> The reason why it makes little sense to have different schemes for
> different types of tokens is that it is not the protected resource's
> job to say which algorithm should be used, but the server when issuing
> the token for that resource. The draft did a poor job at separating the
> role of the server issuing the tokens from the role of the server
> providing access to resources.


It is not the role of a spec for an HTTP authentication mechanism to make 
assumptions about how credentials are issued, or assumptions about what 
additional authentication mechanisms might be supported by any particular 
server. I hope a HTTP request-signing spec does not need to assume that a 
separate security server is involved to do all possible mechanism negotiation.


I am very happy for a security server to say:
  eg "use this token+secret with HMAC-SHA256 at http://api.example.org/ for 10 
minutes"
A security server may want to be a little less specific:
  eg "use this token+secret with any MAC algorithm at http://*.example.com/";
Or
  eg "use this token+secret with the OAuth MAC algs or 
draft-oiwa-http-mutualauth at xyz".

A statement from a security server binding a token+secret to
  "1 or more 'mechanisms' of the 'Token' scheme"
is no easier than a statement binding then to
  "1 or more 'schemes'",
Binding to 'mechanisms' of the 'Token' scheme is significantly worse as it 
exclude a whole swag of current and future authentication mechanisms that are 
not written with OAuth specifically in mind.


--
James Manger
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to