-
Notifications
You must be signed in to change notification settings - Fork 415
MSC4363: OAuth step up authentication #4363
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
MSC4363: OAuth step up authentication #4363
Conversation
Signed-off-by: Johannes Marbach <[email protected]>
5769520 to
fd17d14
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Implementation requirements:
- Client (ideally multiple)
- Server
Signed-off-by: Johannes Marbach <[email protected]>
Signed-off-by: Johannes Marbach <[email protected]>
Signed-off-by: Johannes Marbach <[email protected]>
Signed-off-by: Johannes Marbach <[email protected]>
Signed-off-by: Johannes Marbach <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Just a couple of nits on the wording.
Co-authored-by: Kévin Commaille <[email protected]>
Co-authored-by: Kévin Commaille <[email protected]>
Co-authored-by: Hugh Nimmo-Smith <[email protected]>
Signed-off-by: Johannes Marbach <[email protected]>
| ### Cross-signing key reset | ||
|
|
||
| Implementations MAY use this proposal to replace UIA when the client has obtained its access token | ||
| via the OAuth APIs. The only endpoint currently using UIA for which this is relevant is | ||
| [/_matrix/client/v3/keys/device_signing/upload]. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We could consider introducing a dedicated scope to support this. Though I think it is not strictly needed. The only advantage I can think of is that clients could request the scope ahead of hitting the endpoint.
|
|
||
| ### Cross-signing key reset | ||
|
|
||
| Implementations MAY use this proposal to replace UIA when the client has obtained its access token |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Problem: when the homeserver receives a request to POST /_matrix/client/v3/keys/device_signing/upload, how does it know whether it should respond with the m.oauth flow stage from MSC4312, or the new M_INSUFFICIENT_USER_AUTHENTICATION errcode?
We would want the server to be backwards compatible with older clients, so I think the server needs to know what the client supports.
So, basically some kind of versioning:
- query param?
- body param?
/_matrix/client/v3/keys/device_signing/upload->/_matrix/client/v4/keys/device_signing/upload?
Rendered