openid-connect and oauth2

oauth2

Abstract from the oauth2 standard.

The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf.

https://tools.ietf.org/html/rfc6749The oauth2 specification is quite good and therefore this documentation page about oauth2 takes a quite minimalistic approach, only explaining the things that are not clear from the specification (from the author's perspective) while also giving some more examples in a VSETH context..

General points (that a lot of people get wrong):

  • oauth2 only deals with AUTHORIZATION but doesn't care about AUTHENTICATION (this is what openid-connect is used for).

Concepts

Registering Clients


Terms

TermExplanationExample in VSETH context
Resource OwnerThe person / entity that grants access to a protected resource. Resource Ownership can also be shared by multiple persons.
  • Each user of an vseth application is the resource owner for his own private data e.g. his email address or profile information.
  • If you create an event in the eventmanager application you become the resource owner of this event. But if you give other users also access to edit your events, they too become resources owners of this protected resource.
End-UserA resource owner that is also a person.-
Resource ServerThe server application hosting the protected resources. Should be able to handle requests to the resources by checking access tokens.
  • The people-api of VSETH acts as a resource server. If the user has the necessary access token, the client may request data from the people-api.
ClientAn application making protected resource requests on behalf of the resource owner. (independent on which platform the client is running)
  • The VSETH golden owl may query a backend service to get all the lectures a given user has signed uf for in the last two semesters.
Authorization serverThe server issuing access tokens to the client after successfully authenticating the resource 
  • Keycloak is the VSETH Authorization Server.
Authorization Grant

An authorization grant is a piece of cryptographic material proving that the resource has given the authorization to a client to access a certain protected resource by getting an access token for it.


There are four different authorization grants defined by the oauth2 specification.

  • Authorization Code
  • Implicit
  • Resource Owner Password Credentials
  • Client Credentials

The inner workings are defined in the specification. For VSETH the resource owner password credentials is not used.

  • TODO: Login flow golden OWL
Authorization CodeIs one of the authorization grants supported by the oauth2 specification.
ImplicitIs one of the authorization grants supported by the oauth2 specification.
Resource Owner Password CredentialsIs one of the authorization grants supported by the oauth2 specification.
Client CredentialsIs one of the authorization grants supported by the oauth2 specification.
Access TokenAccess tokens are credentials used to access protected resources. An access token is a string representing an authorization issued to the client. The string is usually opaque to the client. Tokens
represent specific scopes and durations of access, granted by the resource owner, and enforced by the resource server and authorization
server.
  • VSETH uses JWT for access tokens.
Refresh TokenRefresh tokens are credentials used to obtain access tokens. Refresh tokens are issued to the client by the authorization server and are used to obtain a new access token when the current access token becomes invalid or expires, or to obtain additional access tokens
with identical or narrower scope (access tokens may have a shorter lifetime and fewer permissions than authorized by the resource owner).

Client Type: confidential

Client Type: public


OpendID Connect

Specification: https://openid.net/specs/openid-connect-core-1_0.html#Introduction

Different Tokens

  • ID token: Identity card for each users, contains information about the user which is signed as a JWT token and can therefore be used by a client.
  • Access token: Token that caries information about the user 
  • Userinfo: Userinfo endpoint may be called with an access token to get information as a user as a JSON object or jwt. 

Claims


  • Access Token ist ein super set vom ID Token

Standard OpenId Connect


MemberTypeDescriptionVSETH UsageKeycloak ScopeOptional
substringSubject - Identifier for the End-User at the Issuer.--FALSE
namestringEnd-User's full name in displayable form including all name parts, possibly including titles and suffixes, ordered according to the End-User's locale and preferences.
profileFALSE
given_namestringGiven name(s) or first name(s) of the End-User. Note that in some cultures, people can have multiple given names; all can be present, with the names being separated by space characters.
profileFALSE
family_namestringSurname(s) or last name(s) of the End-User. Note that in some cultures, people can have multiple family names or no family name; all can be present, with the names being separated by space characters.
profileFALSE
middle_namestringMiddle name(s) of the End-User. Note that in some cultures, people can have multiple middle names; all can be present, with the names being separated by space characters. Also note that in some cultures, middle names are not used.No (eth ldap doesn't use middlenames)profile-
nicknamestringCasual name of the End-User that may or may not be the same as the given_name. For instance, a nickname value of Mike might be returned alongside a given_name value of Michael.Yes (for the moment set to given_name)profileFALSE
preferred_usernamestringShorthand name by which the End-User wishes to be referred to at the RP, such as janedoe or j.doe. This value MAY be any valid JSON string including special characters such as @, /, or whitespace. The RP MUST NOT rely upon this value being unique, as discussed in Section 5.7.nethz name ext-$email, equal to unique_usernameprofileFALSE
profilestringURL of the End-User's profile page. The contents of this Web page SHOULD be about the End-User.YesprofileTRUE
picturestringURL of the End-User's profile picture. This URL MUST refer to an image file (for example, a PNG, JPEG, or GIF image file), rather than to a Web page containing an image. Note that this URL SHOULD specifically reference a profile photo of the End-User suitable for displaying when describing the End-User, rather than an arbitrary photo taken by the End-User.YesprofileTRUE
websitestringURL of the End-User's Web page or blog. This Web page SHOULD contain information published by the End-User or an organization that the End-User is affiliated with.YesprofileTRUE
emailstringEnd-User's preferred e-mail address. Its value MUST conform to the RFC 5322 [RFC5322] addr-spec syntax. The RP MUST NOT rely upon this value being unique, as discussed in Section 5.7.YesemailFALSE
email_verifiedbooleanTrue if the End-User's e-mail address has been verified; otherwise false. When this Claim Value is true, this means that the OP took affirmative steps to ensure that this e-mail address was controlled by the End-User at the time the verification was performed. The means by which an e-mail address is verified is context-specific, and dependent upon the trust framework or contractual agreements within which the parties are operating.Mapping auf True (da AAI)emailFALSE
genderstringEnd-User's gender. Values defined by this specification are female and male. Other values MAY be used when neither of the defined values are applicable.YesgenderTRUE
birthdatestringEnd-User's birthday, represented as an ISO 8601:2004 [ISO8601‑2004] YYYY-MM-DD format. The year MAY be 0000, indicating that it is omitted. To represent only the year, YYYY format is allowed. Note that depending on the underlying platform's date related function, providing just year can result in varying month and day, so the implementers need to take this factor into account to correctly process the dates.YesbirthdateTRUE
zoneinfostringString from zoneinfo [zoneinfo] time zone database representing the End-User's time zone. For example, Europe/Paris or America/Los_Angeles.

Yes

  • Browser Mapping?
profile?
localestringEnd-User's locale, represented as a BCP47 [RFC5646] language tag. This is typically an ISO 639-1 Alpha-2 [ISO639‑1] language code in lowercase and an ISO 3166-1 Alpha-2 [ISO3166‑1] country code in uppercase, separated by a dash. For example, en-US or fr-CA. As a compatibility note, some implementations have used an underscore as the separator rather than a dash, for example, en_US; Relying Parties MAY choose to accept this locale syntax as well.

Yes

  • Browser Mapping?
profile?
phone_numberstringEnd-User's preferred telephone number. E.164 [E.164] is RECOMMENDED as the format of this Claim, for example, +1 (425) 555-1212 or +56 (2) 687 2400. If the phone number contains an extension, it is RECOMMENDED that the extension be represented using the RFC 3966 [RFC3966] extension syntax, for example, +1 (604) 555-1234;ext=5678.YesphoneTRUE
phone_number_verifiedbooleanTrue if the End-User's phone number has been verified; otherwise false. When this Claim Value is true, this means that the OP took affirmative steps to ensure that this phone number was controlled by the End-User at the time the verification was performed. The means by which a phone number is verified is context-specific, and dependent upon the trust framework or contractual agreements within which the parties are operating. When true, the phone_number Claim MUST be in E.164 format and any extensions MUST be represented in RFC 3966 format.YesphoneTRUE
addressJSON objectEnd-User's preferred postal address. The value of the address member is a JSON [RFC4627] structure containing some or all of the members defined in Section 5.1.1.YesaddressTRUE
updated_atnumberTime the End-User's information was last updated. Its value is a JSON number representing the number of seconds from 1970-01-01T0:0:0Z as measured in UTC until the date/time.YesprofileTRUE

 VSETH Claim

MemberTypeDescriptionVSETH UsageKeycloak ScopeOptional
unique_usernamestring
YesprofileFALSE






vseth_membershipboolean
Yesvseth-profileFALSE
study_association

string:

OrgID | "None"


Yesvseth-profileFALSE
study_association_name_destring

vseth-profileTRUE (only for members)
study_association_name_enstring

vseth-profileTRUE (only for members)
home_organizationstringexample: "ethz.ch" / "uzh.ch" as provided by switch.
university-affiliationFALSE
affiliationstring

university-affiliationFALSE
department_shortstring

eth-affiliationTRUE
department_namestring

eth-affiliationTRUE

STUDIENGANG_TYP; BSC / MSC etc.


string

eth-affiliationTRUE

FACHRICHTUNG; Fachrichtung


string

eth-study-informationTRUE

STUDIENGANG; Studiengang


string

eth-study-informationTRUE
STUDIENPLANSEMESTER; Studiengang


eth-study-informationTRUE
legi_numberstring
Yeseth-legi-numberTRUE




















ScopeConsent
profileNo
emailYes
genderYes
birthdateYes
phoneYes
addressYes
vseth-profileNo
university-affiliationNo
eth-affiliationYes
eth-study-informationYes
eth-legi-numberYes

Claims

https://openid.net/specs/openid-connect-core-1_0.html#StandardClaims


Access Token

  • Scopes
  • Roles

User Attribute

  • ETH Account Typ (Gast / kein Gast)