On 2010-03-12, at 10:22 AM, Eve Maler wrote:

> This nets out to the requesting party (person or company seeking access) 
> having an incentive to say "It's really me accessing this", such that it 
> mitigates the risk that the requester (client) will hand off both the access 
> token and the signing secret to a third party.


Note I am NOT a security expert, and would appreciate an education on where I 
am wrong.

When I look at this, I question if there really is that much more value in the 
Client having two secret items over one secret item. 

I can see an advantage with something like using RAS, in that only the Client 
should have the private key, and if the private key can be used for lots of 
things, then there is some difference between a token and the private key. With 
symmetric keys, multiple parties have the keys, so non-repudiation is not 
possible.

-- Dick
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to