| Internet-Draft | OAuth 2.0 for RPP | April 2026 |
| Wullink & Kowalik | Expires 1 November 2026 | [Page] |
This document describes how OAuth 2.0 [RFC6749] can be used to secure RESTful Provisioning Protocol (RPP) API requests described in [I-D.wullink-rpp-core].¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 1 November 2026.¶
Copyright (c) 2026 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.¶
A key design goal of RPP's authorization model is fine-grained access control. A registrar MUST be able to operate multiple user accounts within the registry, each carrying a distinct set of permissions appropriate to the user's role (e.g., read-only reporting accounts, accounts limited to a specific set of operations, or fully privileged administrative accounts). This allows registrars to implement the principle of least privilege within their own organizations without requiring separate registry-level registrar accounts. The registry's AS MUST support registrar self-service management of these user accounts, enabling registrars to create, modify, and revoke user credentials and their associated permission scopes without requiring manual intervention by the registry operator.¶
Due to the stateless nature of RPP, the client MUST include authorization credentials in each HTTP request. RPP uses OAuth 2.0 [RFC6749] for delegated authorization via Bearer tokens. Basic authentication [RFC7617] SHOULD NOT be used. The server MUST validate the Bearer token on each request and reject any request with an invalid or expired token with an appropriate HTTP status code.¶
In this document the following terminology is used.¶
RESTful Provisioning Protocol or RPP - The protocol described in this document.¶
URL - A Uniform Resource Locator as defined in [RFC3986].¶
Resource - An object having a type, data, and possible relationship to other resources, identified by a URL.¶
RPP client - An HTTP user agent performing an RPP request¶
RPP server - An HTTP server responsible for processing requests and returning results in any supported media type.¶
JWT - JSON Web Token as defined in [RFC7519].¶
Authorization Server (AS) - A server that issues OAuth 2.0 access tokens to clients after successfully authenticating the resource owner and obtaining authorization, as defined in [RFC6749].¶
Resource Server (RS) - A server hosting protected resources that accepts and validates OAuth 2.0 access tokens to authorize requests, as defined in [RFC6749].¶
Client - An application making protected resource requests on behalf of the resource owner and with its authorization, as defined in [RFC6749].¶
Resource Owner - An entity capable of granting access to a protected resource. When the resource owner is a person, it is referred to as an end-user, as defined in [RFC6749].¶
Access Token - A credential used by a client to access protected resources. In RPP, access tokens MUST be JWTs conforming to [RFC9068].¶
Bearer Token - A type of access token where any party in possession of the token can use it to access the associated resource, as defined in [RFC6750].¶
Client Credentials Grant - An OAuth 2.0 grant type in which the client authenticates directly with the AS using its own credentials to obtain an access token, without end-user involvement, as defined in Section 4.4. Used for machine-to-machine flows.¶
Authorization Code Grant - An OAuth 2.0 grant type in which the client obtains an authorization code from the AS via a user-agent redirect, then exchanges it for an access token, as defined in Section 4.1. Used for interactive flows involving end-users.¶
PKCE (Proof Key for Code Exchange) - An extension to the Authorization Code Grant that prevents authorization code interception attacks, as defined in [RFC7636]. MUST be used with all Authorization Code grant flows in RPP.¶
Scope - A mechanism in OAuth 2.0 to limit the access granted by an access token, as defined in [RFC6749]. RPP uses scopes to enforce fine-grained access control over provisioning operations.¶
OAuth 2.0 AS Metadata - A mechanism for ASs to publish their configuration and capabilities at a well-known URL, as defined in [RFC8414].¶
Rich Authorization Requests (RAR) - An OAuth 2.0 extension that allows clients to request fine-grained authorization data beyond what scopes can express, as defined in [RFC9396].¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT","SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119].¶
In examples, indentation and white space in examples are provided only to illustrate element relationships and are not REQUIRED features of the protocol.¶
All example requests assume a RPP server using HTTP version 2 is listening on the standard HTTPS port on host rpp.example. An authorization token has been provided by an out of band process and MUST be used by the client to authenticate each request.¶
The diagram below gives an overview of all actors and their relationships in the RPP OAuth 2.0 architecture. The Registry operates both the Authorization Server (AS) and the RPP server. The Registrar operates the Registrar Backend, which is an RPP client, and may also operate its own AS. The Registry Employee and Registrar Employee are human operators that interact with the registry and registrar systems via a web browser. The Registry Client App is a client application operated by the registry on behalf of the Registry Employee, while the Registrar Backend is a client application operated by the registrar on behalf of the Registrar Employee and for automated operations. Both client applications interact with the RPP server using OAuth 2.0 Bearer tokens for authorization.¶
+------------------------------------------------------------------+
| Registry |
| |
| +--------------------+ +--------------+ +---------------+ |
| | Authorization | | Registry | | RPP Server | |
| | Server (AS) |<--| Client App |-->| (Res. Server) | |
| | | | | +---------------+ |
| +--------------------+ +--------------+ |
| ^ ^ ^ ^ |
| | | | | |
| | | | | |
| | | | +--------------------+ |
| | | +----| Registry Employee |. |
| | | | (Browser) | |
| | | +--------------------+ |
+--------|---|------------------------------------------------------+
| |
| |----------------+
| |
+------------------+ +------------------+
| Registrar |<--+ Registrar |
| Backend | | Employee |
| (RPP API Client) | | (Browser) |
+------------------+ +------------------+
|
+------> RPP Request to RPP Server
The actors in the diagram are as follows:¶
OAuth scopes are used for enforcing access control when accessing RPP resources. The server MUST define a set of scopes that can be requested by clients when obtaining access tokens. The scopes MUST be based on the principle of least privilege, allowing clients to request only the permissions they need to perform their intended operations. The server MUST also define the mapping between scopes and the specific resources and operations that they grant access to.¶
When a client requests an access token from the AS, it MUST include the desired scopes in the scope parameter of the token request. The AS MUST validate the requested scopes against the client's registered permissions and issue an access token with the appropriate scopes if the request is valid. The server MUST enforce access control based on the scopes included in the access token, allowing or denying access to resources based on the client's authorized scopes. The server MUST also implement appropriate error handling for cases where a client attempts to access a resource without the necessary scopes, returning an appropriate HTTP status code and error message.¶
RPP scopes are based on the objects, processes and operations defined in RESTful Provisioning Protocol (RPP) data objects in [I-D.kowalik-rpp-data-objects]. Each scope corresponds to a specific set of permissions for accessing and manipulating RPP resources.¶
RPP scopes are derived systematically from the data object types and operation categories defined in [I-D.kowalik-rpp-data-objects]. The derivation rules are as follows:¶
<object>:<access-level>, where <object> is the lowercase stable identifier of the data object and <access-level> is one of the access levels defined below based on the object operation.¶
create access level grants permission to perform the Create operation.¶
read access level grants permission to perform the Read operation.¶
update access level grants permission to perform the Update operation.¶
renew access level grants permission to perform the Renew operation.¶
restore access level grants permission to perform the Restore operation.¶
delete access level grants permission to perform the Delete operation.¶
transfer access level grants permission to perform all Transfer operations.¶
list access level grants permission to perform List operations.¶
Extensions and additional data objects registered in the IANA RPP Data Object Registry [I-D.kowalik-rpp-data-objects] SHOULD define their own scopes following the same derivation rules, using the registered stable identifier of the extension object as the <object> component.¶
Table Table 1 defines the RPP scopes derived from the data objects specified in [I-D.kowalik-rpp-data-objects].¶
| Scope | Data Object | Operations Granted |
|---|---|---|
domain:create
|
Domain Name | Create |
domain:read
|
Domain Name | Read |
domain:update
|
Domain Name | Update |
domain:renew
|
Domain Name | Renew |
domain:restore
|
Domain Name | Restore |
domain:delete
|
Domain Name | Delete |
domain:transfer
|
Domain Name | Create, Approve, Reject, Cancel, Query |
domain:list
|
Domain Name | List domain collection |
contact:create
|
Contact | Create |
contact:read
|
Contact | Read |
contact:update
|
Contact | Update, Restore |
contact:delete
|
Contact | Delete |
contact:transfer
|
Contact | Create, Approve, Reject, Cancel, Query |
contact:list
|
Contact | List contact collection |
host:create
|
Host | Create |
host:read
|
Host | Read |
host:update
|
Host | Update, Restore |
host:delete
|
Host | Delete |
host:list
|
Host | List host collection |
TODO: add more scopes such as for listing collections, process statussen, power/admin scope? etc.¶
RPP access tokens MUST conform to the JWT Profile for OAuth 2.0 Access Tokens defined in [RFC9068]. This profile defines a standard set of claims that MUST be present in every access token, such as iss, sub, aud, exp, and scope. RPP also defines additional custom claims that are specific to the RPP use case, such as rpp_registrar_id (see Section 8.2). These claims provide the necessary information for the RPP server to make informed access control decisions based on the identity of the requester, the registrar they represent, and the specific permissions granted by their token.¶
The JWT Profile for OAuth 2.0 Access Tokens defined in [RFC9068] specifies a standard set of claims that MUST be included in every access token issued by the AS.¶
Table Table 3 lists the JWT Profile claims that MUST be present in every RPP access token:¶
| Claim | Type | Description |
|---|---|---|
iss
|
String (URI) | Identifies the issuing AS. The RPP server MUST validate this against its set of trusted issuers. |
sub
|
String | The subject of the token. For machine-to-machine flows this MUST be the client identifier. For interactive flows this MUST be the end-user identifier of the authenticated end-user at the issuing AS. The end-user MAY be a registrar employee operating the registrar's management system, or a registry employee using the registry client application. |
aud
|
String or Array | Identifies the intended audience. MUST include the RPP server's resource identifier. The RPP server MUST reject tokens where its own identifier is not present in this claim. |
exp
|
Numeric date | Expiry time. The RPP server MUST reject tokens that have expired. |
iat
|
Numeric date | Time at which the token was issued. |
jti
|
String | Unique identifier for the token, used to prevent token replay attacks. |
client_id
|
String | The OAuth 2.0 client identifier of the gaining registrar or RPP client application. |
scope
|
String | Space-separated list of granted scopes (see Section 6). The RPP server MUST enforce access control based on the scopes present in this claim. |
TODO: all the RFC9068 claims are listed here again, probably we can just reference the RFC and only list the RPP-specific claims in the next section.¶
In addition to the standard JWT Profile claims defined in [RFC9068], table Table 4 lists the RPP-specific claims that are defined to enable fine-grained authorization decisions. Required claims MUST be present in every RPP access token. Optional claims SHOULD be included when applicable to the deployment or request context.¶
| Claim | Requirement | Type | Description |
|---|---|---|---|
rpp_registrar_id
|
REQUIRED | String | The identifier of the registrar on whose behalf the request is made. The RPP server MUST validate that this identifier matches a known and authorized registrar. This claim MUST be present in all access tokens used for RPP requests. |
rpp_reseller_id
|
OPTIONAL | String | The identifier of the reseller acting through the registrar's client application. This claim SHOULD be included when the request originates from a reseller operating under the registrar's account. The RPP server MAY use this claim for access control, auditing, and attribution purposes. The value is interpreted within the namespace of the registrar identified by rpp_registrar_id. |
The combination of the sub claim and the rpp_registrar_id claim provides a complete, two-dimensional identity for every RPP request: sub identifies the individual principal (registrar employee, automated process, or registrar customer) that initiated the request, while rpp_registrar_id identifies the registrar organization as a whole within the registry's domain.¶
The identity of the sub depends on both the flow type and the identity domain of the principal:¶
sub is the registrar's OAuth 2.0 client identifier, representing an automated system acting on behalf of the registrar. The token is issued by the registry's AS, which maintains the registrar's client credentials.¶
sub is the identifier of the registrar employee. Registrar employees are managed as users in the registry's AS. The token is therefore also issued by the registry's AS, and the sub value is the employee's account identifier within that server. The iss claim will identify the registry's AS.¶
iss claim will identify the registrar's AS as the issuer. The registry MUST have a pre-established trust relationship with the registrar's AS to accept and validate such tokens. In this case, the sub value MUST be the registrant's identifier as it exists in the registry database. The registrar MUST use this registry-assigned id, not any registrar-internal customer identifier, as the sub value. This ensures the registry can unambiguously correlate the token's subject to an existing provisioned contact object. This enables verification of ownership and consent for operations. The registry MUST reject tokens where the sub value does not match a known contact handle associated with the object being acted upon.¶
Together, these claims allow the RPP server to:¶
domain:read scope while a senior employee holds domain:create and domain:update).¶
sub containing the registrant's handle provides the registry with verifiable evidence that the object owner explicitly authorized the transfer.¶
The RPP server SHOULD log both the sub and rpp_registrar_id claims for every request in its audit log. The sub value is only meaningful within the namespace of the issuing AS identified by the iss claim. The RPP server MUST NOT compare sub values across different issuers, except when the sub is a registry contact handle, in which case the registry MAY validate it against its own database regardless of issuer.¶
Extensions and profiles MAY define additional claims. All additional claims MUST use a URI or a collision-resistant name as the claim name to prevent conflicts with registered claims.¶
The RPP server MUST validate all required claims in accordance with [RFC9068] and [RFC8725]. Specifically:¶
iss claim MUST identify a trusted AS whose public keys are known to the RPP server, either through static configuration or dynamic discovery (e.g., OAuth 2.0 AS Metadata [RFC8414]).¶
aud claim MUST be validated to confirm the token is intended for this RPP server.¶
exp claim MUST be checked and expired tokens MUST be rejected with HTTP 401 Unauthorized.¶
scope claim is absent or does not contain the scope required for the requested operation, the RPP server MUST return HTTP 403 Forbidden.¶
The RPP Data Object Catalog described in [I-D.kowalik-rpp-data-objects] is extended to include new objects required for using OAuth 2.0 as a framework for authorization in RPP.¶
Client Object: A registrar MUST register at least one OAuth 2.0 client to interact with the RPP server. The Client Object MUST include the following attributes:¶
For more advanced use cases, enabled by OAuth 2.0, such as an interactive federated object transfer, it is necessary for the RPP server to validate tokens issued by external ASs operated by registrars. This requires the RPP server to establish trust with these external ASs. When JWTs are used for Client Authentication as specified in [RFC7523], the registrar MUST be able to manage their public key(s) in the registry database.¶
The RPP server MUST maintain a trust store of authorized issuers and their associated public keys for validating access tokens. RPP MUST allow for registrars to register and maintain their ASs and public key information.¶
TODO Create additional endpoints for managing trusted issuers and their keys, or specify a manual process for registrars to submit this information to the registry operator.¶
RPP defines two distinct authorization flows: machine-to-machine flows and interactive flows. Machine-to-machine flows are designed for use in automated systems where no user interaction is required. Interactive flows are designed for use in scenarios where end-user interaction is required, such as when a registrant employee needs to interact with the registry system. For these interactive flows, the OAuth 2.0 Authorization Code grant Section 4.1 MUST be used.¶
The machine-to-machine (M2M) flow is used for automated RPP requests such as domain provisioning, renewal, or host management sent by a registrar's backend systems to the registry. No end-user interaction is involved. JWTs for Client Authentication as specified in [RFC7523] or the OAuth 2.0 Client Credentials grant Section 4.4 MUST be used.¶
In this flow the registrar's system authenticates directly with the registry's AS using a signed JWT or a pre-registered client_id and client_secret. The AS issues a short-lived access token scoped to the requested RPP operations. The registrar's system then includes this token in the Authorization header of each RPP request sent to the registry.¶
The sub claim in the resulting token MUST be set to the client_id of the registrar's system. The rpp_registrar_id claim MUST also be present, identifying the registrar organization within the registry's namespace.¶
Registrar Registry Registry
Backend Auth Server RPP Server
| | |
| 1. Token request | |
| (client_id + | |
| client_secret | |
| + scope) | |
+-------------------------->| |
| | |
| 2. Access token (JWT) | |
|<--------------------------| |
| | |
| 3. RPP request | |
| (Authorization: | |
| Bearer <token>) | |
+----------------------------------------------->|
| | |
| | 4. Validate JWT |
| | (verify signature |
| | using cached |
| | public key, |
| | check claims |
| | and scopes) |
| | |
| 5. RPP response | |
|<-----------------------------------------------|
| | |
The steps in the diagram are as follows:¶
domain:create).¶
sub (set to client_id), and rpp_registrar_id.¶
Authorization header as a Bearer token.¶
iss, aud, exp), and confirms that the scope claim includes the scope required for the requested operation.¶
It is RECOMMENDED that access tokens be short-lived (e.g., minutes to hours) and that the registrar's system obtain a new token before the current token expires rather than waiting for a 401 response. Token caching and refresh strategies SHOULD follow the best practices in [RFC8725].¶
Example request using JWT Client Authentication ([RFC7523]), using the domain:create scope. The client authenticates by presenting a signed JWT assertion instead of a client secret:¶
POST /token HTTP/2 Host: authorization-server.rpp.example Content-Type: application/x-www-form-urlencoded grant_type=client_credentials &scope=domain%3Acreate &client_assertion_type=urn%3Aietf%3Aparams%3Aoauth%3Aclient-assertion-type%3Ajwt-bearer &client_assertion=eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9.eyJpc3MiOiJy\ ZWdpc3RyYXItY2xpZW50LWlkIiwic3ViIjoicmVnaXN0cmFyLWNsaWVudC1pZCIsI\ mF1ZCI6Imh0dHBzOi8vYXV0aG9yaXphdGlvbi1zZXJ2ZXIucnBwLmV4YW1wbGUvdG\ 9rZW4iLCJqdGkiOiJ1bmlxdWUtand0LWlkLTEyMyIsImV4cCI6MTc0NjEzNDQwMH0\ .SIGNATURE¶
The client_assertion is a JWT signed with the registrar's private key. Its payload MUST contain:¶
iss: the registrar's client_id¶
sub: the registrar's client_id¶
aud: the registry AS token endpoint URI¶
jti: a unique identifier for this assertion (to prevent replay)¶
exp: expiry time (SHOULD be short-lived, e.g., 60 seconds)¶
Example client_assertion payload:¶
{
"iss": "registrar-client-id",
"sub": "registrar-client-id",
"aud": "https://authorization-server.rpp.example/token",
"jti": "unique-jwt-id-123",
"exp": 1746134400
}
¶
Example request using the OAuth 2.0 Client Credentials grant with a client_secret (fallback when JWT Client Authentication is not supported):¶
POST /token HTTP/2 Host: authorization-server.rpp.example Authorization: Basic cmVnaXN0cmFyLWNsaWVudC1pZDpjbGllbnQtc2VjcmV0 Content-Type: application/x-www-form-urlencoded grant_type=client_credentials&scope=domain%3Acreate¶
Response:¶
HTTP/2 200 OK
Content-Type: application/json;charset=UTF-8
Cache-Control: no-store
Pragma: no-cache
{
"access_token": "eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9...",
"token_type": "Bearer",
"expires_in": 3600,
"scope": "domain:create"
}
¶
The machine-to-machine (M2M) Client Credentials flow is appropriate for routine automated provisioning, but certain high-risk operations, e.g. object transfer or modification of authorisation information, MUST require proof that an authorized human principal explicitly approved the action. Without enforcement, a registrar could use M2M tokens for all operations, eliminating individual accountability. The operations for which interactive authentication is required are a matter of registry policy.¶
The following mechanisms MAY be used by the registry to enforce interactive authentication for designated operations:¶
sub MUST identify a human principal: The registry MAY require that for high-risk operations, the sub claim MUST contain the identifier of an authenticated human principal and MUST NOT equal the client_id. In M2M tokens issued via the Client Credentials grant, sub is always set to client_id, representing an automated system rather than a human. By mandating sub != client_id for designated operations, the registry ensures those operations can only be performed with a token issued on behalf of a real, identified individual. The RPP server MUST reject requests for these operations when sub equals client_id.¶
