<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.34 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-parecki-oauth-jwt-grant-interaction-response-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.32.0 -->
  <front>
    <title abbrev="JAG-IR">JWT Authorization Grant Interaction Response</title>
    <seriesInfo name="Internet-Draft" value="draft-parecki-oauth-jwt-grant-interaction-response-00"/>
    <author fullname="Aaron Parecki">
      <organization>Okta</organization>
      <address>
        <email>aaron@parecki.com</email>
      </address>
    </author>
    <author fullname="Brian Campbell">
      <organization>Ping Identity</organization>
      <address>
        <email>bcampbell@pingidentity.com</email>
      </address>
    </author>
    <author fullname="Dapeng Liu">
      <organization>Alibaba Group</organization>
      <address>
        <email>max.ldp@alibaba-inc.com</email>
      </address>
    </author>
    <date year="2026" month="March" day="25"/>
    <area>Security</area>
    <workgroup>Web Authorization Protocol</workgroup>
    <keyword>jwt authorization grant</keyword>
    <keyword>interaction</keyword>
    <abstract>
      <?line 48?>

<t>This document defines an extension to the JWT Authorization Grant <xref target="RFC7523"/>
that enables an authorization server to indicate that user interaction is
required in order to complete an authorization request.
Instead of returning an access token or an error, the authorization
server returns a URI that the client launches where the user can interact
with the authorization server, along with a polling interval. The client can
then poll for the access token or wait for a redirect before retrying
the original request.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://aaronpk.github.io/draft-parecki-oauth-jwt-grant-interaction-response/draft-parecki-oauth-jwt-grant-interaction-response.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-parecki-oauth-jwt-grant-interaction-response/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Web Authorization Protocol Working Group mailing list (<eref target="mailto:oauth@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/oauth/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/oauth/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/aaronpk/draft-parecki-oauth-jwt-grant-interaction-response"/>.</t>
    </note>
  </front>
  <middle>
    <?line 60?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The JWT Authorization Grant <xref target="RFC7523"/> and Identity Assertion Grant
<xref target="I-D.draft-ietf-oauth-identity-assertion-authz-grant"/>
enable clients to obtain access tokens without direct user
approval at the authorization server. However, certain scenarios
may require explicit user consent, even if the initial authorization
can be obtained without user interaction:</t>
      <ul spacing="normal">
        <li>
          <t>AI Agent Authorization: Autonomous agents acting on behalf of
users need explicit consent for specific operations, not just
identity verification.</t>
        </li>
        <li>
          <t>High-Risk Operations: Financial transactions, data deletion, or
other sensitive operations may require step-up consent.</t>
        </li>
        <li>
          <t>Compliance Requirements: Regulatory frameworks (GDPR, etc.) may
require explicit, verifiable consent for certain activities.</t>
        </li>
        <li>
          <t>Policy-Based Authorization: Fine-grained authorization policies
(e.g., "allow purchases up to $50") require user understanding and approval.</t>
        </li>
      </ul>
      <t>Currently, if user interaction is needed, the authorization server
has no standardized way to communicate this to the client within the
JWT Authorization Grant flow. The client would typically receive an
error response and would need to fall back to a traditional redirect-based
OAuth flow, negating the benefits of using the JWT Authorization Grant.</t>
      <t>This specification defines an interaction response that the
authorization server can return in place of an access token. The
interaction response contains a URI that the client opens (typically
in a browser) so the user can interact with the authorization server.
It also includes a polling interval, similar to the Device
Authorization Grant <xref target="RFC8628"/>, indicating how frequently the client
should re-request the token.</t>
      <t>The client's token request <bcp14>MAY</bcp14> include a <tt>redirect_uri</tt> parameter.
If provided, the authorization server redirects the user's browser
to this URI after the interaction is complete. Unlike the
Authorization Code flow, no authorization code is included in the
redirect. The redirect serves only as a signal to the client that the
user interaction has completed. The client then retries its original
JWT Authorization Grant request to obtain the access token.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="token-request">
      <name>Token Request</name>
      <t>The client makes a token request to the authorization server's token
endpoint as defined in <xref target="RFC7523"/>, with the addition of an <bcp14>OPTIONAL</bcp14>
        <tt>redirect_uri</tt> parameter.</t>
      <dl>
        <dt><tt>redirect_uri</tt></dt>
        <dd>
          <t><bcp14>OPTIONAL</bcp14>. The URI to which the authorization server will redirect
the user's browser after the interaction is complete. The redirect
URI <bcp14>MUST</bcp14> be previously registered with the authorization server or
otherwise validated per authorization server policy.</t>
        </dd>
      </dl>
      <t>An example request:</t>
      <sourcecode type="http"><![CDATA[
POST /token HTTP/1.1
Host: auth.example.com
Content-Type: application/x-www-form-urlencoded

grant_type=urn:ietf:params:oauth:grant-type:jwt-bearer
&assertion=eyJhbGciOi...
&redirect_uri=https://client.example.org/callback
]]></sourcecode>
    </section>
    <section anchor="token-endpoint-responses">
      <name>Token Endpoint Responses</name>
      <t>In addition to the error codes defined in <xref section="3.2.4" sectionFormat="of" target="OAUTH-2.1"/>,
the following error codes are specified for use with the JWT
Authorization Grant Interaction Response in token endpoint responses.</t>
      <section anchor="interaction-response">
        <name>Interaction Required Response</name>
        <t>When the authorization server receives a valid JWT Authorization
Grant request but determines that user interaction is required before
an access token can be issued, it responds with an OAuth error
response as defined in <xref section="3.2.4" sectionFormat="of" target="OAUTH-2.1"/> as defined below:</t>
        <dl>
          <dt><tt>error</tt></dt>
          <dd>
            <t><bcp14>REQUIRED</bcp14>. <tt>interaction_required</tt>. Indicates that user interaction
is required, and the following additional parameters are defined
in the response.</t>
          </dd>
          <dt><tt>interaction_uri</tt></dt>
          <dd>
            <t><bcp14>REQUIRED</bcp14>. The URI that the client <bcp14>MUST</bcp14> launch (typically in the
user's browser) to allow the user to interact with the authorization
server. The URI <bcp14>MUST</bcp14> use the "https" scheme.</t>
          </dd>
          <dt><tt>interval</tt></dt>
          <dd>
            <t><bcp14>OPTIONAL</bcp14>. The minimum number of seconds that the client <bcp14>SHOULD</bcp14>
wait between polling requests to the token endpoint. If no value is
provided, the default is 5 seconds.</t>
          </dd>
          <dt><tt>expires_in</tt></dt>
          <dd>
            <t><bcp14>OPTIONAL</bcp14>. The number of seconds after which the interaction URI
and the associated authorization session will expire.</t>
          </dd>
        </dl>
        <t>The response <bcp14>MUST</bcp14> include a <tt>Content-Type</tt> header field set to
<tt>application/json</tt>.</t>
        <sourcecode type="http"><![CDATA[
HTTP/1.1 400 Bad Request
Content-Type: application/json

{
  "error": "interaction_required",
  "interaction_uri": "https://auth.example.com/interact/abc123",
  "interval": 5,
  "expires_in": 600
}
]]></sourcecode>
      </section>
      <section anchor="interaction-pending-response">
        <name>Interaction Pending Response</name>
        <t>When user interaction is pending, and the client makes a subsequent
token endpoint request, the authorization server responds with an
OAuth error response as defined in <xref section="3.2.4" sectionFormat="of" target="OAUTH-2.1"/>
with one of the values defined below:</t>
        <dl>
          <dt><tt>interaction_pending</tt></dt>
          <dd>
            <t>The authorization request is still pending as the end user hasn't
yet completed the user-interaction steps.  The
client <bcp14>SHOULD</bcp14> repeat the access token request to the token endpoint.
Before each new request,
the client <bcp14>MUST</bcp14> wait at least the number of seconds specified by
the <tt>interval</tt> parameter defined in <xref target="interaction-response"/>, or 5 seconds if none was provided,
and respect any increase in the polling interval required by the "slow_down" error.</t>
          </dd>
          <dt><tt>slow_down</tt></dt>
          <dd>
            <t>A variant of <tt>authorization_pending</tt>, the authorization request is
still pending and polling should continue, but the interval <bcp14>MUST</bcp14>
be increased by 5 seconds for this and all subsequent requests.</t>
          </dd>
          <dt><tt>access_denied</tt></dt>
          <dd>
            <t>The authorization request was denied.</t>
          </dd>
        </dl>
      </section>
      <section anchor="handling-the-interaction-response">
        <name>Handling the Interaction Response</name>
        <t>Upon receiving an interaction response as defined in
<xref target="token-endpoint-responses"/>, the client <bcp14>MUST</bcp14>:</t>
        <ol spacing="normal" type="1"><li>
            <t>Launch or redirect a browser to the <tt>interaction_uri</tt>.</t>
          </li>
          <li>
            <t>Wait for the interaction to complete using one or both of the
following mechanisms:  </t>
            <ul spacing="normal">
              <li>
                <t><strong>Polling:</strong> The client re-sends its original token request
(including the same JWT assertion and parameters) to the token
endpoint, waiting at least <tt>interval</tt> seconds between each
request. The authorization server will continue to return the
interaction response until the user interaction is complete,
at which point it will return an access token response or an
error response as defined in <xref section="3.2" sectionFormat="of" target="OAUTH-2.1"/>.</t>
              </li>
              <li>
                <t><strong>Redirect notification:</strong> If the client included a
<tt>redirect_uri</tt> in its original request, it <bcp14>MAY</bcp14> wait for the
authorization server to redirect the user's browser to that URI.
Upon receiving the redirect, the client <bcp14>SHOULD</bcp14> immediately retry
its original token request. No authorization code or other
parameters are included in the redirect; the redirect serves
solely as a signal that the interaction is complete.</t>
              </li>
            </ul>
          </li>
        </ol>
      </section>
    </section>
    <section anchor="as-behavior">
      <name>Authorization Server Behavior</name>
      <t>When the authorization server receives a JWT Authorization Grant
request and determines that user interaction is required, it <bcp14>MUST</bcp14>:</t>
      <ol spacing="normal" type="1"><li>
          <t>Generate a unique <tt>interaction_uri</tt> for the user interaction session.</t>
        </li>
        <li>
          <t>Associate the interaction session with the original token request
parameters (including the JWT assertion claims, requested scope,
any <tt>redirect_uri</tt> provided by the client, and parameters from any extensions).</t>
        </li>
        <li>
          <t>Return the interaction response as defined in <xref target="interaction-response"/>.</t>
        </li>
      </ol>
      <t>While the user interaction is pending, subsequent token requests from
the client with the same JWT assertion <bcp14>SHOULD</bcp14> return the interaction
response or an <tt>interaction_pending</tt> error.</t>
      <t>After the user has completed the required interaction, the
authorization server <bcp14>MUST</bcp14>:</t>
      <ol spacing="normal" type="1"><li>
          <t>If a <tt>redirect_uri</tt> was provided, redirect the user's browser to
that URI. The redirect <bcp14>MUST NOT</bcp14> include an authorization code or
access token.</t>
        </li>
        <li>
          <t>On the next token request from the client with the same JWT
assertion, return an access token response as defined in
<xref section="3.2.3" sectionFormat="of" target="OAUTH-2.1"/> or an error response as defined in
<xref section="3.2.4" sectionFormat="of" target="OAUTH-2.1"/>.</t>
        </li>
      </ol>
    </section>
    <section anchor="complete-flow-diagram">
      <name>Complete Flow Diagram</name>
      <t>The diagram below is a non-normative example of using this specification
in conjunction with the [<xref target="I-D.draft-ietf-oauth-identity-assertion-authz-grant"/>].</t>
      <artwork><![CDATA[
 +--------+     +--------+     +--------+     +----------+
 |  User  |     | Client |     |  IdP   |     |   AS     |
 |        |     | (Agent)|     |        |     |          |
 +--------+     +--------+     +--------+     +----------+
     |               |               |               |
 (1) | Authenticate  |               |               |
     |-------------->|               |               |
     |               |               |               |
 (2) |               | Token Exchange|               |
     |               | (get ID-JAG)  |               |
     |               |-------------->|               |
     |               |               |               |
 (3) |               | ID-JAG        |               |
     |               |<--------------|               |
     |               |               |               |
 (4) |               | JWT Grant     |               |
     |               | Request       |               |
     |               |------------------------------>|
     |               |               |               |
 (5) |               |               |    Validate   |
     |               |               |    & Decide:  |
     |               |               |    Interaction|
     |               |               |    Required   |
     |               |               |               |
 (6) |               | interaction_required          |
     |               | + interaction_uri             |
     |               |<------------------------------|
     |               |               |               |
 (7) |<--------------| Redirect to   |               |
     |               | interaction   |               |
     |               | page          |               |
     |               |               |               |
 (8) | Review &      |               |               |
     | Approve       |               |               |
     |---------------------------------------------->|
     |               |               |               |
 (9) |               |<------------------------------|
     |               |   Redirect    |               |
     |               | (via browser) |               |
     |               |               |               |
(10) |               | Retry JWT     |               |
     |               | Grant Request |               |
     |               |------------------------------>|
     |               |               |               |
(11) |               | Access Token  |               |
     |               |<------------------------------|
]]></artwork>
      <ol spacing="normal" type="1"><li>
          <t>User authenticates to the Client through the IdP, typically via OpenID Connect</t>
        </li>
        <li>
          <t>The Client exchanges the previously-obtained ID Token for an ID-JAG</t>
        </li>
        <li>
          <t>The IdP validates the request against the configured policy and returns an ID-JAG</t>
        </li>
        <li>
          <t>The Client presents the ID-JAG to the AS in a JWT Authorization Request</t>
        </li>
        <li>
          <t>The AS validates the ID-JAG, and determines that further interaction is required</t>
        </li>
        <li>
          <t>The AS returns the <tt>interaction_required</tt> response</t>
        </li>
        <li>
          <t>The client redirects the browser to the specified page</t>
        </li>
        <li>
          <t>The user visits the URL and confirms the request</t>
        </li>
        <li>
          <t>The AS redirects to the Client's <tt>redirect_uri</tt></t>
        </li>
        <li>
          <t>The Client retries the JWT Authorization Request</t>
        </li>
        <li>
          <t>The AS validates the request, sees the user has confirmed, and issues an access token</t>
        </li>
      </ol>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="interaction-uri-security">
        <name>Interaction URI Security</name>
        <t>The <tt>interaction_uri</tt> <bcp14>MUST</bcp14> be an "https" URI. The URI <bcp14>SHOULD</bcp14> contain
sufficient entropy to prevent guessing or brute-force attacks. The
authorization server <bcp14>SHOULD</bcp14> bind the interaction session to the
client identity from the original token request.</t>
      </section>
      <section anchor="redirect-uri-validation">
        <name>Redirect URI Validation</name>
        <t>If the client provides a <tt>redirect_uri</tt>, the authorization server
<bcp14>MUST</bcp14> validate it against the client's registered redirect URIs,
consistent with <xref section="2.3.1" sectionFormat="of" target="OAUTH-2.1"/>.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>TBD</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="OAUTH-2.1">
          <front>
            <title>The OAuth 2.1 Authorization Framework</title>
            <author fullname="Dick Hardt" initials="D." surname="Hardt">
              <organization>Hellō</organization>
            </author>
            <author fullname="Aaron Parecki" initials="A." surname="Parecki">
              <organization>Okta</organization>
            </author>
            <author fullname="Torsten Lodderstedt" initials="T." surname="Lodderstedt">
              <organization>SPRIND</organization>
            </author>
            <date day="2" month="March" year="2026"/>
            <abstract>
              <t>   The OAuth 2.1 authorization framework enables an application to
   obtain limited access to a protected resource, either on behalf of a
   resource owner by orchestrating an approval interaction between the
   resource owner and an authorization service, or by allowing the
   application to obtain access on its own behalf.  This specification
   replaces and obsoletes the OAuth 2.0 Authorization Framework
   described in RFC 6749 and the Bearer Token Usage in RFC 6750.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-v2-1-15"/>
        </reference>
        <reference anchor="RFC7523">
          <front>
            <title>JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication and Authorization Grants</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="B. Campbell" initials="B." surname="Campbell"/>
            <author fullname="C. Mortimore" initials="C." surname="Mortimore"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This specification defines the use of a JSON Web Token (JWT) Bearer Token as a means for requesting an OAuth 2.0 access token as well as for client authentication.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7523"/>
          <seriesInfo name="DOI" value="10.17487/RFC7523"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8628">
          <front>
            <title>OAuth 2.0 Device Authorization Grant</title>
            <author fullname="W. Denniss" initials="W." surname="Denniss"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="August" year="2019"/>
            <abstract>
              <t>The OAuth 2.0 device authorization grant is designed for Internet- connected devices that either lack a browser to perform a user-agent- based authorization or are input constrained to the extent that requiring the user to input text in order to authenticate during the authorization flow is impractical. It enables OAuth clients on such devices (like smart TVs, media consoles, digital picture frames, and printers) to obtain user authorization to access protected resources by using a user agent on a separate device.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8628"/>
          <seriesInfo name="DOI" value="10.17487/RFC8628"/>
        </reference>
        <reference anchor="I-D.draft-ietf-oauth-identity-assertion-authz-grant">
          <front>
            <title>Identity Assertion JWT Authorization Grant</title>
            <author fullname="Aaron Parecki" initials="A." surname="Parecki">
              <organization>Okta</organization>
            </author>
            <author fullname="Karl McGuinness" initials="K." surname="McGuinness">
              <organization>Independent</organization>
            </author>
            <author fullname="Brian Campbell" initials="B." surname="Campbell">
              <organization>Ping Identity</organization>
            </author>
            <date day="2" month="March" year="2026"/>
            <abstract>
              <t>   This specification provides a mechanism for an application to use an
   identity assertion to obtain an access token for a third-party API by
   coordinating through a common enterprise identity provider using
   Token Exchange [RFC8693] and JWT Profile for OAuth 2.0 Authorization
   Grants [RFC7523].

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-identity-assertion-authz-grant-02"/>
        </reference>
      </references>
    </references>
    <?line 374?>

<section anchor="appendix">
      <name>Appendix</name>
      <section anchor="use-cases">
        <name>Use Cases</name>
        <section anchor="ai-agent-with-browser-access">
          <name>AI Agent with Browser Access</name>
          <t>An AI agent needs to perform operations on behalf of a user at a
third-party service. The agent can redirect the user's browser to
a consent page, then receive a callback when consent is complete.</t>
          <t>This differs from the Device Authorization Grant (RFC 8628) in
that no polling is required - the redirect/callback model provides
lower latency.</t>
        </section>
        <section anchor="high-risk-transaction-approval">
          <name>High-Risk Transaction Approval</name>
          <t>A client presents a valid JWT assertion but requests authorization
for a high-value financial transaction. The AS determines that
step-up consent is required before issuing the token.</t>
        </section>
        <section anchor="regulatory-compliance">
          <name>Regulatory Compliance</name>
          <t>A client requests access to sensitive data. Regulatory requirements
mandate that explicit, auditable consent must be obtained and
recorded before access is granted.</t>
        </section>
      </section>
      <section anchor="example-sequence">
        <name>Example Sequence</name>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
