Skip to content

Commit 8a85cfe

Browse files
committed
One more wording tweak.
1 parent f82a812 commit 8a85cfe

File tree

1 file changed

+6
-2
lines changed

1 file changed

+6
-2
lines changed

site/_posts/2022-06-14-why-no-auth-in-oauth.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -79,9 +79,11 @@ Why is this?
7979

8080
Separation of concerns is a common pattern in software systems. Developers break up systems into different components, with each component being responsible for a different piece of the system. Some parts are responsible for creating the user interface, others for data access.
8181

82-
In this case, the specifications are clearly not defining authentication, but are focused on the means and artifacts of that authentication.
82+
In this case, the OAuth and OIDC specifications do not define authentication. Instead, they focus on the precursors and artifacts of an authentication event.
8383

84-
This means that the authorization server can authenticate the user to whatever level of certainty it needs. And there are specifications for that, such as [NIST 800-63-3](https://pages.nist.gov/800-63-3/sp800-63-3.html) which defines the three levels of "Authenticator Assurance", creatively named:
84+
This means that the authorization server can authenticate the user to whatever level of certainty it needs, based on what it knows.
85+
86+
There are specifications for that, such as [NIST 800-63-3](https://pages.nist.gov/800-63-3/sp800-63-3.html) which defines the three levels of "Authenticator Assurance". These are creatively named:
8587

8688
* AAL1
8789
* AAL2
@@ -97,6 +99,8 @@ There are more specifics in that document. Lots and lots of specifics.
9799

98100
There are other similar frameworks, such as the [Trusted Digital Identity Framework](https://www.dta.gov.au/our-projects/digital-identity/trusted-digital-identity-framework) and the [UK digital identity & attributes trust framework](https://www.gov.uk/government/publications/uk-digital-identity-attributes-trust-framework-updated-version) with varying levels of detail.
99101

102+
Ignoring authentication is a great example of separating concerns. It allows OAuth2 and OIDC to focus on the nitty gritty of getting the resource owner to the authorization server as well as generating access and identity tokens.
103+
100104
## Future proofing
101105

102106
By leaving the details of authentication methods to the authorization server, the OAuth and OIDC specifications remain relevant even if new methods of authentication are invented. For example, neither WebAuthn or FaceID existed when RFC 6749 was published.

0 commit comments

Comments
 (0)