<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-skokan-oauth-resource-response-02" category="std" consensus="true" submissionType="IETF" updates="8707" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="OAuth Resource Response">Resource Indicator Response Parameter for OAuth 2.0</title>
    <seriesInfo name="Internet-Draft" value="draft-skokan-oauth-resource-response-02"/>
    <author fullname="Filip Skokan">
      <organization>Okta</organization>
      <address>
        <email>panva.ip@gmail.com</email>
      </address>
    </author>
    <date year="2026" month="March" day="02"/>
    <area>Security</area>
    <workgroup>Web Authorization Protocol</workgroup>
    <keyword>OAuth</keyword>
    <keyword>Resource</keyword>
    <keyword>Audience</keyword>
    <abstract>
      <?line 61?>

<t>This document defines the <tt>resource</tt> parameter for OAuth 2.0 access
token responses, enabling an authorization server to indicate to the
client the resource(s) which an issued access token is for. It updates
"Resource Indicators for OAuth 2.0" (RFC 8707).</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://panva.github.io/draft-oauth-rfc8707bis/draft-skokan-oauth-resource-response.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-skokan-oauth-resource-response/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Web Authorization Protocol Working Group mailing list (<eref target="mailto:oauth@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/oauth/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/oauth/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/panva/draft-oauth-rfc8707bis"/>.</t>
    </note>
  </front>
  <middle>
    <?line 69?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>"Resource Indicators for OAuth 2.0" <xref target="RFC8707"/> defines the <tt>resource</tt>
request parameter for use in authorization requests and access token
requests, enabling a client to signal the target protected resource(s)
to an authorization server. However, it does not define a corresponding
response parameter that would allow the authorization server to
communicate back to the client which resource(s) the issued access token
is actually for.</t>
      <t>Without a response parameter, a client cannot reliably determine the
effective resource(s) of an issued access token when the authorization
server restricts the token to a subset of the requested resources, or
when it applies a default resource policy in cases where the client did
not include the <tt>resource</tt> parameter in its request.</t>
      <t>This document addresses that gap by defining the <tt>resource</tt> parameter
for use in access token responses.</t>
      <section anchor="requirements-notation-and-conventions">
        <name>Requirements Notation and Conventions</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="ResourceResponseParameter">
      <name>Access Token Response Resource Parameter</name>
      <t>In access token responses, the <tt>resource</tt> parameter is represented as a
JSON array of strings, unlike the repeated form-encoded or query
parameter used in requests defined in <xref target="RFC8707"/>.</t>
      <t>The <tt>resource</tt> parameter defined for an access token response
(<xref section="5.1" sectionFormat="of" target="RFC6749"/>) is used to indicate to the client the
resource(s) which an issued access token is for.</t>
      <dl>
        <dt>resource:</dt>
        <dd>
          <t><bcp14>OPTIONAL</bcp14>, if identical to the <tt>resource</tt> value(s) requested by the
client; otherwise, <bcp14>REQUIRED</bcp14>. Its value is a JSON array of strings,
where each string is an absolute URI as specified by
<xref section="4.3" sectionFormat="of" target="RFC3986"/>, identifying a protected resource for
which the access token is valid. The array <bcp14>MUST</bcp14> contain at least
one value.</t>
        </dd>
      </dl>
      <t>[[TODO:
(<eref target="https://github.com/panva/draft-oauth-rfc8707bis/issues/1">#1</eref>)
Should the response use <tt>resource</tt> (a JSON string) when a
single resource is indicated and <tt>resources</tt> (a JSON array of strings)
when multiple are indicated instead?]]</t>
      <t>The <tt>resource</tt> response parameter serves a similar role to the <tt>scope</tt>
response parameter defined in <xref section="5.1" sectionFormat="of" target="RFC6749"/>: it informs the
client when the resource(s) associated with the issued access token
differ from what the client requested. This can occur when the
authorization server restricts the token to a subset of the requested
resources, or when the authorization server applies a default resource
policy in cases where the client did not include the <tt>resource</tt> parameter
in its request.</t>
      <t>If the client requested access to multiple resources but the
authorization server issues an access token that is restricted to a
subset of those resources, the authorization server <bcp14>MUST</bcp14> include the
<tt>resource</tt> parameter in the response to inform the client of the
effective resource(s). The client can then make additional token requests
for the remaining resources as needed.</t>
      <section anchor="ScopeDeterminedResources">
        <name>Scope or Policy Determined Resources</name>
        <t>In some deployments, certain scope values are inherently associated with
specific protected resources. For example, the <tt>openid</tt> scope in
OpenID Connect <xref target="OpenID.Core"/> is tightly coupled to the UserInfo
endpoint, and authorization
servers may define scope values that are only meaningful at a particular
resource.</t>
        <t>When an authorization server issues an access token for a resource that
it determined based on requested scope values or its own default policy,
rather than from an explicit <tt>resource</tt> request parameter, the
authorization server <bcp14>SHOULD</bcp14> use the resource's designated Resource
Identifier <xref target="RFC9728"/> as the <tt>resource</tt> response parameter value. If
no Resource Identifier is defined for the resource, the authorization
server <bcp14>SHOULD</bcp14> use the exact URL of the protected resource instead. The
value used <bcp14>SHOULD</bcp14> be one that the client can recognize and correlate
with the intended protected resource (e.g., the UserInfo endpoint URL
for an OpenID Provider when the <tt>openid</tt> scope is requested).</t>
        <t>Since such a resource value was not explicitly requested by the client,
the <tt>resource</tt> response parameter is <bcp14>REQUIRED</bcp14> in this case per the
condition defined in <xref target="ResourceResponseParameter"/>.</t>
        <t>The following is a non-normative example of a token endpoint response
where the authorization server indicates that the issued access token is
valid for use at <tt>https://cal.example.com/</tt>.</t>
        <figure anchor="response-example-resource">
          <name>Access Token Response with Resource</name>
          <artwork><![CDATA[
HTTP/1.1 200 OK
Content-Type: application/json
Cache-Control: no-cache, no-store

{
   "access_token": "_Q-oyRuYqHlj_ZgXwuS54thQm_L5GhB3XH20cVtYfq",
   "token_type": "Bearer",
   "expires_in":3600,
   "refresh_token": "4LTC8lb0acc6Oy4esc1Nk9BWC0imAwH7kic16BDC2",
   "scope": "calendar",
   "resource": ["https://cal.example.com/"]
}
]]></artwork>
        </figure>
        <t>The following is a non-normative example of a token endpoint response
where the authorization server, acting as an OpenID Provider, issues an
access token for the UserInfo endpoint based on the <tt>openid</tt> scope value
that was requested by the client. The authorization server uses the
<tt>userinfo_endpoint</tt> URL from its discovery metadata as the <tt>resource</tt>
value.</t>
        <figure anchor="response-example-scope-resource">
          <name>Access Token Response with Scope-Determined Resource</name>
          <artwork><![CDATA[
HTTP/1.1 200 OK
Content-Type: application/json
Cache-Control: no-cache, no-store

{
   "access_token": "_Q-oyRuYqHlj_ZgXwuS54thQm_L5GhB3XH2cVtYfqh",
   "token_type": "Bearer",
   "expires_in":3600,
   "refresh_token": "4LTC8lb0acc6Oy4esc1Nk9BWC0imAwH7kic16BDC2",
   "id_token": "eyJhbGciOiJSUzI...",
   "scope": "openid email profile",
   "resource": ["https://server.example.com/userinfo"]
}
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document inherits the security considerations of <xref target="RFC8707"/>.</t>
      <t>Knowledge of the resource(s) for which an access token is valid does not
introduce new security concerns for the client. The <tt>resource</tt> response
parameter merely makes explicit information that the client either
already requested or that the authorization server determined based on
its policy.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>The <tt>resource</tt> response parameter conveys information about the
resource(s) associated with an access token back to the client. Since
the client either requested these resources or they were determined by
