Mutual TLS Profiles for OAuth Clients describes Transport Layer Security (TLS) Mutual Authentication using X.509 certificates as a mechanism for both OAuth Client authentication to the token_endpoint as well as for sender constrained access to OAuth protected resources.

The OAuth 2.0 Authorization Framework RFC 6749 defines a Shared Secret method of OAuth Clientauthentication but also allows for the definition and use of additional client authentication mechanisms when interacting with the Authorization Server's token_endpoint.

Mutual TLS Profiles for OAuth Clients describes an additional mechanism of client utilizing mutual Authentication TLS RFC 5246 certificate-based authentication, which provides better security characteristics than Shared Secrets.

Mutual TLS sender constrained access to Protected Resources ensures that only the party in possession of the Private Key corresponding to the certificate can utilize the Access Token to get access to the associated Protected Resources. Such a constraint is unlike the case of the basic Bearer Token described in RFC 6750, where any party in possession of the Access Token can use it to access the associated resources. Mutual TLS sender constrained access prevents the use of stolen Access Tokens by binding the Access Token to the client's certificate.

Mutual TLS sender constrained Access Tokens and Mutual TLS client authentication are distinct mechanisms that don't necessarily need to be deployed together.

More Information#

There might be more information for this subject on one of the following:

Add new attachment

Only authorized users are allowed to upload new attachments.
« This page (revision-3) was last changed on 29-Jul-2017 10:03 by jim