Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Improve JWT bearer usage - deprecate password grant #3285

Open
strehle opened this issue Feb 12, 2025 · 0 comments
Open

Improve JWT bearer usage - deprecate password grant #3285

strehle opened this issue Feb 12, 2025 · 0 comments
Labels
expected behavior The isuse or PR is related to a RFC or other standard

Comments

@strehle
Copy link
Member

strehle commented Feb 12, 2025

Why: password grant should be deprecated, because it is not part of newer OAuth or OIDC standards, e.g. https://oauth.net/2.1/
There is a RFC https://datatracker.ietf.org/doc/html/rfc9700#section-2.4 which states

The resource owner password credentials grant [[RFC6749](https://datatracker.ietf.org/doc/html/rfc6749)] MUST NOT be used.

For user interactive login or principal propagation we support the passcode login a way to omit passwords. For pure technical usages there is token based authentication with private_key_jwt (or later mtls) in client_credentials flows.

However, there are mixed scenarios, where technical scenarios need a user. Github action is a good example but there could be other scenarios, typically business scenarios, where a user principal propagation should be supported, but there is no user interactive login.

JWT bearer and generic token exchange can solve the problem, but in CF is it not easy to adopt JWT bearer and for the generic token exchange we have no support yet, e.g. https://www.rfc-editor.org/rfc/rfc8693.html .

This issue should collect and solve the problem, step by step.

Request a RFC from CF TOC cloudfoundry/community#1085

@strehle strehle changed the title Improve JWT bearer usage - Improve JWT bearer usage - password grant depreciation preparation Feb 12, 2025
@strehle strehle added the expected behavior The isuse or PR is related to a RFC or other standard label Feb 12, 2025
@strehle strehle moved this from Inbox to Pending Review | Discussion in Foundational Infrastructure Working Group Feb 12, 2025
@strehle strehle changed the title Improve JWT bearer usage - password grant depreciation preparation Improve JWT bearer usage - deprecate password grant Feb 12, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
expected behavior The isuse or PR is related to a RFC or other standard
Projects
Status: Pending Review | Discussion
Development

No branches or pull requests

1 participant