<?xml version="1.0" encoding="US-ASCII"?>
<!DOCTYPE rfc SYSTEM "rfc2629.dtd">
<?rfc toc="yes"?>
<?rfc tocompact="yes"?>
<?rfc tocdepth="2"?>
<?rfc tocindent="yes"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="no"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<rfc category="std" docName="draft-wdenniss-oauth-incremental-auth-00"
    ipr="trust200902">

  <front>

    <title abbrev="OAuth 2.0 Incremental Auth">OAuth 2.0 Incremental Authorization</title>

    <author fullname="William Denniss" initials="W." surname="Denniss">
      <organization>Google</organization>
      <address>
        <postal>
          <street>1600 Amphitheatre Pkwy</street>
          <city>Mountain View</city>
          <region>CA</region>
          <code>94043</code>
          <country>USA</country>
        </postal>
        <facsimile/>
        <email>wdenniss@google.com</email>
        <uri>http://wdenniss.com/incremental-auth</uri>
      </address>
    </author>

    <date day="3" month="July" year="2017"/>
    <area>Security</area>
    <workgroup>OAuth Working Group</workgroup>

    <abstract>
      <t>
        OAuth 2.0 authorization requests that include every scope the client
        might ever need can result in over-scoped authorization and a sub-optimal
        end-user consent experience. This specification enhances the OAuth 2.0 authorization
        protocol by adding incremental authorization, the ability to request specific
        authorization scopes as needed, when they're needed, removing the requirement
        to request every possible scope that might be needed upfront.
      </t>
    </abstract>
  </front>

  <middle>
    <section title="Introduction" anchor="intro">
      <t>
        OAuth 2.0 clients may offer multiple features that requiring user authorization,
        but commonly not every user will use each feature.
        Without incremental authentication, applications need to either
        request all the possible scopes they need upfront, potentially resulting in a bad user
        experience, or track each authorization grant separately, complicating development.
      </t>
      <t>
        The goal of incremental authorization is to allow clients to request just the scopes
        they need, when they need them, while allowing them to store a single authorization grant
        for the user that contains the sum of the scopes granted. Thus, each new authorization
        request increments the scope of the authorization grant, without the client needing
        to track a separate authorization grant for each group of scopes. 
      </t>
    </section>
    <section title="Notational Conventions" anchor="NotationalConventions">
      <t>
        The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
        "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY",
        and "OPTIONAL" in this document are to be interpreted as described in
        Key words for use in RFCs to Indicate Requirement Levels
        <xref target='RFC2119' />. If these words are used without being spelled
        in uppercase then they are to be interpreted with their normal natural
        language meanings.
      </t>
    </section>

    <section title="Terminology" anchor="terminology">
      <t>
        In addition to the terms defined in referenced specifications, this
        document uses the following terms:
      </t>
      <t>
        <list style="hanging">
          <t hangText='"OAuth"'>
            In this document, OAuth refers to 
            <xref target="RFC6749">OAuth 2.0</xref>.
          </t>
        </list>
      </t>
    </section>
    
    <section title="Incremental Auth for Confidential Clients" anchor="overview">

      <t>
        For confidential clients, such as web servers that can keep secrets,
        the authorization endpoint SHOULD treat scopes that the user
        already granted differently on the consent user interface. Typically
        such scopes are hidden for new authorization requests, or at least
        there is an indication that the user already approved them.
      </t>
      <t>
        By itself, this property of the authorization endpoint enables incremental authorization.
        The client can track every scope they've ever requested, and include those
        scopes on every new authorization request.
      </t>
      <t>
        To avoid the need for confidential clients to re-request already authorized scopes,
        authorization servers MAY support an additional "include_granted_scopes" parameter in the authorization request.
        This parameter, enables the client to request tokens during the authorization grant
        exchange that represent the full scope of the user's grant to the application
        including any previous grants, without the app needing to track the scopes directly.
      </t>
      <t>
        The client indicates they wish the new authorization grant to include
        previously granted scopes by sending the following additional parameter 
        in the OAuth 2.0 Authorization Request (Section 4.1.1 of <xref target="RFC6749"/>.)
        using the following additional parameter:
      </t>
      <t>
        <list style="hanging">
          <t hangText="include_granted_scopes">OPTIONAL. Either "true" or "false". When "true", the authorization server
          SHOULD include previously granted scopes for this client in the new authorization grant.</t>
        </list>
      </t>

    </section>
    
    <section title="Incremental Auth for Public Clients" anchor="over3view">
      <t>
        Unlike with confidential clients, it is NOT RECOMMEND to 
        automatically approve OAuth requests for public clients without user consent
        (see Section 10.2 of <xref target="RFC6749">OAuth 2.0</xref>), thus 
        authorization grants shouldn't contain previously authorized scopes in the
        manner described above for confidential clients.
      </t>
      <t>
        Public clients (and confidential clients using this technique) should instead
        track the scopes for every authorization grant, and only request yet to be granted
        scopes during incremental authorization. In the past, this would
        result in multiple discrete authorization grants that would need to be tracked.
        To enable incrementing a single authorization grant for public clients,
        the client supplies their existing refresh token during the authorization
        code exchange, and receives new authorization tokens with the scope of
        the previous and current authorization grants.
      </t>
      <t>
        The client sends the previous refresh token in the OAuth 2.0 Access Token Request (Section 4.1.3 of <xref target="RFC6749"/>.) using the following additional parameter:
      </t>
      <t>
        <list style="hanging">
          <t hangText="existing_grant">OPTIONAL. The refresh token from the existing authorization grant.</t>
        </list>
      </t>
      <t>
        When processing the token exchange, in addition to the normal processing of such a request,
        the token endpoint MUST verify that token provided in 
        the "existing_grant" parameter is unexpired and unrevoked,
        and was issued to the same client id and relates to the same user as the current authorization grant. If this verification
        succeeds, the new refresh token issued in the Access Token Response (Section 4.1.4 of ) SHOULD include
        authorization for the scopes in the previous grant.
      </t>
      
    </section>

    <section anchor="IANA" title="IANA Considerations">
      <t>This specification makes a registration request as follows:</t>

      <section title="OAuth Parameters Registry" anchor="reg">
        <t>This specification registers the following parameters in the IANA
        OAuth Parameters registry defined in <xref target="RFC6749">OAuth
        2.0</xref>.</t>

        <t>
          <list style="symbols">
            <t>Parameter name: include_granted_scopes</t>

            <t>Parameter usage location: authorization request</t>

            <t>Change controller: IESG</t>

            <t>Specification document(s): this document</t>
          </list>
        </t>
        <t>
          <list style="symbols">
            <t>Parameter name: existing_grant</t>

            <t>Parameter usage location: token request</t>

            <t>Change controller: IESG</t>

            <t>Specification document(s): this document</t>
          </list>
        </t>
      </section>
    </section>
  </middle>

  <back>

    <references title="Normative References">
      <?rfc include='reference.RFC.2119'?>
      <?rfc include='reference.RFC.6749'?>
    </references>

<!--
    <references title="Informative References">
    </references>
-->

    <section title="Acknowledgements" anchor="Acknowledgements">
      <t>
        The following individuals contributed ideas, feedback, and wording
        that shaped and formed the final specification:
      </t>
      <t>
        Yanna Wu, Marius Scurtescu, Jason Huang, Nicholas Watson, and Breno de Medeiros.
      </t>
    </section>

    <section anchor="History" title="Document History">
      <t>[[ to be removed by the RFC Editor before publication as an RFC ]]</t>
      <t>
	-00
        <list style="symbols">
	  <t>
	    Initial draft based on the implementation of incremental and "appcremental" auth at Google.
	  </t>
	</list>
      </t>

    </section>

  </back>
</rfc>
