
tion of the solution. Section 7 presents the test per-
formed and the results obtained.
2 BACKGROUND
Security mechanisms that define and coordinate iden-
tity and access management are critical to ensure that
only authenticated principals (e.g., users, workloads)
are authorized to access the target resource in the in-
tended manner and with the least privilege. SPIFFE is
a set of open-source specifications for bootstrapping
and issuing short-lived, cryptographically verifiable
identity documents to workloads operating across het-
erogeneous environments and organizational bound-
aries (SPIFFE, 2023). A workload is a running in-
stance of software executing for a specific purpose.
It can own an SVID that uniquely identifies it using
a Uniform Resource Identifier (URI) containing two
parts: a trust domain name and a unique workload
identifier within that domain. Each trust domain con-
tains a root of trust in a construction similar to a PKI,
provisioning workloads with a verifiable identity doc-
ument.
An SVID can be encoded as an X.509 certifi-
cate (Boeyen et al., 2008) or as a JSON Web To-
ken (JWT) (Jones et al., 2015) and is digitally signed
by an authority within the corresponding trust do-
main. Whichever the case, the SVID issuance pro-
cedure typically involves an attestation process, so
only authorized workloads can obtain valid SVIDs
via the specified API calls. Workloads can then
use these identity documents when authenticating to
each other, e.g., by establishing a authenticated mTLS
connection with X.509 SVID or exchanging signed
JWT-SVID within secure communication channels
(SPIFFE, 2023). Even though X.509 SVID is pre-
ferred when mTLS connections can be established,
JWT-SVID are important when identities need to go
through multiple hops (SPIFFE, 2023).
The term identity management explores the no-
tion of identity, and refers to a set of policies, tools,
and mechanisms used to manage the life cycle of dig-
ital identities associated with participants in a sys-
tem, which includes individuals, software or hardware
components. Tokens, on the other hand, are signed
documents carrying assertions used for various se-
curity purposes, including authentication, authoriza-
tion, and access control (Aboba and Wood, 2003).
As defined in (Campbell et al., 2015), an assertion
is a statement or declaration made by an entity (the
claimant), encoded and represented in a specific for-
mat. It could encompass various types of information,
such as facts, or statements made by the issuer, and is
typically related to an identified subject or entity.
3 PROBLEM DEFINITION
The crescent interest in distributed and signed asser-
tions and new token improvements led to the creation
of the “SPIFFE - Assertions and Tokens Workgroup”,
a workgroup in the SPIFFE community (Slack, 2023)
where the primary goal is to establish a comprehen-
sive framework allowing identified entities to make
authenticated statements in various scenarios. One of
the points recognized as relevant in workgroup dis-
cussions deals with the limitation of SVID to work-
load identification only, without the ability to iden-
tify or integrate with an end-user identity. JWT-SVID
is a promising alternative in cloud computing, but
it still lacks the flexibility of extension with addi-
tional information, a relevant feature in distributed
scenarios. The required solution must support vari-
ous approaches to identity, since scenarios where the
claimant’s identity doesn’t require validation from a
trusted authority to instances involving anonymity or
less structured identification methods, approaches in-
cluded: X.509, JWT, JSON-based methods, and even
situations in which the claimant’s identity remains
unidentified.
Another crucial aspect revolves around methods
for token extensions. There is a strong interest in em-
powering token bearers with the flexibility to extend
tokens as needed. This capability enhances security in
access management, enabling delegation, attenuation,
or token sealing, ensuring a more adaptable and fine-
granular access control system. The main challenges
include handling multiple arbitrary claims within to-
kens and highlighting the importance of size sensitiv-
ity to streamline signing and verification processes.
These definitions led to the Functional Require-
ments (FRs) guiding the development of the proposed
solution, setting it apart within the domain of similar
research. There are four FRs: delegation of bearer to-
ken permissions through a SPIRE environment (FR1),
possibility to create new valid tokens from previous
one while restricting access rights with attenuation
(FR2), existence of mechanisms to validate the token
chain of custody (FR3), and possibility to add arbi-
trary information to a token, allowing for a more gran-
ular authentication/authorization mechanism (FR4).
4 RELATED WORK
Table 1 offers a succinct overview of connections
among similar works, categorized according to the
Enhancing SPIFFE/SPIRE Environment with a Nested Security Token Model
185