Scope restriction by grant type: The registry's AS SHOULD be configured to refuse issuing certain high-risk scopes to the Client Credentials grant type. Only the Authorization Code grant (interactive) MAY be permitted to obtain these scopes. This prevents a registrar from obtaining the necessary scope for a high-risk operation through unattended M2M authentication.¶
The set of operations for which interactive authentication is required is a matter of registry policy and MUST be discoverable using the RPP discovery mechanism.¶
The interactive flow is used for RPP requests that require end-user interaction. The OAuth 2.0 Authorization Code grant Section 4.1 MUST be used for this flow. Registrar employees are managed as users in the registry's AS. A registrar employee uses the registrar's client application to perform operations on behalf of the registrar, such as updating domain records or managing contacts. The registry's AS authenticates the employee and issues an access token. The sub claim will contain the employee's account identifier in the registry's AS, and the iss claim will identify the registry's AS.¶
This will enable a registrar to implement fine-grained access control for its employees by assigning different scopes to different employee accounts in the registry's AS. For example, a junior employee may be granted only domain:read scope, while a senior employee may be granted domain:create and domain:update scopes. This is an optional use case, and a registrar may choose to use the M2M flow for all operations if it does not require individual employee accountability or if it deems this to be too complex to manage.¶
In this flow, the employee authenticates with the registry's AS. The registry acts as both the AS and the RPP resource server.¶
Registrar Registrar Registry Registry
Employee Client App Auth Server RPP Server
(Browser) | | |
| 1. Login / | | |
| auth request | | |
+---------------->| | |
| | | |
| | 2. Forward auth | |
| | request | |
| +----------------->| |
| | | |
| | 3. Access token | |
| | (sub=employee_id| |
| | iss=registry) | |
| |<-----------------| |
| | | |
| 4. Access token | | |
|<----------------| | |
| | | |
| 5. RPP request | | |
+---------------->| | |
| | | |
| | 6. RPP request | |
| | (Bearer token) | |
| +-------------------------------------->|
| | | |
| | | 7. Validate JWT |
| | | (local, cached |
| | | registry public |
| | | key) |
| | | |
| | 8. RPP response | |
| |<--------------------------------------|
| | | |
| 9. RPP response | | |
|<----------------| | |
| | | |
The steps in the diagram are as follows:¶
sub (set to the employee's account identifier), and rpp_registrar_id. The iss claim identifies the registry's AS.¶
Authorization header as a Bearer token.¶
iss, aud, exp), and confirms the scope claim includes the scope required for the requested operation.¶
Step 2 — Authorization Request (browser redirect to Registry AS):¶
GET /authorize
?response_type=code
&client_id=registrar-app-client
&redirect_uri=https%3A%2F%2Fclient.registrar.example%2Fcallback
&scope=domain%3Acreate%20domain%3Aupdate
&state=af0ifjsldkj
&code_challenge=E9Melhoa2OwvFrEMTJguCHaoeK1t8URWbuGJSstw-cM
&code_challenge_method=S256
Host: as.registry.example
¶
Step 2 — Authorization Response (redirect back to client):¶
HTTP/1.1 302 Found
Location: https://client.registrar.example/callback
?code=SplxlOBeZQQYbYS6WxSbIA
&state=af0ifjsldkj
¶
Token Request (client exchanges authorization code for access token):¶
POST /token HTTP/1.1 Host: as.registry.example Content-Type: application/x-www-form-urlencoded grant_type=authorization_code &code=SplxlOBeZQQYbYS6WxSbIA &redirect_uri=https%3A%2F%2Fclient.registrar.example%2Fcallback &client_id=registrar-app-client &code_verifier=dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk¶
Token Response:¶
HTTP/1.1 200 OK
Content-Type: application/json
{
"access_token": "eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9...",
"token_type": "Bearer",
"expires_in": 3600,
"scope": "domain:create domain:update"
}
¶
The decoded JWT access token payload will contain claims similar to:¶
{
"iss": "https://as.registry.example",
"sub": "employee-42@registrar.example",
"aud": "https://rpp.registry.example",
"exp": 1746134400,
"iat": 1746130800,
"scope": "domain:create domain:update",
"rpp_registrar_id": "REGISTRAR-001"
}
¶
Step 6 — RPP Request (client sends RPP request with Bearer token):¶
GET /rpp/v1/domains/foo.example HTTP/1.1 Host: rpp.registry.example Authorization: Bearer eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9... Content-Type: application/json¶
RPP Response:¶
HTTP/1.1 200 OK
Content-Type: application/json
{
"name": "foo.example",
...
}
¶
TODO¶
TODO¶