On 2010-03-09, at 7:05 AM, Eve Maler wrote:
> 
> It's a good idea to give guidance on how the scope parameter should be used.  
> That way, it will help avoid "abuse" of the parameter for other purposes, and 
> clashes if different deployments are using it in different ways.  (I suspect 
> that the tradeoff here is making it (superficially?) appealing for 
> implementers vs. making it more interoperable for deployers.)

Thanks. Will add to list of edits.

> Right, the Client doesn't do this processing.  However, if the point of 
> making tokens opaque to "the Client" is to save them trouble, I wanted to 
> point out that some of our use cases have the same overall application 
> deploying a Client along with also being a Protected Resource, and that it 
> could be reasonable to want to save such an app as much trouble as possible 
> in the aggregate.  WRAP today assumes that "the Protected Resource" validates 
> a signature locally.  However, this could be expensive (in the sense of 
> requiring PKI infrastructure).  Another option is to have it offload 
> validation to the Authorization Server as a back-channel operation, which has 
> its own pros and cons.  For now, in UMA we're thinking of defining the 
> back-channel loop as an extension (which could be completely opaque to the 
> core protocol underneath).

Understood. We could add to the spec that the validation could happen at a 
service instead of locally.

-- Dick

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to