Currently the Internet Computer only supports to transfer all authority by delegation. Internet Identity solves the problem partly by scoping the delegation to a particular host. However, there's no general mechanism on the IC to delegate granular capabilities between all forms of identites on the IC.
In the following, we'll briefly present common specifications for capabiltiy tokens that allow granular delegation of capabilities, and discuss various aspects regarding the usage on the Internet Computer.
In particular, we'll discuss
User Controlled Authorization Networks (UCANs) are an extension of the popular JSON Web Token (JWT) format specifically designed to enable ways of authorizing offline-first apps and distributed systems.
Essentially it includes two new attributes in the JWT payload:
att
: Capabilities delegated to the audience by the issuerprf
: An array of UCAN tokens (or their hashes) from which the capabilites are derived. There needs to be a protocol on how to get the actual tokens based on the hash.Capabilites are defined as objects with the following properties
with
: Specifies the resource, e.g. a service provided by the canistercan
: Specicies the ability. For HTTP, this could be GET
, POST
.. . Not sure how this would be used for a canister.nb
: Optional field that specified additional requierments. See spec for examples.Inversion of control: Unlike many authorization systems where a service controls access to resources in their care, location-independent, offline, and leaderless resources require control to live with the user. Therefore, the same data MAY be used across many applications, data stores, and users.
The best way to look at an example is to go to https://ucan.xyz/validator/
{
"alg": "EdDSA",
"typ": "JWT",
"ucv": "0.8.1"
}
{
"iss": "did:key:z6Mkr5aefin1DzjG7MBJ3nsFCsnvHKEvTb2C4YAJwbxt1jFS",
"aud": "did:key:z6MkfQhLHBSFMuR7bQXTQeqe5kYUW51HpfZeaymgy1zkP2jM",
"nbf": 1529496683,
"exp": 9256939505,
"att": [
{
"with": "wnfs://demouser.fission.name/public/photos/",
"can": "wnfs/OVERWRITE"
},
{
"with": "wnfs://demouser.fission.name/public/notes/",
"can": "wnfs/OVERWRITE"
}
],
"prf": []
}
Field | Type | Description | Required |
---|---|---|---|
iss |
String |
Issuer DID (sender) | Yes |
aud |
String |
Audience DID (receiver) | Yes |
nbf |
Number |
Not Before UTC Unix Timestamp (valid from) | No |
exp |
Number | null |
Expiration UTC Unix Timestamp (valid until) | Yes |
nnc |
String |
Nonce | No |
fct |
Json[] |
Facts (asserted, signed data) | No |
att |
Json[] |
Attenuations | Yes |
prf |
String[] |
Proof of delegation (hash-linked UCANs) | No |
The issuer of a UCAN can issue a revocation token.
iss
and aud
would need to be principals encoded as DIDs.aud
need to generate somehow a new token to send to the resource or are the tokens not cryptographically bound to the invoker?Conceptually very similar to UCANS, but do not allow subdelegation/attenuation. They are represented as IPLD documents and use a bit of a different language.
Generalzing "Sign-in with Ethereum" to provide granular authorization instead of just authentication.
The payload has the following structure:
type Payload struct {
domain String // =domain
iss String // = DID pkh
aud String // =uri
version String
nonce String
iat String // RFC3339 date-time =issued-at
nbf optional String // RFC3339 date-time =not-before
exp optional String // RFC3339 date-time = expiration-time
statement optional String // =statement
requestId optional String // =request-id
resources optional [ String ] // =resources as URIs
}
Not mentioned in the specification
Biscuits have been designed for large scale microservices architectures. They are an append only list of blocks which represent caveats. Currently the blocks need to be signed using Ed25519.
In comparison to UCANs the most notable difference is that the capabilitites are declared in datalog - a declarative programming language. A relying party, would need to implement an authorizer which includes
Biscuit {
symbols: ["authority", "ambient", "resource", "operation", "right", "current_time", "revocation_id", "user_id"]
authority: Block[0] {
symbols: ["user_id"]
context: ""
version: 1
facts: [
user_id("user_1234"),
]
rules: []
checks: []
}
blocks: [
Block[1] {
symbols: ["caveat1", "read"]
context: ""
version: 1
facts: []
rules: []
checks: [
check if resource("bucket_5678", "/folder1/hello.txt"), operation("read")
]
}
]
}
Biscuit generates unique revocation identifiers for each token, and can provide expiration dates as well, but revocation requires external state management (revocation lists, databases, etc) that is outside of this specification.