Token exchange
AM supports RFC 8693, OAuth 2.0 Token Exchange for OAuth 2.0 and OpenID Connect tokens:
From/to | Access token | ID token | Refresh tokens1 | SAML assertion |
---|---|---|---|---|
Access token |
|
|
|
|
ID token |
|
|
|
|
1 You cannot exchange a token directly for a refresh token. When AM issues refresh tokens (default), it also issues them on token exchange.
Clients can exchange tokens only at the OAuth 2.0 provider that issued them. This restriction applies to AM domains and to realms.
For example, a token issued by |
Differences with normal token issuance:
-
AM copies claims and values that must not change, such as subject and issuer claims, from the subject token to the new token.
AM ignores irrelevant claims, such as those missing from the resulting token type, and claims that cannot be inferred from the subject token, such as those present in the resulting token, but not in the subject token.
-
AM does not copy scopes, but derives them from the scope implementation.
For details, refer to OAuth 2.0 scopes.
-
AM adds the
act
andmay_act
claims when relevant. -
Token exchange involves no user interaction.
There is no way to request consent for expanded scopes or claims. The client application must ensure user consent beforehand or must ensure an expanded scope or claim is unrelated to the user’s resources.
Use cases
OAuth2.0 clients exchange tokens for impersonation or delegation.
Impersonation
To impersonate means to pretend you are someone else when performing a job or duty.
Use impersonation for token exchange when it is not necessary to maintain separation between the user and the client.
The client obtains a subject token with the user’s authorization. It exchanges this token for a new token it can use directly to access a protected resource. Due to the risk of identity theft, allow token impersonation across trusted systems only.
To try token exchange with impersonation, refer to Demonstrate impersonation. |
Example with an access token
A user chooses to transfer money using their bank application, an OAuth 2.0 client.
The user authenticates to the application and trusts the application to act on their behalf
when accessing the internal banking system to perform transactions.
When the user authenticates, the application gets a subject token
with change_data
, create_accounts
, read_accounts
, and transfer
scopes.
The scopes represent all banking services available through the application.
The user chooses to transfer money, which requires only the transfer
scope.
To reduce the security risk, the application exchanges the broad-scope access token
for a restricted access token with only the transfer
scope, which it uses to access the transfer service:
Example with an ID token
The client could request an ID token instead of an access token.
When the user authenticates, the application gets an ID token as the subject token.
The ID token attests to the user’s identity and authorization, but does not include scopes to access banking services.
The user chooses to transfer money, and the application exchanges the ID token
for an expanded access token with the transfer
scope, which it uses to access the transfer service:
Delegation
To delegate means to give a job or duty to someone else who performs the job on your behalf.
Use delegation for token exchange when maintaining separation between the user and the client is important. This approach is more secure when the token must traverse third-party systems.
To try token exchange with delegation, refer to Demonstrate delegation. |
In delegation, the client has two tokens:
-
A subject token obtained with the user’s authorization.
-
An actor token obtained for itself or a user it represents.
The client exchanges both tokens for a new token it can use to access the protected resource.
The new token has an act
(actor) claim.
The act
claim, visible on introspection,
signals to the resource server that the client using the token is not the user.
A resource server can adapt its behavior as necessary.
The following example shows the act
claim field of an access token:
"act": {
"sub": "(act!delegateClient)"
}
The sub
field specifies the subject of the actor token.
Example with an actor access token
A user phones a call center about a problem with their water supply. The operator who responds verifies the user’s identity and creates an ID token as the subject token. The operator also creates an access token as the actor token for themselves.
The operator exchanges both tokens for an access token with the repair
scope restricted to booking a repair.
The operator would need a different token to end the user’s contract, for example.
When they book a repair for the user, both the operator and the user are reflected in the repair request:
Terminology
- Act claim
-
Token claim identifying a delegate acting on behalf of another identity.
AM automatically adds this claim as needed when issuing a token.
- Actor token
-
The access or ID token representing a delegate acting on behalf of another identity.
- Exchanged token
-
The new access or ID token resulting from token exchange.
Exchanged tokens do not expire at the same time as their subject tokens. They expire after the amount of time specified in the Access Token Lifetime (seconds) or the OpenID Connect JWT Token Lifetime (seconds) settings of the OAuth 2.0 provider service or client configuration.
- Expanded token
-
An access token with scopes or claims not present in the subject token.
An exchanged token can have different scopes and claims from the subject token. Expanded tokens work well when exchanging ID tokens for access tokens, for example, where scopes and claims differ.
- May act claim
-
Token claim specifying who is allowed to act for the identity on behalf of whom the request is made.
Only the identity specified in the
may_act
claim can exchange tokens for another token.You must write a script to add this claim as needed when issuing a token. For details, refer to Authorize exchange.
- Restricted token
-
An access token with narrower scopes or claims than those of the subject token.
Instead of gathering consent for different sets of scopes and claims, clients gather consent for a broad range initially and then restrict scope during token exchange.
- Subject token
-
The access or ID token representing the identity on behalf of whom the request is made.
The client can obtain the subject token with any supported OAuth 2.0 or OpenID Connect flow.
Configuration
Token exchange configuration requires:
-
A script to authorize exchange.
-
Settings in the OAuth 2.0 provider or the OAuth 2.0 client application configuration.
Authorize exchange
A claim on the original token authorizes specified clients and actors to perform the exchange.
You write a script AM runs when issuing tokens to set the claim.
The may_act
claim
The may_act
claim on a token identifies the authorized actor who can exchange the token.
AM sets this claim when issuing the original token.
-
For impersonation, the
may_act
claim must specify the client ID of the authorized actor. -
For delegation, the
may_act
claim must specify the client ID and thesub
(subject) of the actor token.
AM rejects token exchange requests from clients or actors who are not authorized by the may_act
claim.
The following example claim allows:
-
An
impersonationClient
to exchange the token and impersonate the user. -
A
delegateClient
to exchange the token to act on the user’s behalf using the original token and an actor token issued directly to the client with the client credentials grant.
"may_act": {
// String or array of client IDs who can exchange the token:
"client_id": ["impersonationClient", "delegateClient"],
// String or array identifying the actor token subject(s) for delegation:
"sub": "(age!delegateClient)"
}
The subject ("sub"
) claim has the format (type!subject)
, where:
-
subject
is the ID for the identity, such as a username or a client ID. -
type
can be one of the following:-
age
. Specifies that the subject is an OAuth 2.0/OpenID Connect-related user-agent or client. For example, an OAuth 2.0 client, a Remote Consent Service agent, and a Web and Java Agent internal client. -
usr
. Specifies that the subject is a user/identity.
-
The subject claim (age!delegateClient)
specifies the delegateClient
OAuth 2.0 client application.
An example user subject claim is (usr!bjensen)
.
May act scripts
AM has no default functionality to authorize token exchange for specific clients.
Instead, AM uses a script you write to set the may_act
claim.
The script runs when issuing a token.
It is an OAuth2 May Act
type script.
The following example JavaScript produces the previous example claim without the comments:
(function () {
var frJava = JavaImporter(
org.forgerock.json.JsonValue
);
var mayAct = frJava.JsonValue.json(frJava.JsonValue.object())
mayAct.put('client_id', ['impersonationClient', 'delegateClient'])
mayAct.put('sub', '(age!delegateClient)')
token.setMayAct(mayAct)
}());
For a commented example, refer to the sample may act script.
AM does not support wildcards in the client_id
and sub
fields.
Your scripts must enumerate clients and actors.
The script does not specify the token type. The client requesting an exchange token optionally specifies the token type.
May act script variables
AM binds the following variables into OAuth2 May Act
scripts:
clientProperties
-
A map of properties configured in the relevant client profile. Only present if AM correctly identified the client.
The keys in the map are as follows:
clientId
-
The URI of the client.
allowedGrantTypes
-
The list of the allowed grant types for the client. For details, refer to the Javadoc for GrantType.
allowedResponseTypes
-
The list of the allowed response types for the client.
allowedScopes
-
The list of the allowed scopes for the client.
customProperties
-
A map of any custom properties added to the client.
These properties can include lists or maps as sub-maps. For example, the script includes
customMap[Key1]=Value1
ascustomMap
>Key1
>Value1
in the object.To add custom properties to a client, use the AM admin UI. Go to OAuth 2.0 > Clients > Client ID > Advanced, and update the Custom Properties field.
identity
-
Contains a representation of the identity of the resource owner.
logger
-
Write a message to the AM debug log.
AM logs token exchange operations under the
AM-TOKEN-EXCHANGE
audit event. You can track new tokens using the value of theirauditTrackingId
claim. requestProperties
-
A map of the properties present in the request. Always present.
The keys in the map are as follows:
requestUri
-
The URI of the request.
realm
-
The realm to which the request was made.
requestParams
-
The request parameters and posted data. Each value in this map is a list of one or more properties.
To mitigate the risk of reflection-type attacks, use OWASP best practices when handling these properties.
Refer to Unsafe use of Reflection.
requestHeaders
-
The value of the named request header. Returns a map of
<String, List<String>>
as a native JavaScript object, for example:var ipAddress = requestProperties.requestHeaders["X-Forwarded-For"][0]
Header names are case-sensitive.
scopes
-
Contains a set of the requested scopes. For example:
[ "read", "transfer", "download" ]
scriptName
-
The display name of the script. Always present.
session
-
Contains a representation of the user’s session object if the request contained a session cookie.
token
-
Contains a representation of the token to be updated. The token is a mutable object; changes update the resulting token.
Use the
token.setMayAct(JsonValue value)
method to add amay_act
claim to a token.
OAuth 2.0 provider settings
The OAuth 2.0 provider settings govern token exchange behavior for all clients in the realm. To access the settings in the AM admin UI, go to Realms > Realm Name > Services > OAuth2 Provider.
The relevant settings are:
- Core tab
-
-
OAuth2 Access Token May Act Script: Use the selected script to set the
may_act
claim on all access tokens. -
OIDC ID Token May Act Script: Use the selected script to set the
may_act
claim on all ID tokens.
Choose
--- Select a script ---
to prevent AM from setting the claim. -
- Advanced tab
-
-
Grant Types: Add the
Token Exchange
type to permit token exchange requests. -
Token Exchanger Plugins: Remove any token exchange combinations you do not want to allow.
-
Token Validator Plugins: If necessary, remove validations that tokens meet the criteria for exchange.
-
Client settings
Individual OAuth 2.0 client settings govern authentication levels granted to exchanged tokens and can override OAuth 2.0 provider settings. To access the settings in the AM admin UI, go to Realms > Realm Name > Applications > OAuth 2.0 > Clients > Client ID.
The relevant settings are:
- Advanced tab
-
-
Token Exchange Auth Level: The authentication level granted to exchanged tokens when the subject token had no
auth_level
claim. This setting always applies to exchanged ID tokens. -
Grant Types: Add the
Token Exchange
type to permit token exchange requests.
-
- OAuth2 Provider Overrides tab
-
-
Enable OAuth2 Provider Overrides: Use these settings instead of those on the OAuth2 Provider service.
-
OAuth2 Access Token May Act Script: Use the selected script to set the
may_act
claim on access tokens. -
OIDC ID Token May Act Script: Use the selected script to set the
may_act
claim on ID tokens.
For the may act script settings, choose
--- Select a script ---
to prevent AM from setting the claim. -
Request parameters
Token exchange requests target the /oauth2/access_token endpoint. The requests use the following specific parameters:
Parameter | Description |
---|---|
|
Required. Use |
|
Required. The original token to exchange. Example: |
|
Required. The type of subject token, either access token or ID token. One of:
|
|
Required for delegation. The token representing the delegate. Example: |
|
Required for delegation. The type of actor token, either access token or ID token. One of:
|
|
Optional. The type of requested exchanged token, either access token or ID token. One of:
|
Token exchange and the security token service
Both OAuth 2.0 and the AM security token service (STS) transform tokens.
The implementations and capabilities are different:
-
The STS service lets AM establish cross-domain trust federation relationships. To do this, AM provides a REST STS framework loosely based on the SOAP WS-Trust specification.
You must build, deploy, and maintain the STS service yourself.
The REST STS service supports username/password, SSO tokens, X.509 certificates, and ID tokens as input tokens, and SAML v2.0 assertions and ID tokens as output tokens.
Due to its transformation capabilities, the STS service is more suitable to helping federate legacy platforms.
-
The OAuth 2.0 token exchange specification uses the OAuth 2.0 provider service to transform OAuth 2.0-related tokens.
Use the OAuth 2.0 token exchange in OAuth 2.0/OpenID Connect platforms.