Skip to content

Authentication problems to resolve #221

@rosshorne

Description

@rosshorne

Some authentication issues to find a resolution to in the Solid-OIDC and Solid protocol specs, in order of priority:

(Auth 1) Essential for Solid-OIDC: RFC 9207 should be adopted to avoid identity provider mixup (masquerading) and cross-site request forgery attacks. The measure described by the RFC it to simply add an iss field to the HTTP header of the response, as reported in RFC 9207. This applied to Solid-OIDC.
https://datatracker.ietf.org/doc/rfc9207/

(Auth 2) Editorial decision in the Solid Protocol Spec itself: WAC should be dropped entirely from the spec and ACP made normative. The property acp:client in the context graph is essential. It ensures that users who, of course, can use the same identity for multiple apps do not allow information intended for one app to be accessed by another app. This has been discussed previously (see below), but not resolved; yet I argue this is critical, so action should be taken.
solid/web-access-control-spec#81

(Auth 3) Optimisation. RFC 7636 (Proof Key for Code Exchange by OAuth Public Clients) is not effective, so can be safely dropped to simplify the Solid-OIDC protocol.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    Status

    Done

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions