subject_token
issue (#53)subject_token
issuesubject_token
well defined?subject_token
in the Token Exchange represent the subject that is used to create the resultant Txn-Token. It could be a SAML assertion, an ID Token, or something else. There's nothing to stop someone from creating an internal "token", to put the subject information. We do not need to get into the details of what that format or content needs to beactor_token
that can be used by any service to request a TraT. The trust model in this case is based on using a bearer token for workload identity trustsubject_token
parameter. It'll be easier for an AS to make the distinctionsubject_token
should be N_A
if there is no incoming token, and use the RAR for the authorization details that need to be mintedsubject_token
, and putting the subject information in the request_details
objectrequest_details
, which creates a bunch of new security considerationsaud
in Terminology sectiontxn
should be optional?txn
value is recommended to be a unique ID for this transactiontxn
ties together all the workloads required to process the specific transaction. You can correlate all this through logs or SIEM. It gives observability. You could detect anomalies