<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-parecki-oauth-jwt-dpop-grant-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="JWT Authorization Grant with DPoP">OAuth 2.0 JWT Authorization Grant with DPoP Binding</title>
    <seriesInfo name="Internet-Draft" value="draft-parecki-oauth-jwt-dpop-grant-01"/>
    <author fullname="Aaron Parecki">
      <organization>Okta</organization>
      <address>
        <email>aaron@parecki.com</email>
      </address>
    </author>
    <date year="2026" month="January" day="30"/>
    <area>Security</area>
    <workgroup>Web Authorization Protocol</workgroup>
    <keyword>jwt</keyword>
    <keyword>dpop</keyword>
    <keyword>authorization</keyword>
    <abstract>
      <?line 46?>

<t>This specification defines a new OAuth 2.0 authorization grant type
that uses a JSON Web Token (JWT) assertion to request an access token
that is bound to a specific key using the Demonstration of Proof-of-Possession (DPoP)
mechanism. This provides a higher level of security than a simple bearer token,
as the client must prove possession of the key to use the access token.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://drafts.aaronpk.com/oauth-jwt-dpop-grant/draft-parecki-oauth-jwt-dpop-grant.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-parecki-oauth-jwt-dpop-grant/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Web Authorization Protocol Working Group mailing list (<eref target="mailto:oauth@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/oauth/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/oauth/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/aaronpk/oauth-jwt-dpop-grant"/>.</t>
    </note>
  </front>
  <middle>
    <?line 54?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication
and Authorization Grants <xref target="RFC7523"/> defines the use of a JWT as an
authorization grant, using the grant type <tt>urn:ietf:params:oauth:grant-type:jwt-bearer</tt>.
This grant type describes the use of a JWT authorization grant as a
bearer token, which is susceptible to reuse by any party that obtains one.</t>
      <t>OAuth 2.0 Demonstration of Proof-of-Possession at the Application
Layer (DPoP) <xref target="RFC9449"/> defines a mechanism to bind access tokens to a
specific cryptographic key. This prevents the token from being used by
any party that does not have access to the private key.</t>
      <t>This specification extends the proof-of-possession concept to the
authorization grant itself. It defines a new grant type,
<tt>urn:ietf:params:oauth:grant-type:jwt-dpop</tt>, for cases where the JWT
assertion is already bound to a DPoP key. To exchange the assertion
for an access token, the client must provide a DPoP proof demonstrating
possession of the key to which the assertion is bound. This makes the
JWT assertion a sender-constrained credential.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<section anchor="terminology">
        <name>Terminology</name>
        <t>This specification uses the terminology of <xref target="RFC6749"/>, <xref target="RFC7521"/>, <xref target="RFC7523"/>, and <xref target="RFC9449"/>.</t>
      </section>
    </section>
    <section anchor="http-parameter-bindings-for-transporting-assertions">
      <name>HTTP Parameter Bindings for Transporting Assertions</name>
      <t>The OAuth Assertion Framework <xref target="RFC7521"/> defines generic HTTP
parameters for transporting assertions (a.k.a. security tokens)
during interactions with a token endpoint.  This section defines
specific parameters and treatments of those parameters for use with
JWT DPoP-Bound Tokens.</t>
      <section anchor="using-dpop-bound-jwts-as-authorization-grants">
        <name>Using DPoP-Bound JWTs as Authorization Grants</name>
        <t>To use a DPoP-bound JWT as an authorization grant, the client makes an
access token request as defined in <xref section="4" sectionFormat="of" target="RFC7521"/>
with the following specific parameter values and encodings.</t>
        <dl>
          <dt><tt>grant_type</tt>:</dt>
          <dd>
            <t><bcp14>REQUIRED</bcp14> - The value <bcp14>MUST</bcp14> be <tt>urn:ietf:params:oauth:grant-type:jwt-dpop</tt></t>
          </dd>
          <dt><tt>assertion</tt>:</dt>
          <dd>
            <t><bcp14>REQUIRED</bcp14> - A single JWT, as defined in <xref target="RFC7519"/>, that contains a
<tt>cnf</tt> claim as described in <xref target="cnf"/>.</t>
          </dd>
          <dt><tt>scope</tt>:</dt>
          <dd>
            <t><bcp14>OPTIONAL</bcp14> - The <tt>scope</tt> parameter may be used, as defined in <xref target="RFC7521"/>,
to indicate the requested scope.</t>
          </dd>
        </dl>
        <t>Authentication of the client is optional, as described in
<xref section="3.2.1" sectionFormat="of" target="RFC6749"/> and consequently, the
<tt>client_id</tt> is only needed when a form of client authentication that
relies on the parameter is used.</t>
        <t>The client <bcp14>MUST</bcp14> also include a DPoP header as defined in <xref section="4" sectionFormat="of" target="RFC9449"/>,
which constitutes a proof of possession for the key to which the assertion is bound.</t>
        <t>The following example demonstrates an access token request with a JWT
as an authorization grant (with extra line breaks for display
purposes only):</t>
        <artwork><![CDATA[
POST /token HTTP/1.1
Host: as.example.com
Content-Type: application/x-www-form-urlencoded
DPoP: eyJ0eXAiOiJkcG9wK2p3dCIsImFsZyI6IkVTMjU2IiwiandrI...

grant_type=urn%3Aietf%3Aparams%3Aoauth%3Agrant-type%3Ajwt-dpop
&assertion=eyJhbGciOiJFUzI1NiIsImtpZCI6IjE2In0.
eyJpc3Mi[...omitted for brevity...].
J9l-ZhwP[...omitted for brevity...]
]]></artwork>
      </section>
    </section>
    <section anchor="cnf">
      <name>JWT Format and Processing Requirements</name>
      <t>The authorization server <bcp14>MUST</bcp14> validate the JWT according to the criteria
below. Application of additional restrictions and policy are at the
discretion of the authorization server.</t>
      <ol spacing="normal" type="1"><li>
          <t>The authorization server <bcp14>MUST</bcp14> validate the DPoP proof in the DPoP
header as described in <xref section="4" sectionFormat="of" target="RFC9449"/>. The <tt>htm</tt> claim
of the DPoP JWT <bcp14>MUST</bcp14> be <tt>POST</tt>, and the <tt>htu</tt> claim must match
the token endpoint URL.</t>
        </li>
        <li>
          <t>The authorization server <bcp14>MUST</bcp14> validate the JWT assertion according
to the processing rules in <xref section="3.1" sectionFormat="of" target="RFC7523"/> and <xref section="4" sectionFormat="of" target="I-D.ietf-oauth-rfc7523bis"/>.</t>
        </li>
        <li>
          <t>The authorization server <bcp14>MUST</bcp14> verify that the JWT assertion contains
a <tt>cnf</tt> claim as defined in <xref target="RFC7800"/>. This <tt>cnf</tt>
claim <bcp14>MUST</bcp14> contain a <tt>jkt</tt> property with the hash of the public key
as defined in <xref section="6.1" sectionFormat="of" target="RFC9449"/>.</t>
        </li>
        <li>
          <t>The authorization server <bcp14>MUST</bcp14> verify that the value of the the
<tt>jkt</tt> property of the <tt>cnf</tt> claim of the JWT assertion exactly
matches the value of the <tt>jkt</tt> in the DPoP proof.</t>
        </li>
      </ol>
      <t>If any of these validation steps fail, the authorization server <bcp14>MUST</bcp14>
return an <tt>invalid_grant</tt> error response.</t>
      <section anchor="access-token-response">
        <name>Access Token Response</name>
        <t>If the request is valid, the authorization server issues an access
token. The issued access token <bcp14>SHOULD</bcp14> also be DPoP-bound to the same
key from the DPoP proof. In this case, the <tt>token_type</tt> of the access
token <bcp14>MUST</bcp14> be <tt>DPoP</tt>, and the response <bcp14>MUST</bcp14> include a <tt>token_type</tt>
parameter with the value <tt>DPoP</tt>. If a bearer token is issued, the
<tt>token_type</tt> <bcp14>MUST</bcp14> be <tt>Bearer</tt>.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations described within the following
specifications are all applicable to this document:
"Assertion Framework for OAuth 2.0 Client Authentication and Authorization Grants" <xref target="RFC7521"/>,
"JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication and Authorization Grants" <xref target="RFC7523"/>,
"Updates to OAuth 2.0 JSON Web Token (JWT) Client Authentication and Assertion-Based Authorization Grants" <xref target="I-D.ietf-oauth-rfc7523bis"/>,
"OAuth 2.0 Demonstrating Proof of Possession (DPoP)" <xref target="RFC9449"/>,
"The OAuth 2.0 Authorization Framework" <xref target="RFC6749"/>,
and "JSON Web Token (JWT)" <xref target="RFC7519"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="oauth-uri-registration">
        <name>OAuth URI Registration</name>
        <t>This specification requests registration of the following value in the
"OAuth URI" registry established by <xref target="RFC6755"/>.</t>
        <ul spacing="normal">
          <li>
            <t>URN: <tt>urn:ietf:params:oauth:grant-type:jwt-dpop</tt></t>
          </li>
          <li>
            <t>Common Name: DPoP-bound JWT Authorization Grant</t>
          </li>
          <li>
            <t>Change Controller: IESG</t>
          </li>
          <li>
            <t>Specification Document(s): this document</t>
          </li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC6755">
        <front>
          <title>An IETF URN Sub-Namespace for OAuth</title>
          <author fullname="B. Campbell" initials="B." surname="Campbell"/>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
          <date month="October" year="2012"/>
          <abstract>
            <t>This document establishes an IETF URN Sub-namespace for use with OAuth-related specifications. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6755"/>
        <seriesInfo name="DOI" value="10.17487/RFC6755"/>
      </reference>
      <reference anchor="RFC6749">
        <front>
          <title>The OAuth 2.0 Authorization Framework</title>
          <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
          <date month="October" year="2012"/>
          <abstract>
            <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6749"/>
        <seriesInfo name="DOI" value="10.17487/RFC6749"/>
      </reference>
      <reference anchor="RFC7519">
        <front>
          <title>JSON Web Token (JWT)</title>
          <author fullname="M. Jones" initials="M." surname="Jones"/>
          <author fullname="J. Bradley" initials="J." surname="Bradley"/>
          <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
          <date month="May" year="2015"/>
          <abstract>
            <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7519"/>
        <seriesInfo name="DOI" value="10.17487/RFC7519"/>
      </reference>
      <reference anchor="RFC7521">
        <front>
          <title>Assertion Framework for OAuth 2.0 Client Authentication and Authorization Grants</title>
          <author fullname="B. Campbell" initials="B." surname="Campbell"/>
          <author fullname="C. Mortimore" initials="C." surname="Mortimore"/>
          <author fullname="M. Jones" initials="M." surname="Jones"/>
          <author fullname="Y. Goland" initials="Y." surname="Goland"/>
          <date month="May" year="2015"/>
          <abstract>
            <t>This specification provides a framework for the use of assertions with OAuth 2.0 in the form of a new client authentication mechanism and a new authorization grant type. Mechanisms are specified for transporting assertions during interactions with a token endpoint; general processing rules are also specified.</t>
            <t>The intent of this specification is to provide a common framework for OAuth 2.0 to interwork with other identity systems using assertions and to provide alternative client authentication mechanisms.</t>
            <t>Note that this specification only defines abstract message flows and processing rules. In order to be implementable, companion specifications are necessary to provide the corresponding concrete instantiations.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7521"/>
        <seriesInfo name="DOI" value="10.17487/RFC7521"/>
      </reference>
      <reference anchor="RFC7523">
        <front>
          <title>JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication and Authorization Grants</title>
          <author fullname="M. Jones" initials="M." surname="Jones"/>
          <author fullname="B. Campbell" initials="B." surname="Campbell"/>
          <author fullname="C. Mortimore" initials="C." surname="Mortimore"/>
          <date month="May" year="2015"/>
          <abstract>
            <t>This specification defines the use of a JSON Web Token (JWT) Bearer Token as a means for requesting an OAuth 2.0 access token as well as for client authentication.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7523"/>
        <seriesInfo name="DOI" value="10.17487/RFC7523"/>
      </reference>
      <reference anchor="RFC7800">
        <front>
          <title>Proof-of-Possession Key Semantics for JSON Web Tokens (JWTs)</title>
          <author fullname="M. Jones" initials="M." surname="Jones"/>
          <author fullname="J. Bradley" initials="J." surname="Bradley"/>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
          <date month="April" year="2016"/>
          <abstract>
            <t>This specification describes how to declare in a JSON Web Token (JWT) that the presenter of the JWT possesses a particular proof-of- possession key and how the recipient can cryptographically confirm proof of possession of the key by the presenter. Being able to prove possession of a key is also sometimes described as the presenter being a holder-of-key.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7800"/>
        <seriesInfo name="DOI" value="10.17487/RFC7800"/>
      </reference>
      <reference anchor="I-D.ietf-oauth-rfc7523bis">
        <front>
          <title>Updates to OAuth 2.0 JSON Web Token (JWT) Client Authentication and Assertion-Based Authorization Grants</title>
          <author fullname="Michael B. Jones" initials="M. B." surname="Jones">
            <organization>Self-Issued Consulting</organization>
          </author>
          <author fullname="Brian Campbell" initials="B." surname="Campbell">
            <organization>Ping Identity</organization>
          </author>
          <author fullname="Chuck Mortimore" initials="C." surname="Mortimore">
            <organization>Disney</organization>
          </author>
          <author fullname="Filip Skokan" initials="F." surname="Skokan">
            <organization>Okta</organization>
          </author>
          <date day="12" month="January" year="2026"/>
          <abstract>
            <t>   This specification updates the requirements for audience values in
   OAuth 2.0 Client Assertion Authentication and Assertion-based
   Authorization Grants to address a security vulnerability identified
   in the previous requirements for those audience values in multiple
   OAuth 2.0 specifications.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-rfc7523bis-05"/>
      </reference>
      <reference anchor="RFC9449">
        <front>
          <title>OAuth 2.0 Demonstrating Proof of Possession (DPoP)</title>
          <author fullname="D. Fett" initials="D." surname="Fett"/>
          <author fullname="B. Campbell" initials="B." surname="Campbell"/>
          <author fullname="J. Bradley" initials="J." surname="Bradley"/>
          <author fullname="T. Lodderstedt" initials="T." surname="Lodderstedt"/>
          <author fullname="M. Jones" initials="M." surname="Jones"/>
          <author fullname="D. Waite" initials="D." surname="Waite"/>
          <date month="September" year="2023"/>
          <abstract>
            <t>This document describes a mechanism for sender-constraining OAuth 2.0 tokens via a proof-of-possession mechanism on the application level. This mechanism allows for the detection of replay attacks with access and refresh tokens.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9449"/>
        <seriesInfo name="DOI" value="10.17487/RFC9449"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
    <?line 208?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank the following people for their contributions and reviews of this specification: Filip Skokan, Karl McGuinness.</t>
    </section>
    <section numbered="false" anchor="document-history">
      <name>Document History</name>
      <t>[[ To be removed from the final specification ]]</t>
      <t>-01</t>
      <ul spacing="normal">
        <li>
          <t>Changed DPoP check to use <tt>jkt</tt> string instead of <tt>jwk</tt> object to be able to use simple string comparison.</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
