Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Requirement of having an opaque auth_session value #128

Open
janakamarasena opened this issue Nov 13, 2024 · 0 comments
Open

Requirement of having an opaque auth_session value #128

janakamarasena opened this issue Nov 13, 2024 · 0 comments

Comments

@janakamarasena
Copy link

Under section 5.3.1. “Auth Session” spec mentions;

The auth_session value is completely opaque to the client, and as
such the authorization server MUST adequately protect the value from
inspection by the client, for example by using a random string or
using a JWE if the authorization server is not maintaining state on
the backend.

I think the intention behind mandating to maintain the opaqueness is to protect any sensitive information. Depending on the AS implementation it could decide on using an auth_session value which is not opaque but also does not contain any sensitive data. I think it would be better to recommend that the AS uses adequate measures such as encryption in the event they are using something other than an opaque value that contains sensitive data. The current mandating will put an unnecessary burden on the AS to encrypt and decrypt data if it doesn’t contain sensitive information.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant