Hi Francisco, if a token is created for access to server S1 and S2 then any party that gets access to the token can obviously access both servers. This should not be super surprising. So, if you have a deployment where you want to grant access to resources at multiple servers and the attack you describe is a concern then you need to create multiple tokens. The content of the token defines what the token can be used for. The bearer token specification does not define the content of the token and therefore it is difficult to say more about it beyond what it already says. If you think it is worth to specify highlight this type of attack then the appropriate place to describe it is the threats document. Ciao From: ietf-bounces@xxxxxxxx [mailto:ietf-bounces@xxxxxxxx] On Behalf Of ext Francisco Corella The bearer token protocol described in the document referenced in the |
_______________________________________________ Ietf mailing list Ietf@xxxxxxxx https://www.ietf.org/mailman/listinfo/ietf