<?xml version="1.0" encoding="us-ascii"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.12 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!ENTITY RFC2119 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC6749 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6749.xml">
<!ENTITY RFC7159 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7159.xml">
<!ENTITY RFC7591 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7591.xml">
<!ENTITY RFC7592 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7592.xml">
]>

<?rfc roc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-parecki-oauth-client-intermediary-metadata-02" category="std">

  <front>
    <title>OAuth 2.0 Client Intermediary Metadata</title>

    <author initials="A." surname="Parecki" fullname="Aaron Parecki">
      <organization>Okta</organization>
      <address>
        <email>aaron@parecki.com</email>
        <uri>https://aaronparecki.com</uri>
      </address>
    </author>

    <date year="2021" month="February" day="22"/>

    <area>Security Area</area>
    <workgroup>Open Authentication Protocol</workgroup>
    
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This specification defines a mechanism for including information about
additional parties involved in an OAuth transaction by adding a new section
to the OAuth 2.0 Dynamic Client Registration request, as well as requires that
authorization servers surface this information to users during an OAuth transaction.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>In some applications of OAuth, there may be multiple legal entities which have access
to or process data retrieved by an OAuth client. In the traditional OAuth model,
a <spanx style="verb">client_id</spanx> represents only a single application, and so the OAuth consent screen
lists just one third party: the OAuth client.</t>

<t>In this situation, in order to comply with various local laws and regulations,
the user needs to be informed by the authorization server of the list of entities
that will have access to their data after authorizing the client.</t>

<t>The existing Dynamic Client Registration (<xref target="RFC7591"/>) specification lacks a mechanism
for communicating a list of additional parties that may have access to the user's data.</t>

<t>This specification extends <xref target="RFC7591"/> and <xref target="RFC7592"/> to define a mechanism for including information about the additional parties involved in an OAuth transaction by including information about the additional intermediaries into the Dynamic Client Registration request. This specification also defines requirements of the OAuth authorization server to present this information about the additional parties in the OAuth consent screen during an OAuth transaction.</t>

</section>
<section anchor="notational-conventions" title="Notational Conventions">

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in <xref target="RFC2119"/>.</t>

<t>Unless otherwise noted, all the protocol parameter names and values
are case sensitive.</t>

</section>
<section anchor="terminology" title="Terminology">

<t>In addition to the terms defined in referenced specifications, this document uses
the following terms:</t>

<t><list style="hanging">
  <t hangText='&quot;OAuth&quot;:'>
  In this document, "OAuth" refers to OAuth 2.0, <xref target="RFC6749"/>.</t>
  <t hangText='&quot;Client&quot;:'>
  "Client" has the same definition as in OAuth 2.0, but is worth pointing out
that the client in this context may be operated by a different legal entity than is
described by the client name.</t>
  <t hangText='&quot;Intermediary&quot;:'>
  One or more entities that the user's data will pass through or be shared with by
using the OAuth client. This information is voluntarily provided by the OAuth
client, and is typically enforced by a business relationship between the organization
providing the Client and the organization providing the Resource Server.</t>
</list></t>

</section>
<section anchor="client-intermediary-metadata" title="Client Intermediary Metadata">

<t>Registered client intermediaries have a set of metadata values
associated with the client identifier of the client that represents them in the OAuth transaction,
such as a user-visible name, logo, and URL.</t>

<t>Like the OAuth client metadata defined in <xref target="RFC7591"/> and <xref target="RFC7592"/>, these metadata
values are used in the following ways:</t>

<t><list style="symbols">
  <t>as input values to registration and update requests, and</t>
  <t>as output values in registration responses.</t>
</list></t>

<t>These values are used by the authorization server when displaying the OAuth consent
screen to the end user, to inform them of all the additional parties that will be handling
the user's data upon approval.</t>

<t>The following metadata fields are defined by this specification. The implementation and use of
the fields is OPTIONAL unless stated otherwise. All data member types (strings, arrays, numbers)
are defined in terms of their JSON (<xref target="RFC7159"/>) representations.</t>

<t>Some fields are expected to be displayed in the OAuth consent UI and are designated accordingly.</t>

<t><spanx style="verb">intermediary_name</spanx></t>

<t>REQUIRED. A human-readable name of intermediary party. Authorization servers MUST display this field to the end user on the OAuth consent screen.</t>

<t><spanx style="verb">description</spanx></t>

<t>OPTIONAL. A human-readable description of the intermediary. This is not intended to be displayed in the OAuth consent screen.</t>

<t><spanx style="verb">intermediaty_uri</spanx></t>

<t>A URL string of a web page providing information about the intermediary. If present, the authorization server SHOULD display this URL to the end user in a clickable fashion. It is RECOMMENDED that clients always send this field. The value of this field MUST point to a valid web page.</t>

<t><spanx style="verb">logo_uri</spanx></t>

<t>A URL string that references a logo for this intermediary. If present, the authorization server SHOULD display this image to the end user in the OAuth consent screen. The value of this field MUST be a valid image file.</t>

<t><spanx style="verb">contacts</spanx></t>

<t>Array of strings representing ways to contact people responsible for this intermediary, typically email addresses or phone numbers. The authorization server MAY display these to the end user in the OAuth consent screen. See Section 6 of <xref target="RFC7591"/> for information on Privacy Considerations.</t>

</section>
<section anchor="client-registration-endpoint" title="Client Registration Endpoint">

<t>The client registration endpoint is described in Section 3 of <xref target="RFC7591"/>.</t>

<t>Since this specification provides a mechanism for a client to assert information about additional parties other than itself, the registration endpoint MUST be protected by an OAuth 2.0 access token obtained by the client. The method by which the initial access token is obtained by the client or developer is out of scope of this specification, but is likely to be obtained using the client credentials grant or manual out-of-band registration.</t>

<section anchor="client-registration-request" title="Client Registration Request">

<t>This specification extends the client registration request defined in <xref target="RFC7591"/>.</t>

<t>This operation registers a combination of client and one or more intermediaries with an authorization server. The authorization server assigns a unique client identifier (and optionally a client secret) that represents the combination of all the entities described in the registration request.</t>

<t>To register, the client or developer sends an HTTP POST as described in Section 3.1 of <xref target="RFC7591"/>, with an additional property named "intermediaries" with a JSON array of objects of each intermediary's registration information.</t>

<t>For example, the client could send the following registration request to the client registration endpoint using its OAuth 2.0 access token it has previously obtained using the client credentials grant.</t>

<t>The following is a non-normative example request:</t>

<figure><artwork><![CDATA[
    POST /register HTTP/1.1
    Content-Type: application/json
    Accept: application/json
    Host: server.example.com
    Authorization: Bearer 8IGFGXKXZBV5LL38Y3X1

    {
      "client_name": "User-Recognizable App Name",
      "redirect_uris": [
        "https://client.example.org/callback"
      ],
      "client_uri": "https://example.net/",
      "logo_uri": "https://example.net/logo.png",
      "contacts": [
        "support@example.net"
      ],
      "intermediaries": [
        {
          "name": "Partner App Name",
          "description": "An application that may also receive
            this user's data when the user authorizes the client",
          "uri": "https://partner.example/",
          "logo_uri": "https://partner.example/logo.png",
          "contacts": [
            "support@partner.example"
          ]
        }
      ]
    }
]]></artwork></figure>

</section>
<section anchor="client-registration-response" title="Client Registration Response">

<t>This specification extends the client information response defined in <xref target="RFC7591"/> and <xref target="RFC7592"/>.</t>

<t>Upon a successful registration request, the authorization server returns a client identifier for the combination of the client and any intermediaries specified in the request.</t>

<t>In addition to the response fields defined in Section 3.2 of <xref target="RFC7591"/> and Section 3 of <xref target="RFC7592"/>, the response MUST also contain all registered metadata about the intermediaries. The authorization server MAY reject or replace any of the requested metadata values submitted during the registration and substitute them with suitable values.</t>

<t>The following is a non-normative example response of a successful registration:</t>

<figure><artwork><![CDATA[
    HTTP/1.1 201 Created
    Content-Type: application/json
    Cache-Control: no-store
    Pragma: no-cache

    {
      "client_id": "V8tvEkZWhDAdxSaKGUJZ",
      "client_secret": "SpsuwZIxnp8bBEhp5sk1EKiIKTZ4X4DKU",
      "grant_types": ["authorization_code", "refresh_token"],
      "token_endpoint_auth_method": "client_secret_basic",
      "registration_client_uri": "https://server.example.com/client/tmzaAMkyWlH3",
      "registration_access_token": "MphaAqDaZT86C93ENWRZcf3dfU2dW6POASo8dFXa",
      "client_name": "User-Recognizable App Name",
      "client_uri": "https://example.net/",
      "redirect_uris": [
        "https://client.example.org/callback"
      ],
      "contacts": [
        "support@example.net"
      ],
      "intermediaries": [
        {
          "name": "Partner App Name",
          "description": "An application that may also receive
            this user's data when the user authorizes the client",
          "uri": "https://partner.example/",
          "logo_uri": "https://partner.example/logo.png",
          "contacts": [
            "support@partner.example"
          ]
        }
      ]
    }
]]></artwork></figure>

<t>The <spanx style="verb">registration_client_uri</spanx> and <spanx style="verb">registration_access_token</spanx> properties are required in order to support updating and deleting this client as described in <xref target="RFC7592"/>.</t>

</section>
<section anchor="client-read-request" title="Client Read Request">

<t>This specification extends the client read request defined in <xref target="RFC7592"/> to include the additional metadata properties in the response that describe the intermediaries. No additional behavior is prescribed by this specification.</t>

</section>
<section anchor="client-update-request" title="Client Update Request">

<t>This specification extends the client update request defined in <xref target="RFC7592"/> to be able to update the additional metadata properties that describe the intermediaries.</t>

<t>The additional properties are provided in the update request in the same format as in the initial registration request.</t>

<t>Since these values were asserted by the client in the initial registration, there is no need to prescribe any additional security model around the ability to update them, even though these represent additional parties.</t>

</section>
<section anchor="client-delete-request" title="Client Delete Request">

<t>No new behavior is prescribed for delete requests beyond that defined in <xref target="RFC7592"/>.</t>

</section>
</section>
<section anchor="providing-intermediaty-details-in-the-authorization-request" title="Providing Intermediaty Details in the Authorization Request">

<t>When the authorization server begins a request from an OAuth client identifier that has been registered with additional intermediary information, it MUST display the additional parties in the consent UI visible to the end user.</t>

<t>The authorization server chooses how best to display the additional information, but it MUST include at least the name of the intermediaries and client, and SHOULD include the logo of each as well.</t>

</section>
<section anchor="security-considerations" title="Security Considerations">

<t>As this extends <xref target="RFC7591"/>, all security considerations from that draft apply here as well.</t>

<t>Specifically, if the authorization server supports open client registration without any authentication, it must be extremely careful with any URLs received in the registration request such as <spanx style="verb">logo_uri</spanx>, <spanx style="verb">tos_uri</spanx>, and <spanx style="verb">uri</spanx>, as these values may be displayed to end users. <xref target="RFC7591"/> recommends requiring that these URIs have a matching host and scheme as the defined <spanx style="verb">redirect_uri</spanx>s, and that they are resolvable URIs. See section 5 of <xref target="RFC7591"/> for more details.</t>

</section>
<section anchor="acknowledgements" title="Acknowledgements">

<t>The author would like to thank Ryan Christiansen and Preston McFarland for their initial contributions of the concepts behind this specification. The author would also like to thank Don Cardinal, Ryan Christiansen and Preston McFarland for their reviews of this specification, as well as Anil Mahalaha and other members of the Financial Data Exchange working group. Additionally the work of the OAuth Working Group on the referenced and related specifications that this specification builds upon is much appreciated.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>

&RFC2119;
&RFC6749;
&RFC7159;
&RFC7591;
&RFC7592;


    </references>




  </back>

<!-- ##markdown-source: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-->

</rfc>

