Re: [OAUTH-WG] Draft -16
Torsten Lodderstedt <torsten@lodderstedt.net> Thu, 19 May 2011 15:41 UTC
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0F11FE07FE for <oauth@ietfa.amsl.com>; Thu, 19 May 2011 08:41:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.248
X-Spam-Level:
X-Spam-Status: No, score=-2.248 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_EQ_DE=0.35, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WG1WEAOavxzo for <oauth@ietfa.amsl.com>; Thu, 19 May 2011 08:41:43 -0700 (PDT)
Received: from smtprelay06.ispgateway.de (smtprelay06.ispgateway.de [80.67.31.104]) by ietfa.amsl.com (Postfix) with ESMTP id 8B1A1E0753 for <oauth@ietf.org>; Thu, 19 May 2011 08:41:42 -0700 (PDT)
Received: from [79.253.37.205] (helo=[192.168.71.27]) by smtprelay06.ispgateway.de with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1QN5M3-0005LA-NO; Thu, 19 May 2011 17:41:39 +0200
Message-ID: <4DD53A3D.5010805@lodderstedt.net>
Date: Thu, 19 May 2011 17:41:49 +0200
From: Torsten Lodderstedt <torsten@lodderstedt.net>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; de; rv:1.9.2.17) Gecko/20110414 Thunderbird/3.1.10
MIME-Version: 1.0
To: Doug Tangren <d.tangren@gmail.com>
References: <90C41DD21FB7C64BB94121FBBC2E723447582E4262@P3PW5EX1MB01.EX1.SECURESERVER.NET> <90C41DD21FB7C64BB94121FBBC2E723447582E4263@P3PW5EX1MB01.EX1.SECURESERVER.NET> <BANLkTikJFQdfoUs9uzgcGXoXSnCoT=6QuQ@mail.gmail.com>
In-Reply-To: <BANLkTikJFQdfoUs9uzgcGXoXSnCoT=6QuQ@mail.gmail.com>
Content-Type: multipart/alternative; boundary="------------020106020809050904010004"
X-Df-Sender: torsten@lodderstedt-online.de
Cc: "eran@sled.com" <eran@sled.com>, OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Draft -16
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 May 2011 15:41:44 -0000
Hi Doug, Am 19.05.2011 04:09, schrieb Doug Tangren: > Followup questions from draft 16 > > 1. On storing user password for the resource owner creds flow. If the > client stores a access token along with the refresh token [1] to > refresh it, there should be no need to store the users password as > mentioned here [2] right? Yes. That's what meant with "It reduces the overall risk of storing username and password in the client". > > 2. What value does adding the client password to a basic auth encoded > header with duplicated client_id info add? [3] The goal is a cleaner protocol design. The protocol design separates client identification as part of the flow (URI parameter) and originator authentication. While the client_id parameter is required, the authentication can be omitted (unauthenticated access) or performed using other authentication mechanisms. And such mechanisms not neccessarily use client_id's. Moreover, the spec just says, "The authorization server MUST ensure the two identifiers belong to the same client". So the client_id's (request parameter and header) may differ. <someone else should answer questions 3-5, pls.> > > 6. Native modified usage of the auth code flow - "Native > applications SHOULD use the authorization code grant type > flow without client password credentials (due to their > inability to keep the credentials confidential) to obtain short-lived > access tokens, and > use refresh tokens to maintain access" [7] > > The issue was brought up earlier that clients the implicit flow should > not be issued a refresh token because there'd be no way for the server > to identify the client without the client secret. Here its suggested > they do just that. Does this mean there may be a step added in the > implicit flow in the future that will enable the client to refresh > their access token without involving the user if the user has already > chosen to authorize the app? The text recommends to use the authorization code grant type not the implicit grant. regards, Torsten. > > Those are some of the things that jump out at me. I'll read if a few > more times so see if anything else comes up. > > I'm happy to see this is all coming together! This is great work. > > [1]: http://tools.ietf.org/html/draft-ietf-oauth-v2-16#section-4.3.3 > [2]: http://tools.ietf.org/html/draft-ietf-oauth-v2-16#section-10.12 > [3]: http://tools.ietf.org/html/draft-ietf-oauth-v2-16#section-3.1 > [4]: http://tools.ietf.org/html/draft-ietf-oauth-v2-16#section-1.5 > [5]: http://tools.ietf.org/html/draft-ietf-oauth-v2-16#section-2.2 > [6]: http://tools.ietf.org/html/draft-ietf-oauth-v2-16#section-4.3.2 > [7]: http://tools.ietf.org/html/draft-ietf-oauth-v2-16#section-9 > > -Doug Tangren > http://lessis.me > > > > _______________________________________________ > OAuth mailing list > OAuth@ietf.org > https://www.ietf.org/mailman/listinfo/oauth
- [OAUTH-WG] Draft -16 Eran Hammer-Lahav
- Re: [OAUTH-WG] Draft -16 Eran Hammer-Lahav
- Re: [OAUTH-WG] Draft -16 Doug Tangren
- Re: [OAUTH-WG] Draft -16 Torsten Lodderstedt