If one were to obtain the client id of a partner, under the vanilla
username/password profile, how would a provider prevent non-partners from
connecting to a provider who has implemented this profile?

~/Jason

On Mon, Mar 8, 2010 at 8:01 PM, Allen Tom <a...@yahoo-inc.com> wrote:

> Hi Ethan -
>
> In Yahoo's case, we only allow the username/password profile for a very
> small number of applications written by Yahoo or by partners under
> contract,
> and only when opening a web browser is not feasible or desirable. We
> strongly discourage apps from using this profile, and it's unlikely that
> it'll ever be a public interface.
>
> We have a very strong preference that rich client apps invoke a browser
> window for the user to authorize the app.
>
> Other Service Providers have similar policies for their equivalent
> username/password profile.
>
> Allen
>
>
>
>
> On 3/8/10 6:51 PM, "Ethan Jewett" <esjew...@gmail.com> wrote:
>
> > On Sun, Mar 7, 2010 at 10:25 PM, Allen Tom <a...@yahoo-inc.com> wrote:
> >> This is why the username/password profile is intended for rich client
> apps,
> >> where invoking a browser is not feasible. Given that the user already
> >> downloaded and installed the rich app, popping open a browser is not
> going
> >> to protect the user from a malicious app ­ for instance, a malicious app
> >> could have installed a keylogger before invoking the browser.
> >
> > I disagree. There are a large and growing number of platforms on which
> > I can install a rich client application and be confident that it will
> > not be able to recover my username and password when I type them into
> > my web browser. To name a few that I use every day:
> >
> > 1. My iPod Touch (non-jail-broken, admittedly)
> > 2. Adobe AIR on my Windows XP system
> > 3. Mac OS X (users and applications do not run as administrators by
> default)
> >
> > On a related note - What stops a provider from implementing the
> > username/password pattern on top of normal OAuth or WRAP (thereby
> > losing my business ;-)? The token can be pretty much any string of
> > text, so the client could embed the username and password into the
> > token.
> >
> > Ethan
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to