Please consider my position retracted. -- j On Feb 3, 2010, at 8:16 PM, Eran Hammer-Lahav wrote:
> You are going too far. I meant the people on this list. That's the only group > that matters. > > EHL > >> -----Original Message----- >> From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf >> Of Joseph Anthony Pasquale Holsten >> Sent: Wednesday, February 03, 2010 6:12 PM >> To: OAuth WG (oauth@ietf.org) >> Subject: Re: [OAUTH-WG] What are the primary criteria in issuing an >> authentication challenge? >> >> A self fulfilling prophecy. >> >> Who isn't interested? Client authors or service providers with an incentive >> to >> lock people in? If you work at microsoft or google or yahoo or facebook, you >> might consider asking people like ping.fm how much they care about >> interoperability. And maybe ask why the people who are supposed to be >> consuming these services aren't active on these lists. >> -- >> j >> >> On Feb 3, 2010, at 10:46 AM, Eran Hammer-Lahav wrote: >> >>> It doesn't feel like we have much interest at this level of >>> interoperability at >> this point. >>> >>> EHL >>> >>>> -----Original Message----- >>>> From: Manger, James H [mailto:james.h.man...@team.telstra.com] >>>> Sent: Wednesday, February 03, 2010 5:38 AM >>>> To: Eran Hammer-Lahav; OAuth WG (oauth@ietf.org) >>>> Subject: RE: [OAUTH-WG] What are the primary criteria in issuing an >>>> authentication challenge? >>>> >>>> An authentication challenge (WWW-Authenticate header) defined in a >>>> spec for an authentication mechanism should be present, but only with >>>> details specific to that mechanism (eg list of MAC algorithms). >>>> >>>> I think there should be a totally separate WWW-Authenticate header >>>> specifically saying "a delegation flow can be used to access this >>>> resource". It should include details such as the URI to redirect the user >>>> to. >>>> >>>> We really need this if we want to offer a web-style protocol with any >>>> semblance of interoperability. If we omit it because "clients need to >>>> know lots of other API-specific details anyway" then we wont have a >>>> path to get past that limitation in future. >>>> >>>> >>>> -- >>>> James Manger >>>> >>>>> -----Original Message----- >>>>> From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On >>>>> Behalf Of Eran Hammer-Lahav >>>>> Sent: Thursday, 28 January 2010 2:12 PM >>>>> To: OAuth WG (oauth@ietf.org) >>>>> Subject: [OAUTH-WG] What are the primary criteria in issuing an >>>>> authentication challenge? >>>>> >>>>> An authentication challenge (to make sure we are all on the same >>>>> page) is something the server sends to the client when denying >>>>> access to a protected resource. The challenge can be as simple as >>>>> "use Basic", or complex as "use Digest with the following >>>>> parameters". OAuth 1.0 doesn't really use a challenge because it was >>>>> created for cases where the API calls are preconfigured and >>>>> hardcoded into the client. The client should never receive an OAuth >>>>> challenge the way the protocol was originally designed. >>>>> >>>>> In my token authentication draft I tried to propose multiple >>>>> mechanisms (not fully baked yet) for issuing a challenge and >>>>> allowing the client to figure out what to do next. Before producing >>>>> another draft, it is important to figure out what challenge model we >>>>> want to use. Here are the general options I came up with: >>>>> >>>>> 1. Basic / OAuth 1.0 style - Simply say "use Token". The client is >>>>> left on its own to figure out what to do next. >>>>> >>>>> 2. Basic / OAuth 1.0 + simple discovery - Say "use Token and if you >>>>> need a new token go there". It is still not clear how this will help >>>>> the client given that getting a token is likely it include many >>>>> different options, and to fully address this we need to dig deep >>>>> into discovery which was left out of scope. >>>>> >>>>> 3. Token attributes - the server informs the client of the kind of >>>>> tokens accepted (based on their cryptographic properties or the >>>>> resource-set/realm they are good for). This is just like #2 but with >>>>> the ability for the server to support more than one token type per >>>>> resource. >>>>> >>>>> Question: Is the ability for a single token-protected resource to >>>>> support more than one token type (say Plain+SSL *and* HMAC-256) part >>>>> of our requirements? If not, there is no reason at all for the >>>>> challenge to include anything other than #1 or #2 (probably defined >>>>> as a future extension). >>>>> >>>>> EHL >>>>> >>>>> _______________________________________________ >>>>> OAuth mailing list >>>>> OAuth@ietf.org >>>>> https://www.ietf.org/mailman/listinfo/oauth >>> _______________________________________________ >>> OAuth mailing list >>> OAuth@ietf.org >>> https://www.ietf.org/mailman/listinfo/oauth >> >> _______________________________________________ >> OAuth mailing list >> OAuth@ietf.org >> https://www.ietf.org/mailman/listinfo/oauth _______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth