Client-initiated backchannel authentication endpoint
A CIBA-capable client uses this endpoint to initiate a backchannel, out-of-band flow to authenticate the resource owners and obtain their authorizations.
The OpenID Connect Client Initiated Backchannel Authentication Flow defines the client-initiated backchannel authentication (CIBA) endpoint.
This endpoint accepts only the HTTP POST method. |
Endpoint: /as/bc-auth.ciba
The following table describes parameters for this endpoint. The required Content-Type
value is application/x-www-form-urlencoded
.
Parameter | Description | ||
---|---|---|---|
(Required) |
The client identifier.
|
||
(Required) |
The scope of the access request. Expressed as a list of space-separated, case-sensitive strings. Scope values are globally defined on the System → OAuth Settings → Scope Management window. You can constrain scopes on a client-to-client basis. This parameter must include the |
||
|
A bearer token provided by the client that PingFederate must include when sending a ping callback message to the client’s notification endpoint. This usage must conform to the syntax for bearer credentials as defined in section 2.1 of RFC 6750. If the client is configured to use the poll delivery method, this parameter is required. |
||
|
Per the CIBA specification, the client must include one and only one hint for the OpenID Provider to identify the user. The valid hint parameters are
|
||
|
A secret code that is known only to the user and verifiable by PingFederate through the use of a Password Credential Validator instance. The purpose of this code is to authorize the transmission of an authentication request to the user’s authentication device. If the client record is configured to support user code and associated with a user code-enabled CIBA request policy, this parameter is required. |
||
|
An alphanumeric message intended to be made available on both the authentication device and the consumption device. The user can tie them together and decide whether to grant the authorization. When provided, the length of the message must range from 1 - 20 characters. |
||
|
The requested expiration time of the request in seconds since the generation of the authentication request acknowledgment.
|
||
|
A single, self-contained parameter; a signed JWT whose claims represent the request parameters of the authentication request. The OpenID Connect specification calls this JWT a request object. The requirement of this parameter and the processing rules vary depending on whether the client is configured with the Require CIBA Signed Requests option. If the client is configured to transmit request parameters to the backchannel authentication endpoint in signed request objects, this parameter is required. In other words, the Require CIBA Signed Requests check box is selected in the configuration of the client. When PingFederate receives an authentication request with a signed request object, it verifies the digital signature of the signed request object based on the key obtained from the pre-configured JWKS URL (or JWKS) and the selected CIBA request object signing algorithm (or algorithms). If the signature does not pass the verification process, the request fails. If a client is not configured to transmit request parameters to the backchannel authentication endpoint in signed request objects, but it is configured with a JWKS URL or an actual JWKS, this parameter is optional. include::partial$pf_rc_allowsignedrequestobjectflexibility.adoc[tags=pf_ph_desc_allowSignedRequestObjectFlexibility]When PingFederate receives an authentication request with a signed request object, it verifies the digital signature of the signed request object based on the key obtained from the pre-configured JWKS URL (or JWKS) and the selected CIBA request object signing algorithms. If the signature does not pass the verification process, the request fails.
|
- Sample authentication request
POST /as/bc-auth.ciba HTTP/1.1 Content-Type: application/x-www-form-urlencoded Host: www.example.com client_id=myCibaApp&scope=openid&login_hint=joe@example.com
- Sample authentication request acknowledgements
-
-
200 - Success
HTTP/1.1 200 OK ... { "auth_req_id": "HQnCgSeUzWNORZEv8n3E8wIip9L3iwBdJAAect04BqdpEsFBGqfxRvoa_Q", "interval": 3, "expires_in": 120 }
-
400 - Bad Request
HTTP/1.1 400 Bad Request ... { "error_description": "CIBA authentication requests MUST contain the openid scope value.", "error": "invalid_scope" }
HTTP/1.1 400 Bad Request ... { "error_description": "Authentication request parameters (such as binding_message) MUST NOT be present outside of the JWT when a signed authentication request is used.", "error": "invalid_request" }
HTTP/1.1 400 Bad Request ... { "error_description": "Exactly one (not more, not less) of the hint parameters (i.e. 'login_hint_token', 'id_token_hint' or 'login_hint') must be provided.", "error": "invalid_request" }
HTTP/1.1 400 Bad Request ... { "error_description": "User could not be sufficiently identified to initiate out-of-band auth", "error": "unknown_user_id" }
HTTP/1.1 400 Bad Request ... { "error": "invalid_user_code" }
HTTP/1.1 400 Bad Request ... { "error": "missing_user_code" }
HTTP/1.1 400 Bad Request ... { "error_description": "Client is not configured to support user code but a user_code was sent in the request.", "error": "invalid_request" }
HTTP/1.1 400 Bad Request ... { "error_description": "Policy is set to require a token for the user hint but login_hint was sent.", "error": "invalid_request" }
-
401 - Unauthorized
HTTP/1.1 401 Unauthorized ... { "error_description": "Invalid client or client credentials.", "error": "invalid_client" }
-
500 - Server Error
HTTP/1.1 500 Server Error ... { "error_description": "Client is configured to support user code but server policy doesn't have a PCV configured to do the user code checking", "error": "server_error" }
For more information about error responses, see section 13. Authentication Error Response in the specification.
-
OAuth client identification and authentication
The authentication requirement of this endpoint depends on the client authentication method configured for the clients.
Authentication method | Parameters | ||
---|---|---|---|
Client secret |
Clients can present their client identifier and client secret using the HTTP Basic authentication scheme, where the client identifier is the username, and the client secret is the password. Clients can provide credentials using the request parameters
|
||
Client certificate |
Clients must present their client certificate for mutual TLS authentication. The issuer and the subject distinguished name (DN) of the client certificate must match values configured for the clients. |
||
Private key JWT or Client Secret JWT |
Clients must include request parameters
Example ... client_assertion_type= urn%3Aietf%3Aparams%3Aoauth% 3Aclient-assertion-type%3Ajwt-bearer& client_assertion= eyJhbGciOiJSUzI1NiIs...LbSWi1YO-TILOd4L7ZCg& ...
For more information about the private_key_jwt and client_secret_jwt client authentication methods, see Client Authentication and Using Assertions for Client Authentication. |
||
None |
Clients must pass in the |
OAuth access token management parameters
PingFederate supports multiple access token management (ATM) instances. Clients can specify an ATM instance by providing the ATM ID (access_token_manager_id
) or a resource URI (aud
) in their requests to the PingFederate OAuth AS.
Parameter | Description | ||
---|---|---|---|
|
The
|
||
|
The |
A match can be an exact match or a partial match where the provided URI has the same scheme and authority parts and a more specific path contained within the path of the pre-configured resource URI. PingFederate takes an exact match over a partial match. If there are multiple partial matches, PingFederate takes the partial match where the provided URI matches more specifically against the pre-configured resource URI.