Require DPoP at token endpoint but issue Bearer access tokens (DPoP-bound refresh tokens only) #393
Unanswered
rasander
asked this question in
IdentityServer
Replies: 1 comment 3 replies
-
|
At the moment, there is no toggle switch to only apply DPoP-binding to refresh tokens while generating unbound bearer access tokens. We're going to discuss this issue with the product team to gather their thoughts on the matter. |
Beta Was this translation helpful? Give feedback.
3 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Hi all,
We use Duende IdentityServer with multiple OIDC clients and many APIs. We’re gradually improving security, with a current focus on our native mobile apps (public clients).
We’re evaluating DPoP. We control the mobile apps, so adding DPoP in the clients would be fairly easy, but adding DPoP verification to every API is difficult and time-consuming (some backends are run by external partners).
So we are considering following
As I read RFC 9449, this setup is explicitly allowed:
“An authorization server MAY elect to issue access tokens that are not DPoP bound, which is signaled to the client with a value of Bearer in the token_type parameter of the access token response (per RFC 6750). For a public client that is also issued a refresh token, this has the effect of DPoP-binding the refresh token alone, which can improve the security posture even when protected resources are not updated to support DPoP.”
Questions
Is this configuration supported in Duende IdentityServer?
If yes, what is the recommended way to configure it?
If it requires code changes, any pointers or sample snippets would be much appreciated.
Thanks!
Beta Was this translation helpful? Give feedback.
All reactions