Web Authorization Protocol
charter-ietf-oauth-05-04
| Document | Proposed charter | Web Authorization Protocol WG (oauth) | |
|---|---|---|---|
| Title | Web Authorization Protocol | ||
| Last updated | 2026-05-10 | ||
| State | Start Chartering/Rechartering (Internal Steering Group/IAB Review) Rechartering | ||
| WG | State | Active | |
| IESG | Responsible AD | Deb Cooley | |
| Charter edit AD | Deb Cooley | ||
| Telechat date |
On agenda of 2026-05-21 IESG telechat
Has enough positions to pass. |
||
| Send notices to | debcooley1@gmail.com |
The Web Authorization (OAuth) protocol is a delegation protocol that allows users to grant third-party applications limited access to their resources without sharing their long-term credentials, or even their identity. For example, a photo-sharing site that supports OAuth could allow its users to use a third-party printing website to print their private pictures, without allowing the printing site to gain full control of the user's account and without requiring the user to share their long-term credentials with the printing site.
As automated agents increasingly act on behalf of users, organizations, or both, these delegation patterns become increasingly involved and complex.
The OAuth 2.0 protocol framework already includes:
- A procedure for enabling a client to register with an authorization server.
- A protocol for obtaining authorization tokens from an authorization server with the resource owner's consent.
- Protocols for presenting these authorization tokens to protected resources for access.
This framework has been enhanced with functionality for interworking with legacy identity infrastructure, token revocation, token exchange, dynamic client registration, token introspection, and standardized formats like JSON Web Token (JWT). It also includes specifications to mitigate security attacks, such as Proof Key for Code Exchange (PKCE), native app support, step-up authentication, and Demonstrating Proof of Possession (DPoP).
Work Program
The working group is now tackling these topics which will be published as Standards Track or BCPs:
- Consolidation: Finalizing OAuth 2.1 to consolidate the core framework and incorporate established security best practices into a single baseline.
- Digital Credentials: Completing Selective Disclosure for JSON Web Tokens (SD-JWT), SD-JWT-based Verifiable Credentials (SD-JWT VC), and Token Status List (TSL) to support privacy-preserving attribute disclosure.
- Complex Delegation: Developing new mechanisms or/and extensions for authorization of automated agents working on behalf of users, including addressing scenarios where automated agents act across multiple administrative domains.
- First-Party Integration: Standardizing patterns for first-party applications to provide a secure, interoperable alternative to proprietary extensions.
- Security Maintenance: Maintaining and updating Best Current Practices (BCPs) for browser-based and native applications to address evolving web security models.
Coordination
To ensure interoperability and avoid duplication of effort, the working group will coordinate with:
- WIMSE (Workload Identity in Multi-System Environments): On the application of OAuth-based tokens (e.g., Token Exchange and DPoP) for service-to-service and multi-hop workload identities.
- Secure Patterns for Internet CrEdentials (SPICE): on the application of SD-CWT and other CBOR related work.
- EU Wallet Initiative: To ensure that SD-JWT and related credential formats remain compatible with broader architectural requirements for digital wallets and verifiable presentations.
Proposed milestones
Milestones
| Date | Milestone | Associated documents |
|---|---|---|
| Dec 2026 | Submit “Transaction Tokens” to the IESG |
draft-ietf-oauth-transaction-tokens
|
| Dec 2026 | Submit “OAuth 2.1 Authorization Framework’ to IESG |
draft-ietf-oauth-v2-1
|
| Jul 2026 | Submit “SD-JWT-based Verifiable Digital Credentials (SD-JWT VC)” to the IESG |
draft-ietf-oauth-sd-jwt-vc
|