We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
To mitigate the risk of OIDC token replay, we could require proof-of-possession for the OIDC tokens. Two approaches:
Once we have this, Fulcio could populate a "pop-verified" claim in the issued X.509 cert.
Bonus: OpenPubKey supports "Cosign-MFA" (not related to Sigstore's Cosign), which can prevent a malicious OIDC provider from issuing bad certificates.
The text was updated successfully, but these errors were encountered:
https://datatracker.ietf.org/doc/html/draft-ietf-oauth-dpop
Sorry, something went wrong.
No branches or pull requests
To mitigate the risk of OIDC token replay, we could require proof-of-possession for the OIDC tokens. Two approaches:
Once we have this, Fulcio could populate a "pop-verified" claim in the issued X.509 cert.
Bonus: OpenPubKey supports "Cosign-MFA" (not related to Sigstore's Cosign), which can prevent a malicious OIDC provider from issuing bad certificates.
The text was updated successfully, but these errors were encountered: