<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-brossard-oauth-rar-authzen-02" category="std" consensus="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.22.0 -->
  <front>
    <title abbrev="AuthZEN RAR Profile">AuthZEN Request/Response Profile for OAuth 2.0 Rich Authorization Requests</title>
    <seriesInfo name="Internet-Draft" value="draft-brossard-oauth-rar-authzen-02"/>
    <author fullname="David Brossard">
      <organization>Axiomatics</organization>
      <address>
        <postal>
          <country>Canada</country>
        </postal>
        <email>david.brossard@axiomatics.com</email>
      </address>
    </author>
    <author fullname="Omri Gazitt">
      <organization>Aserto</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>omri@aserto.com</email>
      </address>
    </author>
    <author fullname="Alex Babeanu">
      <organization>3Edges</organization>
      <address>
        <postal>
          <country>Canada</country>
        </postal>
        <email>alex@3edges.com</email>
      </address>
    </author>
    <date year="2024" month="July" day="08"/>
    <area>Security</area>
    <workgroup>Web Authorization Protocol</workgroup>
    <keyword>authorization</keyword>
    <keyword>abac</keyword>
    <keyword>authzen</keyword>
    <keyword>openid</keyword>
    <abstract>
      <?line 123?>

<t>This specification defines a profile of OAuth 2.0 Rich Authorization Requests leveraging the OpenID AuthZEN authorization request/response formats within the <tt>authorization_details</tt> JSON object. Authorization servers and resource servers from different vendors can leverage this profile to request and receive relevant authorization decisions from an AuthZEN-compatible PDP in an interoperable manner.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://davidjbrossard.github.io/authzen-rar-profile/draft-brossard-oauth-rar-authzen.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-brossard-oauth-rar-authzen/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Web Authorization Protocol Working Group mailing list (<eref target="mailto:oauth@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/oauth/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/oauth/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/davidjbrossard/authzen-rar-profile"/>.</t>
    </note>
  </front>
  <middle>
    <?line 127?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>OpenID AuthZEN is a Working Group under the OpenID Foundation which aims to increase interoperability and standardization in the authorization realm. In particular, AuthZEN aims to:</t>
      <ul spacing="normal">
        <li>
          <t>build standards-based authorization APIs</t>
        </li>
        <li>
          <t>define standard design patterns for authorization</t>
        </li>
        <li>
          <t>produce educational material to help raise awareness of externalized authorization.</t>
        </li>
      </ul>
      <t>The aim of this profile is to define an AuthZEN-conformant profile of the OAuth 2.0 Rich Authorization Requests <xref target="RFC9396"/>. <xref target="RFC9396"/> introduces a new parameter <tt>authorization_details</tt> that allows clients to specify their fine-grained authorization requirements using the expressiveness of JSON <xref target="RFC8259"/> data structures.</t>
      <t>This specification introduces a more structured format for the <tt>authorization_details</tt> parameter. The new format is also JSON <xref target="RFC8259"/> as a result of which this specification is conformant with <xref target="RFC9396"/> and is merely a stricter profile.</t>
      <t>For example the authorization request for a credit transfer mentioned in <xref target="RFC9396"/> would now be structured as follows</t>
      <figure>
        <name>Source Authorization Request</name>
        <sourcecode type="language-json" markers="false"><![CDATA[
{
    "subject": {
        "type": "user",
        "id": "Alice"
    },
    "resource": {
        "type": "payment_initiation",
        "id": "123",
        "recipient": {
            "creditorName": "Merchant A",
            "creditorAccount": {
                "bic": "ABCIDEFFXXX",
                "iban": "DE02100100109307118603"
            }
        }
    },
    "action": {
        "name": "transfer",
        "instructedAmount": {
            "currency": "EUR",
            "amount": "123.50"
        }
    },
    "context": {
        "remittance": "Ref Number Merchant"
    }
}
]]></sourcecode>
      </figure>
      <t>Using AuthZEN as a format for <tt>authorization_details</tt> will increase the usability and the interoperability of <xref target="RFC9396"/>. In particular, it will be possible for the AS to forward the contents of the <tt>authorization_details</tt> parameter to an AuthZEN-conformant Policy Decision Point (PDP).</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This specification uses the terms "access token", "refresh token", "authorization server" (AS), "resource server" (RS), "authorization endpoint", "authorization request", "authorization response", "token endpoint", "grant type", "access token request", "access token response", and "client" defined by "The OAuth 2.0 Authorization Framework" <xref target="RFC6749"/>.
This specification uses the terms "PDP" and "PEP" defined by <xref target="ABAC"/> and <xref target="XACML"/>.</t>
    </section>
    <section anchor="request-parameter-authorizationdetails">
      <name>Request Parameter <tt>authorization_details</tt></name>
      <t>In <xref target="RFC9396"/>, the request parameter <tt>authorization_details</tt> contains, in JSON
notation, an array of objects.  Each JSON object contains the data to
specify the authorization requirements for a certain type of
resource. This specification defines the format for each one of these objects
such that it conforms to <xref target="AUTHZEN"/> and <xref target="RFC9396"/>.</t>
      <t><xref target="AUTHZEN"/> groups JSON datastructures into 4 JSON objects:</t>
      <ul spacing="normal">
        <li>
          <t>subject: A Subject is the user or robotic principal about whom the Authorization API is being invoked. The Subject may be requesting access at the time the Authorization API is invoked.</t>
        </li>
        <li>
          <t>resource: A Resource is the target of an access request. It is a JSON (<xref target="RFC8259"/>) object that is constructed similar to a Subject entity.</t>
        </li>
        <li>
          <t>action: An Action is the type of access that the requester intends to perform. Action is a JSON (<xref target="RFC8259"/>) object that contains at least a name field.</t>
        </li>
        <li>
          <t>context: The Context object is a set of attributes that represent environmental or contextual data about the request such as time of day. It is a JSON (<xref target="RFC8259"/>) object.</t>
        </li>
      </ul>
      <t>Note: the aforementioned is indicative only. Always refer to <xref target="AUTHZEN"/> for the formal definition of each element.</t>
      <section anchor="authorizationdetails-structure">
        <name><tt>authorization_details</tt> Structure</name>
        <t>Because <strong>type</strong> is <bcp14>REQUIRED</bcp14>, the new <em>authorization_details</em> structure is as follows:</t>
        <ul spacing="normal">
          <li>
            <t>type:
An identifier for the authorization details type as a string. The value for this profile is "authzen_evaluation" or "authzen_evaluations", corresponding to the AuthZEN API being invoked. The value is case-insensitive. This field is <bcp14>REQUIRED</bcp14>.</t>
          </li>
          <li>
            <t>request:
this field contains the entire AuthZEN-conformant authorization request. This field is <bcp14>REQUIRED</bcp14>.</t>
          </li>
        </ul>
      </section>
      <section anchor="authorization-details-types">
        <name>Authorization Details Types</name>
        <t>This profile declares a new value for the <em>type</em> field as stated in the previous section. The value for this profile is "authzen_evaluation" or "authzen_evaluations". This indicates there will be another field called <tt>request</tt> and its value will be an AuthZEN-conformant authorization request.</t>
        <t>AuthZEN also defines a <em>type</em> field in the Subject and Resource categories. This field is meant to describe the type of user and/or resource required.</t>
      </section>
      <section anchor="common-data-fields">
        <name>Common Data Fields</name>
        <t>No field other than <tt>type</tt> and <tt>request</tt> shall be allowed in <tt>authorization_details</tt> when the type is <tt>authzen_evaluation</tt> or <tt>authzen_evaluations</tt>. All other fields such as the ones mentioned in <xref target="RFC9396"/> shall be inserted inside the AuthZEN request in the relevant object (Subject, Resource, Action, or Context).</t>
      </section>
    </section>
    <section anchor="authorization-request">
      <name>Authorization Request</name>
      <t>Conformant to <xref target="RFC9396"/>, the <tt>authorization_details</tt> authorization request parameter can be used to specify authorization requirements in all places where the scope parameter is used for the same purpose, examples include:</t>
      <ul spacing="normal">
        <li>
          <t>authorization requests as specified in <xref target="RFC6749"/></t>
        </li>
        <li>
          <t>device authorization requests as specified in <xref target="RFC8628"/></t>
        </li>
        <li>
          <t>backchannel authentication requests as defined in <xref target="OID-CIBA"/></t>
        </li>
      </ul>
      <t>Parameter encoding follows the exact same rules as <xref target="RFC9396"/>.</t>
      <section anchor="example-non-normative">
        <name>Example (non-normative)</name>
        <figure>
          <name>Source Authorization Request</name>
          <sourcecode type="language-json" markers="false"><![CDATA[
{
  "type": "authzen_evaluation",
  "request":
    {
        "subject": {
            "type": "user",
            "id": "Alice"
        },
        "resource": {
            "type": "payment_initiation",
            "id": "123",
            "recipient": {
                "creditorName": "Merchant A",
                "creditorAccount": {
                    "bic": "ABCIDEFFXXX",
                    "iban": "DE02100100109307118603"
                }
            }
        },
        "action": {
            "name": "transfer",
            "instructedAmount": {
                "currency": "EUR",
                "amount": "123.50"
            }
        },
        "context": {
            "remittance": "Ref Number Merchant"
        }
    }
}
]]></sourcecode>
        </figure>
      </section>
    </section>
    <section anchor="support-for-multiple-authorization-requests">
      <name>Support for Multiple Authorization Requests</name>
      <t><xref target="AUTHZEN"/> supports a profile that allows the expression of multiple authorization requests in a single JSON object. As a result, this
profile recommends the use of a single <tt>authorization_details</tt> object containing <em>boxcarred</em> requests as described in <xref target="BOXCAR"/> when
possible and the use of the <tt>authorization_details</tt> array otherwise.</t>
      <section anchor="example-non-normative-1">
        <name>Example (non-normative)</name>
        <t>This example is based on the one in <xref target="RFC9396"/> under section 3.  Authorization Request.</t>
        <sourcecode type="language-json"><![CDATA[
[
  {
    "type": "authzen_evaluations",
    "request":
    {
      "subject": {
        "id": "alice@acmecorp.com",
        "type": "user"
      },
      "resource":{
        "id": "123",
        "type": "account_information",
        "location": "https://example.com/accounts"
      },
      "evaluations": {
        "eval-1": {
          "action": {
            "name": "list_accounts"
          }
        },
        "eval-2": {
          "action": {
            "name": "read_balances"
          }
        },
        "eval-3": {
          "action": {
            "name": "read_transactions"
          }
        }
      }
    }
  },
  {
    "type": "authzen_evaluations",
    "request":
    {
      "subject": {
        "id": "alice@acmecorp.com",
        "type": "user"
      },
      "resource":{
        "id": "123",
        "type": "payment_initiation",
        "location": "https://example.com/payments",
        "recipient": {
            "creditorName": "Merchant A",
            "creditorAccount": {
                "bic": "ABCIDEFFXXX",
                "iban": "NL02RABO2228161411"
            }
        }
      },
      "context":{
        "remittance": "Ref Number Merchant"
      },
      "evaluations": {
        "eval-1": {
          "action": {
            "name": "initiate",
            "instructedAmount": {
            "currency": "EUR",
            "amount": "123.50"
            }
          }
        },
        "eval-2": {
          "action": {
            "name": "status"
          }
        },
        "eval-3": {
          "action": {
            "name": "cancel"
          }
        }
      }
    }
  }
]
]]></sourcecode>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The Security Considerations of <xref target="RFC9396"/>, <xref target="RFC6749"/>, <xref target="RFC7662"/>, and <xref target="RFC8414"/> all apply.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC6749" target="https://www.rfc-editor.org/info/rfc6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC7662" target="https://www.rfc-editor.org/info/rfc7662">
          <front>
            <title>OAuth 2.0 Token Introspection</title>
            <author fullname="J. Richer" initials="J." role="editor" surname="Richer"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This specification defines a method for a protected resource to query an OAuth 2.0 authorization server to determine the active state of an OAuth 2.0 token and to determine meta-information about this token. OAuth 2.0 deployments can use this method to convey information about the authorization context of the token from the authorization server to the protected resource.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7662"/>
          <seriesInfo name="DOI" value="10.17487/RFC7662"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8259" target="https://www.rfc-editor.org/info/rfc8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC8414" target="https://www.rfc-editor.org/info/rfc8414">
          <front>
            <title>OAuth 2.0 Authorization Server Metadata</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <date month="June" year="2018"/>
            <abstract>
              <t>This specification defines a metadata format that an OAuth 2.0 client can use to obtain the information needed to interact with an OAuth 2.0 authorization server, including its endpoint locations and authorization server capabilities.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8414"/>
          <seriesInfo name="DOI" value="10.17487/RFC8414"/>
        </reference>
        <reference anchor="RFC8628" target="https://www.rfc-editor.org/info/rfc8628">
          <front>
            <title>OAuth 2.0 Device Authorization Grant</title>
            <author fullname="W. Denniss" initials="W." surname="Denniss"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="August" year="2019"/>
            <abstract>
              <t>The OAuth 2.0 device authorization grant is designed for Internet- connected devices that either lack a browser to perform a user-agent- based authorization or are input constrained to the extent that requiring the user to input text in order to authenticate during the authorization flow is impractical. It enables OAuth clients on such devices (like smart TVs, media consoles, digital picture frames, and printers) to obtain user authorization to access protected resources by using a user agent on a separate device.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8628"/>
          <seriesInfo name="DOI" value="10.17487/RFC8628"/>
        </reference>
        <reference anchor="RFC9396" target="https://www.rfc-editor.org/info/rfc9396">
          <front>
            <title>OAuth 2.0 Rich Authorization Requests</title>
            <author fullname="T. Lodderstedt" initials="T." surname="Lodderstedt"/>
            <author fullname="J. Richer" initials="J." surname="Richer"/>
            <author fullname="B. Campbell" initials="B." surname="Campbell"/>
            <date month="May" year="2023"/>
            <abstract>
              <t>This document specifies a new parameter that is used to carry fine-grained authorization data in OAuth messages.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9396"/>
          <seriesInfo name="DOI" value="10.17487/RFC9396"/>
        </reference>
        <reference anchor="AUTHZEN" target="https://openid.github.io/authzen/">
          <front>
            <title>OpenID AuthZEN Authorization API</title>
            <author initials="O." surname="Gazitt" fullname="Omri Gazitt">
              <organization>Aserto</organization>
            </author>
            <author initials="D." surname="Brossard" fullname="David Brossard">
              <organization>Axiomatics</organization>
            </author>
            <author initials="A." surname="Tulshibagwale" fullname="Atul Tulshibagwale">
              <organization>SGNL</organization>
            </author>
            <date year="2024" month="July"/>
          </front>
        </reference>
        <reference anchor="BOXCAR" target="https://openid.github.io/authzen/authorization-api-1_1#name-access-evaluations-api">
          <front>
            <title>OpenID AuthZEN Authorization API</title>
            <author initials="O." surname="Gazitt" fullname="Omri Gazitt">
              <organization>Aserto</organization>
            </author>
            <author initials="D." surname="Brossard" fullname="David Brossard">
              <organization>Axiomatics</organization>
            </author>
            <author initials="A." surname="Tulshibagwale" fullname="Atul Tulshibagwale">
              <organization>SGNL</organization>
            </author>
            <date year="2024" month="July"/>
          </front>
        </reference>
        <reference anchor="OID-CIBA" target="https://openid.net/specs/openid-client-initiated-backchannel-authentication-core-1_0.html">
          <front>
            <title>OpenID Connect Client-Initiated Backchannel Authentication Flow - Core 1.0</title>
            <author initials="G." surname="Fernandez" fullname="G. Fernandez">
              <organization/>
            </author>
            <author initials="F." surname="Walter" fullname="F. Walter">
              <organization/>
            </author>
            <author initials="A." surname="Nennker" fullname="A. Nennker">
              <organization/>
            </author>
            <author initials="D." surname="Tonge" fullname="D. Tonge">
              <organization/>
            </author>
            <author initials="B." surname="Campbell" fullname="B. Campbell">
              <organization/>
            </author>
            <date year="2021" month="September"/>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="XACML" target="https://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-spec-os-en.html">
          <front>
            <title>eXtensible Access Control Markup Language (XACML) Version 3.0, OASIS Standard</title>
            <author initials="E." surname="Rissanen" fullname="Erik Rissanen">
              <organization>Axiomatics AB</organization>
            </author>
            <date year="2013" month="January"/>
          </front>
        </reference>
        <reference anchor="ABAC" target="https://doi.org/10.6028/NIST.SP.800-162">
          <front>
            <title>Guide to Attribute Based Access Control (ABAC) Definition and Considerations - NIST Special Publication 800-162</title>
            <author initials="V." surname="Hu" fullname="Vincent Hu">
              <organization>NIST</organization>
            </author>
            <author initials="D." surname="Ferraiolo" fullname="David Ferraiolo">
              <organization>NIST</organization>
            </author>
            <date year="2014" month="January"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 389?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank members of the OpenID AuthZEN Working Group for their
   valuable feedback during the preparation of this specification. In particular
   our thanks go to Gerry Gebel and Allan Foster.</t>
      <t>We would also like to thank Justin Richer and Pieter Kasselman for their
   guidance on this spec and the overall IETF process.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
