth 2.0 for Native Apps</title>
            <author fullname="W. Denniss" initials="W." surname="Denniss"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <date month="October" year="2017"/>
            <abstract>
              <t>OAuth 2.0 authorization requests from native apps should only be made through external user-agents, primarily the user's browser. This specification details the security and usability reasons why this is the case and how native apps and authorization servers can implement this best practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="212"/>
          <seriesInfo name="RFC" value="8252"/>
          <seriesInfo name="DOI" value="10.17487/RFC8252"/>
        </reference>
        <reference anchor="I-D.ietf-oauth-browser-based-apps">
          <front>
            <title>OAuth 2.0 for Browser-Based Applications</title>
            <author fullname="Aaron Parecki" initials="A." surname="Parecki">
              <organization>Okta</organization>
            </author>
            <author fullname="Philippe De Ryck" initials="P." surname="De Ryck">
              <organization>Pragmatic Web Security</organization>
            </author>
            <author fullname="David Waite" initials="D." surname="Waite">
              <organization>Ping Identity</organization>
            </author>
            <date day="3" month="December" year="2025"/>
            <abstract>
              <t>   This specification details the threats, attack consequences, security
   considerations and best practices that must be taken into account
   when developing browser-based applications that use OAuth 2.0.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Discussion of this document takes place on the Web Authorization
   Protocol Working Group mailing list (oauth@ietf.org), which is
   archived at https://mailarchive.ietf.org/arch/browse/oauth/.

   Source for this draft and an issue tracker can be found at
   https://github.com/oauth-wg/oauth-browser-based-apps.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-browser-based-apps-26"/>
        </reference>
        <reference anchor="I-D.ietf-oauth-attestation-based-client-auth">
          <front>
            <title>OAuth 2.0 Attestation-Based Client Authentication</title>
            <author fullname="Tobias Looker" initials="T." surname="Looker">
              <organization>MATTR</organization>
            </author>
            <author fullname="Paul Bastian" initials="P." surname="Bastian">
              <organization>Bundesdruckerei</organization>
            </author>
            <author fullname="Christian Bormann" initials="C." surname="Bormann">
              <organization>SPRIND</organization>
            </author>
            <date day="15" month="September" year="2025"/>
            <abstract>
              <t>   This specification defines an extension to the OAuth 2 protocol as
   defined in [RFC6749] which enables a Client Instance to include a
   key-bound attestation in interactions with an Authorization Server or
   a Resource Server.  This new method enables Client Instances involved
   in a client deployment that is traditionally viewed as a public
   client, to be able to utilize this key-bound attestation to
   authenticate.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-attestation-based-client-auth-07"/>
        </reference>
      </references>
    </references>
    <?line 720?>

<section anchor="example-user-experiences">
      <name>Example User Experiences</name>
      <t>This section provides non-normative examples of how this specification may be used to support specific use cases.</t>
      <section anchor="passkey">
        <name>Passkey</name>
        <t>A user may log in with a passkey (without a password).</t>
        <ol spacing="normal" type="1"><li>
            <t>The Client collects the username from the user.</t>
          </li>
          <li>
            <t>The Client sends an Authorization Challenge Request (<xref target="challenge-request"/>) to the Authorization Challenge Endpoint (<xref target="authorization-challenge-endpoint"/>) including the username.</t>
          </li>
          <li>
            <t>The Authorization Server verifies the username and returns a challenge</t>
          </li>
          <li>
            <t>The user is prompted for verification with biometrics or a PIN, enabling the Client to sign the challenge using the passkey.</t>
          </li>
          <li>
            <t>The Client sends the signed challenge, username, and credential ID to the Authorization Challenge Endpoint (<xref target="authorization-challenge-endpoint"/>).</t>
          </li>
          <li>
            <t>The Authorization Server verifies the signed challenge and returns an Authorization Code.</t>
          </li>
          <li>
            <t>The Client requests an Access Token and Refresh Token by issuing a Token Request (<xref target="token-request"/>) to the Token Endpoint.</t>
          </li>
          <li>
            <t>The Authorization Server verifies the Authorization Code and issues the requested tokens.</t>
          </li>
        </ol>
      </section>
      <section anchor="redirect-to-authorization-server">
        <name>Redirect to Authorization Server</name>
        <t>A user may be redirected to the Authorization Server to perfrom an account reset.</t>
        <ol spacing="normal" type="1"><li>
            <t>The Client collects username from the user.</t>
          </li>
          <li>
            <t>The Client sends an Authorization Challenge Request (<xref target="challenge-request"/>) to the Authorization Challenge Endpoint (<xref target="authorization-challenge-endpoint"/>) including the username.</t>
          </li>
          <li>
            <t>The Authorization Server verifies the username and determines that the account is locked and returns a Redirect error response.</t>
          </li>
          <li>
            <t>The Client parses the redirect message, opens a browser and redirects the user to the Authorization Server performing an OAuth 2.0 flow with PKCE.</t>
          </li>
          <li>
            <t>The user resets their account by performing a multi-step authentication flow with the Authorization Server.</t>
          </li>
          <li>
            <t>The Authorization Server issues an Authorization Code in a redirect back to the client, which then exchanges it for an access and refresh token.</t>
          </li>
        </ol>
      </section>
      <section anchor="passwordless-one-time-password-otp">
        <name>Passwordless One-Time Password (OTP)</name>
        <t>In a passwordless One-Time Password (OTP) scheme, the user is in possession of a one-time password generator. This generator may be a hardware device, or implemented as an app on a mobile phone. The user provides a user identifier and one-time password, which is verified by the Authorization Server before it issues an Authorization Code, which can be exchanged for an Access and Refresh Token.</t>
        <ol spacing="normal" type="1"><li>
            <t>The Client collects username and OTP from user.</t>
          </li>
          <li>
            <t>The Client sends an Authorization Challenge Request (<xref target="challenge-request"/>) to the Authorization Challenge Endpoint (<xref target="authorization-challenge-endpoint"/>) including the username and OTP.</t>
          </li>
          <li>
            <t>The Authorization Server verifies the username and OTP and returns an Authorization Code.</t>
          </li>
          <li>
            <t>The Client requests an Access Token and Refresh Token by issuing a Token Request (<xref target="token-request"/>) to the Token Endpoint.</t>
          </li>
          <li>
            <t>The Authorization Server verifies the Authorization Code and issues the requested tokens.</t>
          </li>
        </ol>
      </section>
      <section anchor="e-mail-confirmation-code">
        <name>E-Mail Confirmation Code</name>
        <t>A user may be required to provide an e-mail confirmation code as part of an authentication ceremony to prove they control an e-mail address. The user provides an e-mail address and is then required to enter a verification code sent to the e-mail address. If the correct verification code is returned to the Authorization Server, it issues Access and Refresh Tokens.</t>
        <ol spacing="normal" type="1"><li>
            <t>The Client collects an e-mail address from the user.</t>
          </li>
          <li>
            <t>The Client sends the e-mail address in an Authorization Challenge Request (<xref target="challenge-request"/>) to the Authorization Challenge Endpoint (<xref target="authorization-challenge-endpoint"/>).</t>
          </li>
          <li>
            <t>The Authorization Server sends a verification code to the e-mail address and returns an Error Response (<xref target="challenge-error-response"/>) including <tt>"error": "insufficient_authorization"</tt>, <tt>"auth_session"</tt> and a custom property indicating that an e-mail verification code must be entered.</t>
          </li>
          <li>
            <t>The Client presents a user experience guiding the user to copy the e-mail verification code to the Client. Once the e-mail verification code is entered, the Client sends an Authorization Challenge Request to the Authorization Challenge Endpoint, including the e-mail verification code as well as the <tt>auth_session</tt> parameter returned in the previous Error Response.</t>
          </li>
          <li>
            <t>The Authorization Server uses the <tt>auth_session</tt> to maintain the session and verifies the e-mail verification code before issuing an Authorization Code to the Client.</t>
          </li>
          <li>
            <t>The Client sends the Authorization Code in a Token Request (<xref target="token-request"/>) to the Token Endpoint.</t>
          </li>
          <li>
            <t>The Authorization Server verifies the Authorization Code and issues the Access Token and Refresh Token.</t>
          </li>
        </ol>
        <t>An alternative version of this verification involves the user clicking a link in an email rather than manually entering a verification code. This is typically done for email verification flows rather than inline in a login flow. The protocol-level details remain the same for the alternative flow despite the different user experience. All steps except step 4 above remain the same, but the client presents an alternative user experience for step 4 described below:</t>
        <ul spacing="normal">
          <li>
            <t>The Client presents a message to the user instructing them to click the link sent to their email address. The user clicks the link in the email, which contains the verification code in the URL. The URL launches the app providing the verification code to the Client. The Client sends the verification code and <tt>auth_session</tt> to the Authorization Challenge Endpoint.</t>
          </li>
        </ul>
      </section>
      <section anchor="mobile-confirmation-code">
        <name>Mobile Confirmation Code</name>
        <t>A user may be required to provide a confirmation code as part of an authentication ceremony to prove they control a mobile phone number. The user provides a phone number and is then required to enter a confirmation code sent to the phone. If the correct confirmation code is returned to the Authorization Server, it issues Access and Refresh Tokens.</t>
        <ol spacing="normal" type="1"><li>
            <t>The Client collects a mobile phone number from the user.</t>
          </li>
          <li>
            <t>The Client sends the phone number in an Authorization Challenge Request (<xref target="challenge-request"/>) to the Authorization Challenge Endpoint (<xref target="authorization-challenge-endpoint"/>).</t>
          </li>
          <li>
            <t>The Authorization Server sends a confirmation code to the phone number and returns an Error Response (<xref target="challenge-error-response"/>) including <tt>"error": "insufficient_authorization"</tt>, <tt>"auth_session"</tt> and a custom property indicating that a confirmation code must be entered.</t>
          </li>
          <li>
            <t>The Client presents a user experience guiding the user to enter the confirmation code. Once the code is entered, the Client sends an Authorization Challenge Request to the Authorization Challenge Endpoint, including the confirmation code as well as the <tt>auth_session</tt> parameter returned in the previous Error Response.</t>
          </li>
          <li>
            <t>The Authorization Server uses the <tt>auth_session</tt> to maintain the session context and verifies the code before issuing an Authorization Code to the Client.</t>
          </li>
          <li>
            <t>The Client sends the Authorization Code in a Token Request (<xref target="token-request"/>) to the Token Endpoint.</t>
          </li>
          <li>
            <t>The Authorization Server verifies the Authorization Code and issues the Access Token and Refresh Token.</t>
          </li>
        </ol>
      </section>
      <section anchor="refresh-token-example">
        <name>Re-authenticating to an app a week later using OTP</name>
        <t>A client may be in possession of an Access and Refresh Token as the result of a previous succesful user authentication. The user returns to the app a week later and accesses the app. The Client presents the Access Token, but receives an error indicating the Access Token is no longer valid. The Client presents a Refresh Token to the Authorization Server to obtain a new Access Token. If the Authorization Server requires user interaction for reasons based on its own policies, it rejects the Refresh Token and the Client re-starts the user authentication flow to obtain new Access and Refresh Tokens.</t>
        <ol spacing="normal" type="1"><li>
            <t>The Client has a short-lived access token and long-lived refresh token following a previous completion of an Authorization Grant Flow which included user authentication.</t>
          </li>
          <li>
            <t>A week later, the user launches the app and tries to access a protected resource at the Resource Server.</t>
          </li>
          <li>
            <t>The Resource Server responds with an error code indicating an invalid access token since it has expired.</t>
          </li>
          <li>
            <t>The Client presents the refresh token to the Authorization Server to obtain a new access token (section 6 <xref target="RFC6749"/>)</t>
          </li>
          <li>
            <t>The Authorization Server responds with an error code indicating that an OTP from the user is required, as well as an <tt>auth_session</tt>.</t>
          </li>
          <li>
            <t>The Client prompts the user to enter an OTP.</t>
          </li>
          <li>
            <t>The Client sends the OTP and <tt>auth_session</tt> in an Authorization Challenge Request (<xref target="challenge-request"/>) to the Authorization Challenge Endpoint (<xref target="authorization-challenge-endpoint"/>).</t>
          </li>
          <li>
            <t>The Authorization Server verifies the <tt>auth_session</tt> and OTP, and returns an Authorization Code.</t>
          </li>
          <li>
            <t>The Client sends the Authorization Code in a Token Request (<xref target="token-request"/>) to the Token Endpoint.</t>
          </li>
          <li>
            <t>The Authorization Server verifies the Authorization Code and issues the requested tokens.</t>
          </li>
          <li>
            <t>The Client presents the new Access Token to the Resource Server in order to access the protected resource.</t>
          </li>
        </ol>
      </section>
      <section anchor="step-up-sms-example">
        <name>Step-up Authentication using Confirmation SMS</name>
        <t>A Client previously obtained an Access and Refresh Token after the user authenticated with an OTP. When the user attempts to access a protected resource, the Resource Server determines that it needs an additional level of authentication and triggers a step-up authentication, indicating the desired level of authentication using <tt>acr_values</tt> and <tt>max_age</tt> as defined in the Step-up Authentication specification. The Client initiates an authorization request with the Authorization Server indicating the <tt>acr_values</tt> and <tt>max_age</tt> parameters. The Authorization Server responds with error messages promptng for additional authentication until the <tt>acr_values</tt> and <tt>max_age</tt> values are satisfied before issuing fresh Access and Refresh Tokens.</t>
        <ol spacing="normal" type="1"><li>
            <t>The Client has a short-lived access token and long-lived refresh token following the completion of an Authorization Code Grant Flow which included user authentication.</t>
          </li>
          <li>
            <t>When the Client presents the Access token to the Resource Server, the Resource Server determines that the <tt>acr</tt> claim in the Access Token is insufficient given the resource the user wants to access and responds with an <tt>insufficient_user_authentication</tt> error code, along with the desired <tt>acr_values</tt> and desired <tt>max_age</tt>.</t>
          </li>
          <li>
            <t>The Client sends an Authorization Challenge Request (<xref target="challenge-request"/>) to the Authorization Challenge Endpoint (<xref target="authorization-challenge-endpoint"/>) including the <tt>auth_session</tt>, <tt>acr_values</tt> and <tt>max_age</tt> parameters.</t>
          </li>
          <li>
            <t>The Authorization Server verifies the <tt>auth_session</tt> and determines which authentication methods must be satisfied based on the <tt>acr_values</tt>, and responds with an Error Response (<xref target="challenge-error-response"/>) including <tt>"error": "insufficient_authorization"</tt> and a custom property indicating that an OTP must be entered.</t>
          </li>
          <li>
            <t>The Client prompts the user for an OTP, which the user obtains and enters.</t>
          </li>
          <li>
            <t>The Client sends an Authorization Challenge Request to the Authorization Challenge Endpoint including the <tt>auth_session</tt> and OTP.</t>
          </li>
          <li>
            <t>The Authorization Server verifies the OTP and returns an Authorization Code.</t>
          </li>
          <li>
            <t>The Client sends the Authorization Code in a Token Request (<xref target="token-request"/>) to the Token Endpoint.</t>
          </li>
          <li>
            <t>The Authorization Server verifies the Authorization Code and issues an Access Token with the updated <tt>acr</tt> value along with the Refresh Token.</t>
          </li>
          <li>
            <t>The Client presents the Access Token to the Resources Server, which verifies that the <tt>acr</tt> value meets its requirements before granting access to the protected resource.</t>
          </li>
        </ol>
      </section>
      <section anchor="registration">
        <name>Registration</name>
        <t>This example describes how to use the mechanisms defined in this draft to create a complete user registration flow starting with an email address. In this example, it is the Authorization Server's policy to allow these challenges to be sent to email and phone number that were previously unrecognized, and creating the user account on the fly.</t>
        <ol spacing="normal" type="1"><li>
            <t>The Client collects a username from the user.</t>
          </li>
          <li>
            <t>The Client sends an Authorization Challenge Request (<xref target="challenge-request"/>) to the Authorization Challenge Endpoint (<xref target="authorization-challenge-endpoint"/>) including the username.</t>
          </li>
          <li>
            <t>The Authorization Server returns an Error Response (<xref target="challenge-error-response"/>) including <tt>"error": "insufficient_authorization"</tt>, <tt>"auth_session"</tt>, and a custom property indicating that an e-mail address must be collected.</t>
          </li>
          <li>
            <t>The Client collects an e-mail address from the user.</t>
          </li>
          <li>
            <t>The Client sends the e-mail address as part of a second Authorization Challenge Request to the Authorization Challenge Endpoint, along with the <tt>auth_session</tt> parameter.</t>
          </li>
          <li>
            <t>The Authorization Server sends a verification code to the e-mail address and returns an Error Response including <tt>"error": "insufficient_authorization"</tt>, <tt>"auth_session"</tt> and a custom property indicating that an e-mail verification code must be entered.</t>
          </li>
          <li>
            <t>The Client presents a user experience guiding the user to copy the e-mail verification code to the Client. Once the e-mail verification code is entered, the Client sends an Authorization Challenge Request to the Authorization Challenge Endpoint, including the e-mail verification code as well as the <tt>auth_session</tt> parameter returned in the previous Error Response.</t>
          </li>
          <li>
            <t>The Authorization Server uses the <tt>auth_session</tt> to maintain the session context, and verifies the e-mail verification code. It determines that it also needs a phone number for account recovery purposes and returns an Error Response including <tt>"error": "insufficient_authorization"</tt>, <tt>"auth_session"</tt> and a custom property indicating that a phone number must be collected.</t>
          </li>
          <li>
            <t>The Client collects a mobile phone number from the user.</t>
          </li>
          <li>
            <t>The Client sends the phone number in an Authorization Challenge Request to the Authorization Challenge Endpoint, along with the <tt>auth_session</tt>.</t>
          </li>
          <li>
            <t>The Authorization Server uses the <tt>auth_session</tt> parameter to link the previous requests. It sends a confirmation code to the phone number and returns an Error Response including <tt>"error": "insufficient_authorization"</tt>, <tt>"auth_session"</tt> and a custom property indicating that a SMS confirmation code must be entered.</t>
          </li>
          <li>
            <t>The Client presents a user experience guiding the user to enter the SMS confirmation code. Once the SMS verification code is entered, the Client sends an Authorization Challenge Request to the Authorization Challenge Endpoint, including the confirmation code as well as the <tt>auth_session</tt> parameter returned in the previous Error Response.</t>
          </li>
          <li>
            <t>The Authorization Server uses the <tt>auth_session</tt> to maintain the session context, and verifies the SMS verification code before issuing an Authorization Code to the Client.</t>
          </li>
          <li>
            <t>The Client sends the Authorization Code in a Token Request (<xref target="token-request"/>) to the Token Endpoint.</t>
          </li>
          <li>
            <t>The Authorization Server verifies the Authorization Code and issues the requested tokens.</t>
          </li>
        </ol>
      </section>
    </section>
    <section anchor="example-implementations">
      <name>Example Implementations</name>
      <t>In order to successfully implement this specification, the Authorization Server will need to define its own specific profile for what values clients are expected to send in the Authorization Challenge Request (<xref target="challenge-request"/>), as well as AS-defined specific error codes in the Authorization Challenge Response (<xref target="challenge-response"/>).</t>
      <t>It is expected that service providers will wrap the implementation of this specification in an SDK which will be used by application developers, removing the need for application developers to implement the specification themselves.</t>
      <t>Below is an example profile that allows for a successful implementation that enables the user to log in with a
username and OTP. This example is included for illustration purposes only to help AS developers define the profile
for their deployment and ecosystem.</t>
      <section anchor="authorization-challenge-request-parameters">
        <name>Authorization Challenge Request Parameters</name>
        <t>In addition to the request parameters defined in <xref target="challenge-request"/>, the authorization server defines the additional parameters below.</t>
        <dl>
          <dt>"username":</dt>
          <dd>
            <t><bcp14>REQUIRED</bcp14> for the initial Authorization Challenge Request.</t>
          </dd>
          <dt>"otp":</dt>
          <dd>
            <t>The OTP collected from the user. <bcp14>REQUIRED</bcp14> when re-trying an Authorization Challenge Request in response to the <tt>otp_required</tt> error defined below.</t>
          </dd>
        </dl>
      </section>
      <section anchor="authorization-challenge-response-parameters">
        <name>Authorization Challenge Response Parameters</name>
        <t>In addition to the response parameters defined in <xref target="challenge-response"/>, the authorization server defines the additional parameter below.</t>
        <dl>
          <dt>"otp_required":</dt>
          <dd>
            <t>The client should collect an OTP from the user and send the OTP in
a second request to the Authorization Challenge Endpoint. The HTTP
response code to use with this error value is <tt>401 Unauthorized</tt>.</t>
          </dd>
        </dl>
      </section>
      <section anchor="example-sequence-initial-authorization">
        <name>Example Sequence - Initial Authorization</name>
        <t>The client prompts the user to enter their username, and sends the username in an initial Authorization Challenge Request.</t>
        <artwork><![CDATA[
POST /authorize-challenge HTTP/1.1
Host: server.example.com
Content-Type: application/x-www-form-urlencoded