authorization server policy, no new privacy-sensitive information is
disclosed by this parameter.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="oauth-parameters-registration">
        <name>OAuth Parameters Registration</name>
        <t>This specification updates the following value in the IANA "OAuth
Parameters" registry <xref target="IANA.OAuth.Parameters"/> established by
<xref target="RFC6749"/>.</t>
        <dl spacing="compact">
          <dt>Parameter name:</dt>
          <dd>
            <t>resource</t>
          </dd>
          <dt>Parameter usage location:</dt>
          <dd>
            <t>authorization request, token request, token response</t>
          </dd>
          <dt>Change controller:</dt>
          <dd>
            <t>IETF</t>
          </dd>
          <dt>Specification document(s):</dt>
          <dd>
            <t><xref section="2" sectionFormat="of" target="RFC8707"/> and <xref target="ResourceResponseParameter"/> of this
document</t>
          </dd>
        </dl>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC8707">
          <front>
            <title>Resource Indicators for OAuth 2.0</title>
            <author fullname="B. Campbell" initials="B." surname="Campbell"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document specifies an extension to the OAuth 2.0 Authorization Framework defining request parameters that enable a client to explicitly signal to an authorization server about the identity of the protected resource(s) to which it is requesting access.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8707"/>
          <seriesInfo name="DOI" value="10.17487/RFC8707"/>
        </reference>
        <reference anchor="IANA.OAuth.Parameters" target="https://www.iana.org/assignments/oauth-parameters">
          <front>
            <title>OAuth Parameters</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9728">
          <front>
            <title>OAuth 2.0 Protected Resource Metadata</title>
            <author fullname="M.B. Jones" initials="M.B." surname="Jones"/>
            <author fullname="P. Hunt" initials="P." surname="Hunt"/>
            <author fullname="A. Parecki" initials="A." surname="Parecki"/>
            <date month="April" year="2025"/>
            <abstract>
              <t>This specification defines a metadata format that an OAuth 2.0 client or authorization server can use to obtain the information needed to interact with an OAuth 2.0 protected resource.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9728"/>
          <seriesInfo name="DOI" value="10.17487/RFC9728"/>
        </reference>
        <reference anchor="OpenID.Core" target="https://openid.net/specs/openid-connect-core-1_0-errata2.html">
          <front>
            <title>OpenID Connect Core 1.0 incorporating errata set 2</title>
            <author initials="N." surname="Sakimura" fullname="N. Sakimura">
              <organization/>
            </author>
            <author initials="J." surname="Bradley" fullname="J. Bradley">
              <organization/>
            </author>
            <author initials="M." surname="Jones" fullname="M. Jones">
              <organization/>
            </author>
            <author initials="B. de" surname="Medeiros" fullname="B. de Medeiros">
              <organization/>
            </author>
            <author initials="C." surname="Mortimore" fullname="C. Mortimore">
              <organization/>
            </author>
            <date year="2023" month="December" day="15"/>
          </front>
          <seriesInfo name="The OpenID Foundation" value=""/>
        </reference>
      </references>
    </references>
    <?line 261?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The original "Resource Indicators for OAuth 2.0" specification
<xref target="RFC8707"/> was authored by Brian Campbell, John Bradley, and Hannes
Tschofenig.</t>
    </section>
    <section numbered="false" anchor="document-history">
      <name>Document History</name>
      <t>draft-skokan-oauth-resource-response-02</t>
      <ul spacing="normal">
        <li>
          <t>Added guidance on scope or policy determined resource values</t>
        </li>
      </ul>
      <t>draft-skokan-oauth-resource-response-01</t>
      <t>draft-skokan-oauth-resource-response-00</t>
      <ul spacing="normal">
        <li>
          <t>Initial draft defining the <tt>resource</tt> access token response parameter</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
