Consumer Data Right FAPI 1.0 Advanced: Transition to Phase 2
This article provides an overview of SecureAuth configurations to comply with the Consumer Data Right (CDR) FAPI 1.0 Advanced phase 2 profile requirements.
CDR FAPI 1.0 Advanced Alignment
The OIDF Financial-grade API (FAPI) security profile specifies security requirements for high risk API resources protected by the OAuth 2.0 Authorization Framework. CDR is adoptiong the FAPI specification to ensure the data holders and data recipients exchange data in the most secure way with appropriate consumer consents. CDR Phase 2 transition ensures mandatory Financial-grade API 1.0 Baseline and Financial-grade API 1.0 Advanced profile compliance with advanced OAuth specifications like OAuth 2.0 Pushed Authorization Requests(PAR) , Proof Key for Code Exchange(PKCE), and more. SecureAuth has out of box compliance and certification in both FAPI 1.0 basic & FAPI 1.0 advanced profiles. With simple configuration updates existing workspaces can be transitioned to support CDR Phase 2 requirements.
At a highlevel, below recommendations for Phase 2 transition by CDR regime and the Phase 2 transition requirements are extracted and interpreted from the documents and discussion notes here.
SecureAuth Configuration Updates
New Workspaces
Please, note that new workspaces created after the proposed obligation date will have all the below settings enabled by default and this document will serve only as a reference guide thereafter.
Adopt FAPI 1.0: Baseline
No configuration update required, SecureAuth workspaces are already configured to be FAPI 1.0: Baseline compatible.
Adopt FAPI 1.0: Advanced
To enforce the FAPI 1.0 advanced profile specifications on an existing CDR workspace, navigate to Auth Settings > OAuth > General and select the CDR Australia Advanced option. Then, save your changes.
Enforce Pushed Authorization Requests (PAR)
To enforce PAR on the server level and/or on the client application level, follow the instructions from the Enforcing PAR section of the OAuth Pushed Authorization Requests (PAR) Authorization Basics article.
With the above settings, PAR can be enforced for a given CDR workspace. Request URI expiry can also be configured within the settings as shown above and the value is set to 60 seconds by default. The configuration indicates that the request_uri
must be used for the authorization code flow within the specified duration; this interval is measured to the point where the authorization server receives the request and does not include the time that it may take to process the request to issue or deny an authorization code.
Once the above configuration is toggled, in the OpenId Connect discovery endpoint for the given CDR workspace, below setting will be toggled to true.
"require_pushed_authorization_requests": true
SecureAuth also complies to below requirements as specified in FAPI PAR profile:
Request Object Expiry requirement specifies the request object must contain the
exp
claim that has a lifetime of no longer than 60 minutes after thenbf
claim.Request Object Expiry requirement specifies the request object must contain the
nbf
claim that is no longer than 60 minutes in the past.Request Object Submission requirement uses the parameters included in the signed request object passed via the
request_uri
parameter
Enforce PKCE
PKCE authorization code flow is supported by default in the SecureAuth platform and can be enforced for all public clients.
Navigate to Auth Settings > General > Allowed Grant types > Authorization Code
Select Enforce PKCE for public clients.
OIDC Hybrid flow
SecureAuth configuration automatically limits the response types for the OIDC Hybrid flows in a CDR workspace and hence no specific configuration change is expected to meet this requirement. In a CDR-specific workspace, the following response_types
are supported and can be found in the OIDC discovery endpoint as well.
"response_types_supported": [ "id_token", "code", "code id_token" ]
Refresh Token Cycling
Authorization servers at the data holders end MAY cycle refresh tokens when an access token is issued. In the refresh token grant type, the authorization server can optionally issue a new refresh token in the response, and if there isn't a new refresh token, the client assumes the current refresh token continues to be valid.
One of the recommendations in Phase 2 is not to allow refresh token cycling at all. This means that the authorization server at the data holder end must not cycle refresh tokens and the existing refresh token should bound to the duration of the sharing arrangement.
Within SecureAuth, an advanced configuration can be enabled to stop refresh token cycling. When this configuration is turned on when an access token is requested in exchange of a refresh token, the existing refresh token is still valid and the existing one is returned and no new refresh token is created.
To disable refresh token cycling, navigate to Auth Settings > Advanced and select Disable refresh token cycling.
JARM Support
By default, the SecureAuth authorization server has the JARM support enabled. When authorization code flow (response_type
with value code
) is used in conjunction with the response_mode value jwt, SecureAuth authorization server creates JWT-secured authorization responses.
The supported response mode can also be found in the OIDC Discovery endpoint as well.
"response_modes_supported": [ "fragment", "form_post", "query.jwt", "fragment.jwt", "form_post.jwt", "jwt" ]
Unique "kid" for JWK Set
FAPI 1.0 advanced recommends that the JWK set does not contain multiple keys with the same kid
. Even though FAPI does not mandate this condition CDS has opted to ensure the kid
for the key sets exposed by authorization server is unique. In SecureAuth, by default, the kid
within a JWK key set auto generated is unique.
In case there is an operational process that creates the kid
within JWKS used by the authorization server like import seed jobs instead of the default generated kid
, it is recommended that such process assigns a unique kid
per key set while initializing the CDR workspace.
ID Token Encryption Changed from MUST to MAY
As per OIDC FAPI guidelines ID token encryption is optional and CDR has also recommended to keep this optional. ID token encryption can be made optional at CDR workspace level and will be enforced at each client level based on following fields set during the client create or update using the DCR Register APIs. As per OIDC DCR specifications, if the below fields are not set, then it is assumed that the ID token doesn't need to be encrypted. Otherwise, it needs to be.
id_token_encrypted_response_alg
- OPTIONAL. JWE alg algorithm JWA REQUIRED for encrypting the ID Token issued to this client. If this is requested, the response is signed, and then encrypted with the result being a Nested JWT. The default, if omitted, is that no encryption is performed.
id_token_encrypted_response_enc
- OPTIONAL. JWE enc algorithm JWA REQUIRED for encrypting the ID token issued to this client. If id_token_encrypted_response_alg
is specified, the default for this value is A128CBC-HS256
. When id_token_encrypted_response_enc
is included, id_token_encrypted_response_alg
MUST also be provided.
Configure ID token encryption in Auth Settings >> Tokens >> Signing and encryption.
Scope Request Support
It is up to discretion of the authorization server whether to return granted scopes in access token. Even though FAPI requires the scope to be returned only in case of public clients conditionally in access token, SecureAuth authorization server continues to return all granted scopes, but reserves the right to stop returning the granted scopes as recommended at any point in time after Phase 2.
Deprecate Non Standard Claims
SecureAuth, by default, returns the Sharing Expires At
and Refresh Token Expiry
claims and by Phase 2 this field will be marked for deprecation and will be removed at any point after that without any notice. The claims_supported
is also published in the OIDC document.
"claims_supported ": [ "sub", "acr", "amr", "refresh_token_expires_at", "sharing_duration", "sharing_expires_at", "cdr_arrangement_id" ]
SecureAuth will continue to support the exp
claim for refresh token expiry in refresh token introspection endpoint as specified in Security Endpoints. The exp
claim is a JSON number representing the number of seconds from 1970-01-01T00:00:00Z to the UTC expiry time.
The workspace level setting for maximum time of refresh token TLL will be ignored for a CDR workspace instead the maximum time will be derived based on the consent duration of the data sharing agreement.
Cipher Support
FAPI 1.0 recommends following cipher suites. For TLS versions below 1.3, only the following 4 cipher suites shall be permitted:
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
When using the TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
or TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
cipher suites, key lengths of at least 2048 bits are required.
In case there are Web application firewalls (Cloudflare, Akamai, or different) or other software components that accepts and terminates TLS traffic on the path to SecureAuth or the data holder resource APIs, it is recommended that those components also be configured with the above cipher list to be compliant with the recommendations for accepting CDR traffic.
Configuration transition Highlights for Phase 2
Feature | SecureAuth Phase2 configuration |
---|---|
FAPI 1.0: Baseline (Final) support | FAPI 1.0: Baseline fully supported |
Scope Request Support | As specified by FAPI 1.0 |
Ignore Claims Outside The Request Object | Ignored |
Authorization Code Reuse | Not Allowed |
FAPI 1.0: Advanced (Final) support | FAPI 1.0: Advanced fully supported |
Cipher Support | As specified by FAPI 1.0 |
JARM Support | Supported |
PAR version | Supports RFC 9126 |
Require Pushed Authorization Requests | Enforced |
Request Object Submission | PAR only |
Request Object Expiry | As specified |
PKCE Support (RFC 7636) | Available |
Request URI Replay | Refused & not allowed |
Request URI Expiry | Default 60 seconds |
Refresh Token Cycling | No Refresh Token Cycling |
Retire Sharing Duration and Refresh Token Expiry claims | Available marked for deprecation |
Unique "kid" for JWK set | Unique |
Access Token Revocation | Supported & enforced |
Authorisation Flow - Hybrid | Supported |
Authorisation Flow - Authorization Code | Supported |