username=alice
&scope=photos
&client_id=bb16c14c73415
]]></artwork>
        <t>The Authorization Server sends an error response indicating that an OTP is required.</t>
        <artwork><![CDATA[
HTTP/1.1 401 Unauthorized
Content-Type: application/json
Cache-Control: no-store

{
  "error": "insufficient_authorization",
  "auth_session": "ce6772f5e07bc8361572f",
  "otp_required": true
}
]]></artwork>
        <t>The client prompts the user for an OTP, and sends a new Authorization Challenge Request.</t>
        <artwork><![CDATA[
POST /authorize-challenge HTTP/1.1
Host: server.example.com
Content-Type: application/x-www-form-urlencoded

auth_session=ce6772f5e07bc8361572f
&otp=555121
]]></artwork>
        <t>The Authorization Server validates the <tt>auth_session</tt> to find the expected user, then validates the OTP for that user, and responds with an authorization code.</t>
        <artwork><![CDATA[
HTTP/1.1 200 OK
Content-Type: application/json
Cache-Control: no-store

{
  "authorization_code": "uY29tL2F1dGhlbnRpY"
}
]]></artwork>
        <t>The client sends the authorization code to the token endpoint.</t>
        <artwork><![CDATA[
POST /token HTTP/1.1
Host: server.example.com
Content-Type: application/x-www-form-urlencoded

grant_type=authorization_code
&client_id=bb16c14c73415
&code=uY29tL2F1dGhlbnRpY
]]></artwork>
        <t>The Authorization Server responds with an access token and refresh token.</t>
        <artwork><![CDATA[
HTTP/1.1 200 OK
Content-Type: application/json
Cache-Control: no-store

{
  "token_type": "Bearer",
  "expires_in": 3600,
  "access_token": "d41c0692f1187fd9b326c63d",
  "refresh_token": "e090366ac1c448b8aed84cbc07"
}
]]></artwork>
      </section>
      <section anchor="example-sequence-refresh-token-request-triggering-additional-authorization">
        <name>Example Sequence - Refresh Token Request Triggering Additional Authorization</name>
        <t>This example illustrates the use case described in <xref target="refresh-token-example"/>.</t>
        <t>The client sends a refresh token request to obtain a new access token.</t>
        <artwork><![CDATA[
POST /token HTTP/1.1
Host: server.example.com
Content-Type: application/x-www-form-urlencoded

grant_type=refresh_token
&client_id=bb16c14c73415
&refresh_token=e090366ac1c448b8aed84cbc07
]]></artwork>
        <t>The Authorization Server determines that additional authorization is required (for example, step-up or re-verification) before the refresh token can be used, and returns an authorization challenge error response.</t>
        <artwork><![CDATA[
HTTP/1.1 403 Forbidden
Content-Type: application/json
Cache-Control: no-store

{
  "error": "insufficient_authorization",
  "auth_session": "ce6772f5e07bc8361572f",
  "otp_required": true
}
]]></artwork>
        <t>The client prompts the user for an OTP, and sends an Authorization Challenge Request to continue the authorization session identified by <tt>auth_session</tt>.</t>
        <artwork><![CDATA[
POST /authorize-challenge HTTP/1.1
Host: server.example.com
Content-Type: application/x-www-form-urlencoded

auth_session=ce6772f5e07bc8361572f
&otp=555121
]]></artwork>
        <t>The Authorization Server validates the <tt>auth_session</tt> to find the expected user, then validates the OTP for that user, and responds with an authorization code.</t>
        <artwork><![CDATA[
HTTP/1.1 200 OK
Content-Type: application/json
Cache-Control: no-store

{
  "authorization_code": "uY29tL2F1dGhlbnRpY"
}
]]></artwork>
        <t>The client sends the authorization code to the token endpoint.</t>
        <artwork><![CDATA[
POST /token HTTP/1.1
Host: server.example.com
Content-Type: application/x-www-form-urlencoded

grant_type=authorization_code
&client_id=bb16c14c73415
&code=uY29tL2F1dGhlbnRpY
]]></artwork>
        <t>The Authorization Server responds with an access token and new refresh token.</t>
        <artwork><![CDATA[
HTTP/1.1 200 OK
Content-Type: application/json
Cache-Control: no-store

{
  "token_type": "Bearer",
  "expires_in": 3600,
  "access_token": "d41c0692f1187fd9b326c63d",
  "refresh_token": "f2b0f7d9a41f4d59a8c1e9b3ab"
}
]]></artwork>
      </section>
    </section>
    <section anchor="design-goals">
      <name>Design Goals</name>
      <t>This specification defines a new authorization flow the client can use to obtain an authorization grant. There are two primary reasons for designing the specification this way.</t>
      <t>This enables existing OAuth implementations to make fewer modifications to existing code by not needing to extend the token endpoint with new logic. Instead, the new logic can be encapsulated in an entirely new endpoint, the output of which is an authorization code which can be redeemed for an access token at the existing token endpoint.</t>
      <t>This also mirrors more closely the existing architecture of the redirect-based authorization code flow. In the authorization code flow, the client first initiates a request by redirecting a browser to the authorization endpoint, at which point the authorization server takes over with its own custom logic to authenticate the user in whatever way appropriate, possibly including interacting with other endpoints for the actual user authentication process. Afterwards, the authorization server redirects the user back to the client application with an authorization code in the query string. This specification mirrors the existing approach by having the client first make a POST request to the Authorization Challenge Endpoint, at which point the authorization server provides its own custom logic to authenticate the user, eventually returning an authorization code.</t>
      <t>An alternative design would be to define new custom grant types for the different authentication factors such as WebAuthn, OTP, etc. The drawback to this design is that conceptually, these authentication methods do not map to an OAuth grant. In other words, the OAuth authorization grant captures the user's intent to authorize access to some data, and that authorization is represented by an authorization code, not by different methods of authenticating the user.</t>
      <t>Another alternative option would be to have the Authorization Challenge Endpoint return an access token upon successful authentication of the user. This was deliberately not chosen, as this adds a new endpoint that tokens would be returned from. In most deployments, the Token Endpoint is the only endpoint that actually issues tokens, and includes all the implmentation logic around token binding, rate limiting, etc. Instead of defining a new endpoint that issues tokens which would have to have similar logic and protections, instead the new endpoint only issues authorization codes, which can be exchanged for tokens at the existing Token Endpoint just like in the redirect-based Authorization Code flow.</t>
      <t>These design decisions should enable authorization server implementations to isolate and encapsulate the changes needed to support this specification.</t>
    </section>
    <section anchor="document-history">
      <name>Document History</name>
      <t>-03</t>
      <ul spacing="normal">
        <li>
          <t>Editorial clarifications and improvements</t>
        </li>
        <li>
          <t>Pointed definition of authorization code to section 1.3.1 of RFC 6749</t>
        </li>
        <li>
          <t>Updated <tt>auth_session</tt> binding requirements to <bcp14>SHOULD</bcp14>, and added a reference to DPoP</t>
        </li>
        <li>
          <t>Revised introduction and context to clarify this draft is intended for first-party applications but can be extended for third-party in some situations</t>
        </li>
        <li>
          <t>Added <tt>response_type=code</tt> as a required parameter to match RFC 6749</t>
        </li>
      </ul>
      <t>-02</t>
      <ul spacing="normal">
        <li>
          <t>Updated affiliations and acks</t>
        </li>
        <li>
          <t>Editorial clarifications</t>
        </li>
        <li>
          <t>Added reference to Attestation-Based Client Authentication</t>
        </li>
      </ul>
      <t>-01</t>
      <ul spacing="normal">
        <li>
          <t>Corrected "re-authorization of the user" to "re-authentication of the user"</t>
        </li>
      </ul>
      <t>-00</t>
      <ul spacing="normal">
        <li>
          <t>Adopted into the OAuth WG, no changes from previous individual draft</t>
        </li>
      </ul>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank the attendees of the OAuth Security Workshop 2023 session in which this was discussed, as well as the following individuals who contributed ideas, feedback, and wording that shaped and formed the final specification:</t>
      <t>Alejo Fernandez, Brian Campbell, Dean Saxe, Dick Hardt, Dmitry Telegin, Evert Pot, Janak Amarasena, Jeff Corrigan, John Bradley, Justin Richer, Kristina Yasuda, Martin Besozzi, Matt MacAdam, Mike Jones, Orie Steele, Tim Cappalli, Tobias Looker, Yaron Sheffer, Yaron Zehavi.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
