Copying over a discussion from comments on my blog...
http://daveman692.livejournal.com/349384.html?thread=1117640#t1117640

Mart Atkins:
> Doing short-lived access tokens in cleartext is not really any different to 
> how most sites
> handle sessions today. A short-lived access token isn't much different than a 
> session key.
>
> However, if access tokens are going to be used in this way it's probably 
> sensible to define
> a mechanism by which a consumer can explicitly invalidate an access token. 
> This means
> that an access token can be tied to the live of a site session: when the user 
> logs in (or,
> when they first do something that needs the access token) use the refresh 
> token to obtain
> a new access token; when the user logs out, terminate all of the active 
> access tokens
> associated with that session.

David Recordon:
> An invalidate method makes sense, though wouldn't this just happen by 
> refreshing the
> token anyway? You'd get a new access token and the old one would stop working.

Mart Atkins:
> Maybe that would work, as long as the new access token is known only to the 
> consumer
> until the next time the user logs in. Obviously the difference with explicit 
> invalidation is
> that when the user isn't around there are no valid access tokens at all for 
> that user.
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to