-
Notifications
You must be signed in to change notification settings - Fork 13
Description
Some authentication issues to find a resolution to in the Solid-OIDC and Solid protocol specs, in order of priority:
(Auth 1) Essential for Solid-OIDC: RFC 9207 should be adopted to avoid identity provider mixup (masquerading) and cross-site request forgery attacks. The measure described by the RFC it to simply add an iss field to the HTTP header of the response, as reported in RFC 9207. This applied to Solid-OIDC.
https://datatracker.ietf.org/doc/rfc9207/
(Auth 2) Editorial decision in the Solid Protocol Spec itself: WAC should be dropped entirely from the spec and ACP made normative. The property acp:client in the context graph is essential. It ensures that users who, of course, can use the same identity for multiple apps do not allow information intended for one app to be accessed by another app. This has been discussed previously (see below), but not resolved; yet I argue this is critical, so action should be taken.
solid/web-access-control-spec#81
(Auth 3) Optimisation. RFC 7636 (Proof Key for Code Exchange by OAuth Public Clients) is not effective, so can be safely dropped to simplify the Solid-OIDC protocol.
Metadata
Metadata
Assignees
Labels
Type
Projects
Status