Skip to content

Latest commit

 

History

History
130 lines (98 loc) · 7.67 KB

client-auth-doc.md

File metadata and controls

130 lines (98 loc) · 7.67 KB

Client Authentication in OIDC

The client authentication in OAuth2 is described in RFC 6749. In this standard and the successor ones the secret based authentication is the required one and still it is the first choice for many implementations. The use of it in enterprise applications can get a problem, especially if security policy requires a rotation for such use cases. In the beginning there were not really alternatives, e.g. only a generic description in other authentication section.

This has changed with OIDC and in the OAuth 2.1 standard. The other authentication section describes here 2 real alternatives for secrets, namely mTLS RFC8705 and Private Key JWT. These standards support rotation without disruption and without sharing a secret/private information between 2 parties.

RFC 8705, mTLS

This RFC standard is not part of OIDC but was added later. The approach is mainly known for user authentication and is typically used as secure alternative to username and password. The same authentication is re-used in OIDC to authenticate an OAuth2 client. SAP Cloud Identity (SCI) supports so-called Certificate Authentication for users. For operations the REST authentication supports also the same, called API Authentication.

Therefore, the usage of client certificates for OAuth2 clients is supported in SAP Cloud Identity (SCI).

Example Usage

openid-client -issuer <yourSCI> -client_id 11111111-your-client-11111111 -client_tls ./final_result.p12 -pin Test1234

Private Key JWT

In short, this term means a JWT created from a private key is used to authenticate a client. This standard has 2 approaches

  • OAuth2 with RFC7523, supported in SAP Cloud Identity within client authentication, subsection "Trust by issuer". In EntraID section Certificates & secrets, tab Federated credentials.
  • OIDC with client authentication method private_key_jwt, supported in SAP Cloud Identity within client authentication, subsection "Trust by URI". In EntraID the JWKS_URI is not supported (yet), but only with X509 and x5t header. Okta supports only this type.

Remark: This tool supports both private_key_jwt flavours. SAP Cloud Identity supports both standards. To know what your server supports is therefore important. In general OIDC includes OAuth2, therefore both standards are valid for an OIDC complaint server, but in real the creation of the used JWT is different in its claims. See examples.

The usage for OAuth2 (RFC 7523) complaint usage

openid-client -issuer <yourSCI> -client_id 11111111-your-client-11111111 -client_assertion jwt-token-from-another-tenant-or-application

The token in client_assertion can be a client_credentials token from another provider, e.g. UAA or another SCI tenant.

The usage for OIDC complaint usage

openid-client -issuer <yourSCI> -client_id 11111111-your-client-11111111 -client_jwt ./final_result.p12 -pin Test1234

Remark: The openid-client tool can be used against SCI, EntraID or UAA. Instead of "yourSCI", use "https://login.microsoftonline.com/{your-tid-from-microsoft}/v2.0" or https://uaa.cf.landscape.org/oauth/token The token exchanges typically can be tested from SCI to EntraID/UAA or vice versa.

Pro and Cons between both standards

The pro and cons depend not on the protocol, but on the infrastructure which is used to support them. In most cloud environments the TLS termination is done in proxies or load balancers in front of the OAuth2/OIDC server. This is the case for SAP Cloud Identity and for (XS)UAA in CF. The mTLS used X509 certificate is then set into a header variable and transported to the authentication server. The termination component (proxy/load balancer) has no knowledge about the mappings but typically allow most often only CA signed certificates. This makes it hard to supported generic mTLS.

In SAP Cloud Identity the applications allow to generate a P12 in section client authentication. These P12 files contain CA signed certificates, and therefore they can be used with this tool.

mTLS

The standard is not part of OIDC but only available in addition in RFC 8705.

Pro
  • Easy to support in client components, e.g. curl, client REST frameworks. They all support X509 authentication and therefore a setup on client side is easy.
Cons
  • CA signed certificates are needed. Customers can have their own CA and register then their CA, but this is extra effort.
  • OAuth2/OIDC server support can be complicated, because the real TLS termination is most often done in a gateway before, and the mapping from a X509 to a client is done based on HTTP header variables and content. This content and the header variable can differ. You need to establish a check for passing only mTLS verified calls to the OAuth2 server otherwise you will have a big security problem if you only rely on Unit tests or Mocks etc.

Private Key JWT

OAuth2 servers more often support this client authentication.

Private Key JWT - OAuth2 (RFC7523) flavour

Pro
  • Another client credential tokens can be used. No extra generation with tools like this here needed.
  • More than one trust anchor is possible.
  • Support in EntraID, SAP Cloud Identity, UAA.
Cons
  • The standard and configuration is much more complicated.
  • The standard is defined for System-2-System communication only, not for single clients.

Private Key JWT - OIDC flavour

Pro
  • The mapping in SAP Cloud Identity is easy, either with extra mapped certificate or JWKS_URI.
  • Self-Signed/Self-created certificates can be used.
  • Flexible use in single clients.
Cons
  • There are not many tools or frameworks for developers which supports this, therefore this tool was created for. Okta, KeyCloak supports it.
  • Only one trust anchor is possible

Howto Use the Private Key only for Private Key JWT

  1. Optional create key pairs and X509 certificate
openssl req -x509 -newkey rsa:4096 -keyout key.pem -out cert.pem -sha256 -days 3650 -nodes -subj "/C=DE/ST=BW/L=Walldorf/O=SAP/OU=Security/CN=localhost"
  1. Use the private key for client authentication
openid-client -issuer <yourSCI> -client_id 11111111-your-client-11111111 -client_jwt_kid ./key.pem -client_jwt_kid key-id-1

Howto setup PKCS12 Key+Certificate for Private Key JWT

  1. Optional create key pairs and X509 certificate
openssl req -x509 -newkey rsa:4096 -keyout key.pem -out cert.pem -sha256 -days 3650 -nodes -subj "/C=DE/ST=BW/L=Walldorf/O=SAP/OU=Security/CN=localhost"
  1. Convert the key and certificate into a P12 and set a transport pin.
openssl pkcs12 -export -legacy -inkey key.pem -in cert.pem -out final_result.p12 -passout pass:Test1234
  1. Upload the cert.pem file or content to the SAP Cloud Identity application

https://help.sap.com/docs/identity-authentication/identity-authentication/dev-configure-certificates-for-api-authentication

  1. Use the P12 for client authentication
openid-client -issuer <yourSCI> -client_id 11111111-your-client-11111111 -client_jwt ./final_result.p12 -pin Test1234

SAP Cloud Identity OIDC

https://help.sap.com/docs/identity-authentication/identity-authentication/openid-connect