Hi,
A few questions we should answer before moving forward. Considering *your* use 
cases and reasons for being here:

1. Why are you here?
I'm interested to learn about status and directions of upcomming OAuth 2.0 standard and to contribute my experiences with token based web service security infrastructures.
What are you trying to solve that is not already addressed by existing 
specifications (OAuth 1.0a, WRAP, etc)?
I would appreciate improved support for environments with central authorization services and an "open triangle" style architecture (no direct communication between web service and authorization server) .

OAuth 1.0a requires the protected resource to know consumer key and secret, which is a security issue in our environment (central authorization server, various services exposing protected resources outside of our control). It should be sufficent to use token related data in order to verify a token (or a message carrying the token, respectively).

Just passing the token (bearer tokens) to a service should be an option (typically over HTTPS).

It is difficult to revoke access tokens in our environment. I see the following options: a) Force the protected resource to check the token validity on each request (requires remote calls - imperformant)
 b) Push revocations to all services (complex)
c) Use a combination of long (months)- and short-living (minutes-hours) tokens, long-living tokens are exchanged for short living tokens, which in turn are used for service invocation. The revocation is checked by the authorization server when issuing short-living tokens.
The coming OAuth spec should support option (c)

2. Should the WG start by taking WRAP or OAuth 1.0a as its starting point? 
Something else?
draft-hammer-http-token-auth + WRAP

3. If we start from draft-hammer-oauth, what needs to change to turn it into 
OAuth 2.0?

4. If we start from draft-hardt-oauth, what needs to change to turn it into 
OAuth 2.0?
authorization servers should optionally issue token secrets in order to support message signing.
5. Do you think the approach of working first on 'how to use a token' and then 
on 'how to get a token' is right?
Both topics interdependent on each other, so building the big picture first and elaborate the specification in two steps later on might be better
6. Should we go back to working on a single specification?
yes.
7. Do you think the protocol should include a signature-based authentication 
scheme?
yes.

regards,
Torsten.
EHL
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth


_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to