Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> OAuth2 shouldn’t even use JWTs in the first place.

OAuth2 considers its refresh tokens to be opaque to all parties except the AS which issued them, and its access tokens to be opaque to the client (only understood by the API resources where they are used).

Thats not to say they need to be self-contained - several OAuth systems will just make these both database indexes, and require resources to make an introspection call to validate and get information on access.

There are many clients which have found out that the server access token is a JWT and have extracted information from it. These are at a minimum breaking their compatibility contract, but also often doing something inherently insecure like using the access token as an authentication statement.

Note also that JWTs can be encrypted as well as signed, which would eliminate any PII leakage.

Revocation at a central location typically doesn't happen in large scale (geographically distributed or otherwise eventually consistent systems) unless it is essential for the business case - instead you just tune how long access tokens are good for, so that the client (and not the resource) needs to go back to the central location for a new policy statement in the form of a new access token.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: