OAuth 2.0 Mutual TLS Client Authentication and Certificate Bound Access TokensPing Identitybrian.d.campbell@gmail.comYubicove7jtb@ve7jtb.comhttp://www.thread-safe.com/Nomura Research Instituten-sakimura@nri.co.jphttps://nat.sakimura.org/YES Europe AGtorsten@lodderstedt.net
Security
OAuth Working GroupJSON Web TokenJWTMTLSMutual TLSproof-of-possessionproof-of-possession access tokenkey confirmed access tokencertificate bound access tokenclient certificateX.509 Client Certificate Authenticationkey confirmationconfirmation methodholder-of-keyOAuth
This document describes OAuth client authentication and certificate bound access tokens using
mutual Transport Layer Security (TLS) authentication with X.509 certificates.
OAuth clients are provided a mechanism for authentication to the authorization
server using mutual TLS, based on either self-signed certificates or public key infrastructure (PKI).
OAuth authorization servers are provided a mechanism for binding access tokens to a client's
mutual TLS certificate, and OAuth protected resources are provided a method for ensuring
that such an access token presented to it was issued to the client presenting the token.
This document describes OAuth client authentication and certificate bound access tokens using
mutual TLS authentication with X.509 certificates.
OAuth clients are provided mechanisms for authentication to the authorization
server using mutual TLS.
OAuth authorization servers are provided a mechanism for binding access tokens to a client's
mutual TLS certificate, and OAuth protected resources are provided a method for ensuring
that such an access token presented to it was issued to the client presenting the token.
The OAuth 2.0 Authorization Framework
defines a shared secret method of client authentication but also
allows for definition and use of additional client authentication mechanisms
when interacting directly with the authorization server.
This document describes an additional mechanism of client authentication utilizing
mutual TLS certificate-based authentication, which provides
better security characteristics than shared secrets.
While documents client authentication for requests to the token endpoint,
extensions to OAuth 2.0 (such as Introspection and
Revocation) define endpoints that also utilize client authentication
and the mutual TLS methods defined herein are applicable to those endpoints as well.
Mutual TLS certificate bound access tokens ensure that
only the party in possession of the
private key corresponding to the certificate can utilize the token to
access the associated resources. Such a constraint is
sometimes referred to as key confirmation, proof-of-possession, or holder-of-key
and is unlike the case of the
bearer token described in , where any party in
possession of the access token can use it to access the associated resources.
Binding an access token to the client's certificate
prevents the use of stolen access tokens or replay of access tokens
by unauthorized parties.
Mutual TLS certificate bound access tokens and mutual TLS client authentication
are distinct mechanisms, which are complementary but don't necessarily need to be deployed or used together.
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL"
in this document are to be interpreted as described in
BCP 14
when, and only when, they appear in all capitals, as shown here.
Mutual TLS refers to the process whereby a client presents its X.509 certificate
and proves possession of the corresponding private key to a server when negotiating a TLS session.
In TLS 1.2 this requires the client to send
Client Certificate and Certificate Verify messages during the TLS handshake and
for the server to verify these messages.
This section defines, as an extension of
OAuth 2.0, Section 2.3, two distinct methods of using
mutual TLS X.509 client certificates as client credentials.
The requirement of mutual TLS for client authentication is determined by the authorization server
based on policy or configuration for the given client (regardless of whether the client was dynamically
registered, statically configured, or otherwise established).
In order to utilize TLS for OAuth client authentication, the TLS
connection between the client and the authorization server MUST have been established or reestablished
with mutual TLS X.509 certificate authentication
(i.e. the Client Certificate and Certificate Verify messages are sent during the TLS Handshake
).
For all requests to the authorization server utilizing mutual TLS client authentication,
the client MUST include the client_id parameter,
described in OAuth 2.0, Section 2.2.
The presence of the client_id
parameter enables the authorization server to easily identify the
client independently from the content of the certificate. The authorization server
can locate the client configuration using the client identifier and check the certificate
presented in the TLS Handshake against the expected credentials for that client.
The authorization server MUST enforce the
binding of a certificate to a specific client as described in either or
below.
The PKI (public key infrastructure) method of mutual TLS OAuth client authentication uses
a subject distinguished name (DN) and validated certificate chain to identify
the client. The TLS handshake is utilized to validate the client's possession
of the private key corresponding to the public key in the certificate and to
validate the corresponding certificate chain. The client is successfully authenticated
if the subject information in the certificate matches the expected DN configured or
registered for that particular client
(note that a predictable treatment of DN values, such as the distinguishedNameMatch
rule from , is needed in comparing the
certificate's subject DN to the client's registered DN).
If and how to check a certificate's revocation status is a deployment decision at the discretion of the authorization server.
The PKI method facilitates the way X.509 certificates are traditionally being used
for authentication. It also allows the client to rotate its X.509 certificates
without the need to modify its respective authentication data at the authorization
server by obtaining a new certificate with the same subject DN from a trusted certificate authority (CA).
For the PKI method of mutual TLS client authentication, this specification
defines and registers the following authentication method metadata
value into the "OAuth Token Endpoint Authentication Methods" registry
.
Indicates that client authentication to the authorization server will occur with
mutual TLS utilizing the PKI method of associating a certificate to a client.
The following metadata
parameter is introduced for the
OAuth 2.0 Dynamic Client Registration Protocol in support of
the PKI method of binding a certificate to a client:
An string representation of the expected subject distinguished
name of the certificate, which the OAuth client will use in mutual TLS authentication.
This method of mutual TLS OAuth client authentication
is intended to support client authentication using self-signed certificates.
As pre-requisite, the client registers an X.509 certificate or a trusted source
for its X.509 certificates (such as the jwks_uri defined in
that references a JSON Web Key Set
containing the client's certificates and public keys) with
the authorization server. During authentication,
TLS is utilized to validate the client's possession of the private key
corresponding to the public key presented within the certificate in the respective TLS handshake. In
contrast to the PKI method, the client's certificate chain is not validated by the server in this case.
The client is successfully authenticated if the subject public key info of the
certificate matches the subject public key info of one of the certificates
configured or registered for that particular client.
The Self-Signed Certificate method allows to use mutual TLS to authenticate clients without
the need to maintain a PKI. When used in conjunction with a jwks_uri for the
client, it also allows the client to rotate its X.509 certificates without the
need to change its respective authentication data directly with the authorization server.
For the Self-Signed Certificate method of mutual TLS client authentication, this specification
defines and registers the following authentication method metadata
value into the "OAuth Token Endpoint Authentication Methods" registry
.
Indicates that client authentication to the authorization server will occur using
mutual TLS with the client utilizing a self-signed certificate.
For the Self-Signed Certificate method of binding a certificate to a client using mutual
TLS client authentication, the existing
jwks_uri or jwks
metadata parameters from are used to convey the client's
certificates and public keys, where the X.509
certificates are represented using the JSON Web Key (JWK)x5c parameter (note that Sec 4.7 of RFC 7517
requires that the key in the first certificate of the x5c parameter
must match the public key represented by other members of the JWK).
When mutual TLS is used by the client on the connection to the token endpoint,
the authorization server is able to bind the issued access token to the client certificate.
Such a binding is accomplished by associating the certificate with the token in
a way that can be accessed by the protected resource, such as embedding the certificate
hash in the issued access token directly, using the syntax described in ,
or through token introspection as described in .
Binding the access token to the client certificate in that fashion has the benefit of
decoupling that binding from the client's authentication with the
authorization server, which enables mutual TLS during protected resource access to
serve purely as a proof-of-possession mechanism.
Other methods of associating a certificate with an access token are possible,
per agreement by the authorization server and the protected resource, but are
beyond the scope of this specification.
The client makes protected resource requests as described in ,
however, those requests MUST be made over a mutually authenticated TLS connection
using the same certificate that was used for mutual TLS at the token endpoint.
The protected resource MUST obtain the client certificate
used for mutual TLS authentication
and MUST verify that the certificate matches the
certificate associated with the access token. If they do not match,
the resource access attempt MUST be rejected with an error per
using an HTTP 401 status code and the invalid_token error code.
Metadata to convey server and client capabilities for mutual TLS client certificate bound access tokens
is defined in and respectively.
When access tokens are represented as JSON Web Tokens (JWT),
the certificate hash information SHOULD be represented using
the x5t#S256 confirmation method member defined herein.
To represent the hash of a certificate in a JWT,
this specification defines the new JWT Confirmation Method
member x5t#S256 for the X.509 Certificate SHA-256 Thumbprint.
The value of the x5t#S256 member is
the SHA-256 hash (a.k.a. thumbprint, fingerprint or digest)
of the DER encoding of the X.509 certificate base64url-encoded with with all trailing pad '=' characters omitted and without
the inclusion of any line breaks, whitespace, or other additional characters.
The following is an example of a JWT payload containing an x5t#S256 certificate thumbprint
confirmation method.
If, in the future, certificate thumbprints need to be computed using
hash functions other than SHA-256, it is suggested that additional
related JWT confirmation methods members be defined for that purpose.
For example, a new x5t#S512 (X.509 Certificate Thumbprint
using SHA-512) confirmation method member could be defined by registering it in
the the IANA "JWT Confirmation Methods" registry
for JWT cnf member values
established by .
OAuth 2.0 Token Introspection defines a
method for a protected resource to query
an authorization server about the active state of an
access token as well as to determine meta-information about the token.
For a mutual TLS client certificate bound access token, the hash of the
certificate to which the token is bound
is conveyed to the protected resource as meta-information
in a token introspection response. The hash is conveyed using the same structure as the
certificate SHA-256 thumbprint confirmation method, described in
, as a top-level member of the introspection response JSON.
The protected resource compares
that certificate hash to a hash of the client certificate used for
mutual TLS authentication
and rejects the request, if they do not match.
Proof-of-Possession Key Semantics for JSON Web Tokens defined the
cnf (confirmation) claim, which enables
confirmation key information to be carried in a JWT.
However, the same proof-of-possession semantics are also useful for introspected access tokens
whereby the protected resource obtains the confirmation key data as meta-information
of a token introspection response and uses that information in verifying proof-of-possession.
Therefore this specification defines and registers proof-of-possession semantics for
OAuth 2.0 Token Introspection using the cnf
structure.
When included as a top-level member of an OAuth token introspection response, cnf
has the same semantics and format as the claim of the same name defined in .
While this specification only explicitly uses the x5t#S256
confirmation method member, it needed to define and register the higher level cnf
structure as an introspection response member in order to define and use the more specific
certificate thumbprint confirmation method.
The following is an example of an introspection response for an active token with
an x5t#S256 certificate thumbprint
confirmation method.
This document introduces the following new authorization server
metadata parameter to signal the server's capability to issue certificate
bound access tokens:
OPTIONAL. Boolean value indicating server support for
mutual TLS client certificate bound access tokens. If omitted, the
default value is false.
The following new client
metadata parameter is introduced to convey the client's intention to use certificate
bound access tokens:
OPTIONAL. Boolean value used to indicate the client's intention
to use mutual TLS client certificate bound access tokens.
If omitted, the default value is false.
The authorization server needs to set up its TLS configuration appropriately
for the binding methods it supports.If the authorization server wants to support mutual TLS client authentication
and other client authentication methods in parallel, it should make mutual TLS
optional.If the authorization server supports the Self-Signed Certificate method, it
should configure the TLS stack in a way that it does not verify whether the
certificate presented by the client during the handshake is signed by a trusted CA
certificate.The authorization server may also consider hosting the token endpoint,
and other endpoints requiring client authentication, on
a separate host name or port in order to prevent unintended impact on the TLS behavior of
its other endpoints, e.g. the authorization endpoint.
Since the resource server relies on the authorization server to
perform client authentication, there is no need for the resource server to validate
the trust chain of the client's certificate in any of the methods
defined in this document.
Mutual TLS is used only as a proof-of-possession mechanism during protected
resource access.
The resource server should therefore configure the TLS stack
in a way that it does not verify whether the certificate presented by the client
during the handshake is signed by a trusted CA certificate.
Mutual TLS OAuth client authentication and mutual TLS client certificate bound access tokens
can be used independently of each other.
Use of certificate bound access tokens without mutual TLS OAuth client authentication, for example,
is possible in support of binding access tokens to a TLS client certificate for public clients or clients
utilizing other methods of authentication to the authorization server.
The authorization server would configure the TLS stack in the same manner as for the Self-Signed Certificate method
such that it does not verify that the certificate presented by the client during the handshake is
signed by a trusted CA. Individual instances of a client would create a self-signed
certificate for mutual TLS with both the authorization server and resource server. The authorization
server would not use the mutual TLS certificate to authenticate the client at the OAuth layer
but would bind the issued access token
to that certificate, which the client has proven possession of the corresponding private key.
The access token is then bound to the certificate and can only be used by the client
possessing the certificate and corresponding private key and utilizing them to negotiate mutual TLS on
connections to the resource server.
As described in ,
an access token is bound to a specific client certificate, which means that
the same certificate must be used for mutual TLS on protected resource access.
It also implies that access tokens are invalidated when a client updates the certificate,
which can be handled similar to expired access tokens where the client
requests a new access token (typically with a refresh token) and retries the protected resource
request.
This document describes binding an access token to the
client certificate presented on the TLS connection from the client to the
authorization server's token endpoint,
however, such binding of access tokens issued directly from the authorization
endpoint via the implicit grant flow is explicitly out of scope.
End users interact directly with the authorization endpoint using a web browser
and the use of client certificates in user's browsers bring operational and
usability issues, which make it undesirable to support certificate bound access
tokens issued in the implicit grant flow. Implementations wanting to employ
certificate bound access tokens should utilize grant types
that involve the client making an access token request directly to the token endpoint
(e.g. the authorization code and refresh token grant types).
An authorization server or resource server MAY choose to terminate TLS connections at a load balancer,
reverse proxy, or other network intermediary. How the client certificate metadata is securely
communicated between the intermediary and the application server in this case is out of scope of this specification.
TLS 1.2 is cited in this document because,
at the time of writing, it is the latest version that is widely deployed.
However, this document is applicable with other TLS versions supporting
certificate-based client authentication, including the relatively recently published TLS 1.3.
Implementation security considerations for TLS, including version recommendations,
can be found in
Recommendations for Secure Use of Transport Layer Security (TLS)
and Datagram Transport Layer Security (DTLS).
If the PKI method of client authentication is used, an attacker could try to impersonate a client using
a certificate with the same subject DN but issued by a different CA, which the authorization server trusts.
To cope with that threat, the authorization server should only accept as trust anchors
a limited number of CAs whose certificate issuance policy meets its security requirements.
There is an assumption then that the client and server agree on the set
of trust anchors that the server uses to create and validate the
certificate chain. Without this assumption the use of a Subject DN
to identify the client certificate would open the server up to
certificate spoofing attacks.
Parsing and validation of X.509 certificates and certificate chains is complex and implementation
mistakes have previously exposed security vulnerabilities.
Complexities of validation include (but are not limited to)
:
checking of Basic Constraints, basic and extended Key Usage constraints, validity periods, and critical extensions;handling of null-terminator bytes and non-canonical string representations in subject names;handling of wildcard patterns in subject names;recursive verification of certificate chains and checking certificate revocation.
For these reasons, implementors SHOULD use an established and well-tested X.509 library
(such as one used by an established TLS library) for validation of X.509 certificate chains
and SHOULD NOT attempt to write their own X.509 certificate validation procedures.
This specification requests registration of the following value
in the IANA "JWT Confirmation Methods" registry
for JWT cnf member values
established by .
Confirmation Method Value: x5t#S256Confirmation Method Description: X.509 Certificate SHA-256 ThumbprintChange Controller: IESGSpecification Document(s): of [[ this specification ]]
This specification requests registration of the following value
in the IANA "OAuth Authorization Server Metadata" registry
established by .
Metadata Name: tls_client_certificate_bound_access_tokensMetadata Description: Indicates authorization server support for mutual TLS client certificate bound
access tokens.Change Controller: IESGSpecification Document(s): of [[ this specification ]]
This specification requests registration of the following value
in the IANA "OAuth Token Endpoint Authentication Methods" registry
established by .
Token Endpoint Authentication Method Name: tls_client_authChange Controller: IESGSpecification Document(s): of [[ this specification ]]Token Endpoint Authentication Method Name: self_signed_tls_client_authChange Controller: IESGSpecification Document(s): of [[ this specification ]]
This specification requests registration of the following value
in the IANA "OAuth Token Introspection Response" registry
established by .
Claim Name: cnfClaim Description: ConfirmationChange Controller: IESGSpecification Document(s): of [[ this specification ]]
This specification requests registration of the following client metadata definitions
in the IANA "OAuth Dynamic Client Registration Metadata" registry
established by :
Client Metadata Name: tls_client_certificate_bound_access_tokens
Client Metadata Description:
Indicates the client's intention to use mutual TLS client certificate bound
access tokens.
Change Controller: IESG
Specification Document(s): of [[ this specification ]]
Client Metadata Name: tls_client_auth_subject_dn
Client Metadata Description:
String value specifying the expected subject distinguished name of the
client certificate.
Change Controller: IESG
Specification Document(s): of [[ this specification ]]
Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are widely used to protect data exchanged over application protocols such as HTTP, SMTP, IMAP, POP, SIP, and XMPP. Over the last
few years, several serious attacks on TLS have emerged, including attacks on its most commonly used cipher suites and their modes of operation. This document provides recommendations for improving the
security of deployed services that use TLS and DTLS. The recommendations are applicable to the majority of use cases.
Secure Hash Standard (SHS)National Institute of Standards and
TechnologyOAuth ParametersIANAJSON Web Token ClaimsIANACommon x509 certificate validation/creation pitfallsThe Most Dangerous Code in the World: Validating SSL Certificates in Non-Browser SoftwareOAuth 2.0 Token Binding
enables the application of Token Binding to the various artifacts and tokens employed throughout OAuth.
That includes binding of an access token to a Token Binding key, which bears some similarities in motivation
and design to the mutual TLS client certificate bound access tokens defined in this document.
Both documents define what is often called a proof-of-possession security mechanism
for access tokens, whereby a client must demonstrate possession of cryptographic keying
material when accessing a protected resource. The details differ somewhat between the two documents but both
have the authorization server bind the access token that it issues to an asymmetric key pair
held by the client. The client then proves possession of the private key from that pair
with respect to the TLS connection over which the protected resource is accessed.
Token Binding uses bare keys that are generated on the client,
which avoids many of the difficulties of creating, distributing, and managing certificates
used in this specification. However, at the time of
writing, Token Binding is fairly new and there is relatively little support for it in available
application development platforms and tooling. Until better support for the underlying
core Token Binding specifications exists, practical implementations of OAuth 2.0 Token Binding
are infeasible.
Mutual TLS, on the other hand, has been around for some time and enjoys
widespread support in web servers and development platforms. As a consequence, OAuth 2.0 Mutual TLS
Client Authentication and Certificate Bound Access Tokens can be
built and deployed now using existing platforms and tools.
In the future, the two specifications are likely to be
deployed in parallel for solving similar problems in different environments.
Authorization servers may even support both specifications simultaneously using different
proof-of-possession mechanisms for tokens issued to different clients.
Scott "not Tomlinson" Tomilson and Matt Peterson were involved in
design and development work on a mutual TLS OAuth client authentication
implementation, which predates this document. Experience and learning from that work
informed some of the content of this document.
Additionally, the authors would like to thank the following people for
their input and contributions to the specification:
Sergey Beryozkin,
Sophie Bremer,
Vladimir Dzhuvinov,
Samuel Erdtman,
Leif Johansson,
Michael Jones,
Phil Hunt,
Benjamin Kaduk,
Takahiko Kawasaki,
Sean Leonard,
Kepeng Li,
Neil Madden,
James Manger,
Jim Manico,
Nov Matake,
Sascha Preibisch,
Justin Richer,
Dave Tonge,
and
Hannes Tschofenig.
[[ to be removed by the RFC Editor before publication as an RFC ]]
draft-ietf-oauth-mtls-11
Editorial updates.Mention/reference TLS 1.3 RFC8446 in the TLS Versions and Best Practices section.
draft-ietf-oauth-mtls-10
Update draft-ietf-oauth-discovery reference to RFC8414
draft-ietf-oauth-mtls-09
Change "single certificates" to "self-signed certificates" in the Abstract
draft-ietf-oauth-mtls-08
Incorporate clarifications and editorial improvements from Justin Richer's WGLC reviewDrop the use of the "sender constrained" terminology per WGLC feedback from Neil Madden (including changing
the metadata parameters from mutual_tls_sender_constrained_access_tokens
to tls_client_certificate_bound_access_tokens)Add a new security considerations section on X.509 parsing and validation
per WGLC feedback from Neil Madden and Benjamin KadukNote that a server can terminate TLS at a load balancer, reverse proxy, etc. but how the
client certificate metadata is securely communicated to the backend is out of scope per WGLC feedbackNote that revocation checking is at the discretion of the AS per WGLC feedbackEditorial updates and clarificationsUpdate draft-ietf-oauth-discovery reference to -10 and draft-ietf-oauth-token-binding to -06Add folks involved in WGLC feedback to the acknowledgements list
draft-ietf-oauth-mtls-07
Update to use the boilerplate from RFC 8174
draft-ietf-oauth-mtls-06
Add an appendix section describing the relationship of this document to OAuth Token Binding as
requested during the the Singapore meeting
https://datatracker.ietf.org/doc/minutes-100-oauth/Add an explicit note that the implicit flow is not supported for obtaining certificate
bound access tokens as discussed at the Singapore meeting
https://datatracker.ietf.org/doc/minutes-100-oauth/Add/incorporate text to the Security Considerations on Certificate Spoofing as
suggested https://mailarchive.ietf.org/arch/msg/oauth/V26070X-6OtbVSeUz_7W2k94vCoChanged the title to be more descriptiveMove the Security Considerations section to before the IANA ConsiderationsElaborated on certificate bound access tokens a bit more in the AbstractUpdate draft-ietf-oauth-discovery reference to -08
draft-ietf-oauth-mtls-05
Editorial fixes
draft-ietf-oauth-mtls-04
Change the name of the 'Public Key method' to the more accurate 'Self-Signed Certificate method' and
also change the associated authentication method metadata value to "self_signed_tls_client_auth".Removed the "tls_client_auth_root_dn" client metadata field as discussed in
https://mailarchive.ietf.org/arch/msg/oauth/swDV2y0be6o8czGKQi1eJV-g8qcUpdate draft-ietf-oauth-discovery reference to -07Clarify that MTLS client authentication isn't exclusive to the token endpoint
and can be used with other endpoints, e.g. RFC 7009 revocation and 7662 introspection,
that utilize client authentication as discussed in
https://mailarchive.ietf.org/arch/msg/oauth/bZ6mft0G7D3ccebhOxnEYUv4puIReorganize the document somewhat in an attempt to more clearly make a distinction between
mTLS client authentication and certificate bound access tokens as well as a more clear
delineation between the two (PKI/Public key) methods for client authenticationEditorial fixes and clarifications
draft-ietf-oauth-mtls-03
Introduced metadata and client registration parameter to publish and request
support for mutual TLS sender constrained access tokensAdded description of two methods of binding the cert and client, PKI and Public Key.Indicated that the "tls_client_auth" authentication method is for the PKI method and
introduced "pub_key_tls_client_auth" for the Public Key methodAdded implementation considerations, mainly regarding TLS stack configuration
and trust chain validation, as well as how to to do binding of access tokens to a TLS client
certificate for public clients, and considerations around certificate bound access tokensAdded new section to security considerations on cert spoofingAdd text suggesting that a new cnf member be defined in the future,
if hash function(s) other than SHA-256 need to be used for certificate thumbprints
draft-ietf-oauth-mtls-02
Fixed editorial issue https://mailarchive.ietf.org/arch/msg/oauth/U46UMEh8XIOQnvXY9pHFq1MKPnsChanged the title (hopefully "Mutual TLS Profile for OAuth 2.0" is better than "Mutual TLS Profiles for OAuth Clients").
draft-ietf-oauth-mtls-01
Added more explicit details of using RFC 7662 token introspection with mutual TLS sender constrained access tokens.Added an IANA OAuth Token Introspection Response Registration request for "cnf".Specify that tls_client_auth_subject_dn and tls_client_auth_root_dn are RFC 4514 String Representation of Distinguished Names.Changed tls_client_auth_issuer_dn to tls_client_auth_root_dn.Changed the text in the to not be specific about using a hash of the cert.Changed the abbreviated title to 'OAuth Mutual TLS' (previously was the acronym MTLSPOC).
draft-ietf-oauth-mtls-00
Created the initial working group version from draft-campbell-oauth-mtls
draft-campbell-oauth-mtls-01
Fix some typos.Add to the acknowledgements list.
draft-campbell-oauth-mtls-00
Add a Mutual TLS sender constrained protected resource access method
and a x5t#S256 cnf method for JWT access tokens
(concepts taken in part from draft-sakimura-oauth-jpop-04).
Fixed "token_endpoint_auth_methods_supported" to "token_endpoint_auth_method" for client metadata.
Add "tls_client_auth_subject_dn" and "tls_client_auth_issuer_dn" client metadata parameters and
mention using "jwks_uri" or "jwks".
Say that the authentication method is determined by client policy regardless of whether the client
was dynamically registered or statically configured.
Expand acknowledgements to those that participated in discussions around
draft-campbell-oauth-tls-client-auth-00
Add Nat Sakimura and Torsten Lodderstedt to the author list.
draft-campbell-oauth-tls-client-auth-00
Initial draft.