support RFC 8693 (OAuth 2.0 Token Exchange) for getting new One Time Password token from existing access token #180
Replies: 3 comments 1 reply
-
Can you please tell us more about why you need this? The specific scenario? That'll help us answering this better. |
Beta Was this translation helpful? Give feedback.
-
Of course, Scenario, you already have an access token from duende identity server for api calls backchannel(=read api), Now you get a more restrictive access token(=read One Time Password access token) from this access token to use one time over frontchannel(=read browser) with max 1 minute lifetime. Rule is that OTP token is at least always more restictive in scope and lifetime as original access token. When One Time password access token is used in frontchannel it cannot be used again. In other words OTP token when check for second time with introspect endpoint must fail even when its lifetime is within 1 minute. This with restrictive lifetime is more secure for use over frontchannel then long duration less restrictive access token. We need this for healthcare solution. My suggestion is to use RFC 8693 (OAuth 2.0 Token Exchange) for token endpoint in duende identity server and also use token introspect endpoint for validation of OTP token. |
Beta Was this translation helpful? Give feedback.
-
You could implement this using a custom We'll keep this feature request open for others to chime in, but your scenario seems a specific use case where a custom implementation will be better suited. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Would be nice if duende identity server in token endpoint would support exchanging existing token to new One Time Password token.
Beta Was this translation helpful? Give feedback.
All reactions