Marcus Hardt (KIT)
Nicolas Liampotis (GRNET)
62nd EUGridPMA-AARC-EnCo-IGTF workshop
AARC-G081
AARC Policy: Recommendations for Token Lifetimes
23 September, 2024
1
Authentication and Authorisation for Research and Collaboration
https://aarc-community.org
Introduction
2
https://aarc-community.org
Token Properties Overview
3
Property | Description | Advantages | Disadvantages |
Bound | Token is bound to a specific instance of a relying party | Mitigate impact of compromised tokens | Delegation scenarios may lack support |
Rotation | Token can only be used once → New token issued with each use | Detect compromised tokens → Trigger revocation of related tokens | - Legitimate tokens may be erroneously revoked�- Requires additional logic for token management, especially in parallel workflows |
Revocable | Revoked tokens may no longer be used, regardless of initial lifetime | Longer lifetime acceptable | - Each token validation requires a network request, potentially causing delays - Availability issues with the issuer/revocation authority can disrupt access to resources, creating a single point of failure |
https://aarc-community.org
Token Properties Overview (Contd.)
4
Property | Description | Advantages | Disadvantages |
Opaque | Token contains no information → Requires validation from the issuing authority | - No embedded information reduces the risk of data exposure - Validations are managed by the issuer, ensuring up-to-date access permissions | - Each token validation requires a network request, potentially causing delays - Availability issues with the issuer can disrupt access to resources, creating a single point of failure |
Structured | Contains information about subject | Essential information readily available, e.g. lifetime | Less private |
Signed | Token can be cryptographically verified by recipient | - Tokens can be validated without contacting the issuer for each request (but periodic online access is still required to obtain and refresh the signing keys) - Protects against token tampering | - Cannot revoke unless revocation mechanisms are in place (e.g. CRL/OCSP for X.509 or RFC7009 for OAuth2) |
https://aarc-community.org
Impact categories of access
See Appendix A
5
https://aarc-community.org
Points for discussion
6
https://aarc-community.org
Points for discussion - Scope of AARC-G081
7
https://aarc-community.org
Scope of AARC-G081 - Recommendation Approach
Current approach to Basic Recommendations:
8
https://aarc-community.org
Points for discussion - Recommendation Approach
9
https://aarc-community.org
Points for discussion - Token Lifetimes in Chained Token Issuer Scenarios
10
Proxy A
Proxy B
Client 1
Client 2
RT with MAX lifetime
RT with MIN lifetime
RT with ??? lifetime
https://aarc-community.org
davidg@nikhef.nl
Thank you
Any Questions?
https://aarc-community.org
© members of the AARC Community.
The work leading to these results has received funding from the European Union (GAP 101131237) and other sources
https://aarc-community.org