Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Security and encryption considerations #12

Closed
remitly-srivatsa opened this issue Jul 11, 2019 · 2 comments
Closed

Security and encryption considerations #12

remitly-srivatsa opened this issue Jul 11, 2019 · 2 comments

Comments

@remitly-srivatsa
Copy link

remitly-srivatsa commented Jul 11, 2019

The human readable requirement in this spec introduces security, privacy (PII etc.) considerations that should be called out.

For example, JWT provides an approach to communicate JSON based payload data usually via HTTP headers. And it also provides additional optional benefits such as signatures and encryption. Also, ID Token is a means of encapsulating user identity in JWT Tokens.

Some information conveyed through contexts may either be sensitive or may be susceptible to tampering. It would be great to either:

  • add signature/encryption as standard offerings when conveying correlation context
  • and/or provide guidance on how to deal with security or encryption (for example, values could be JWT tokens)
  • and/or call it as out of scope for this specification
@yurishkuro
Copy link
Member

yurishkuro commented Jul 11, 2019

+1 to call it as out of scope. Not because this question is not important, but because this whole paradigm of passing application-specific data as baggage in all the requests is a pretty new concept, and I feel it's premature to be locking down how values must be interpreted or represented.

@danielkhan
Copy link
Contributor

We will provide PII/privacy/security wording to the spec but won't enforce a specific mechanism within the header.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants