Hey Greg,
I think that the Client Identifier and Secret flow should address
this.  It definitely needs to be called out better.

--David

On Mon, Mar 22, 2010 at 2:23 PM, Greg Brail <gbr...@sonoasystems.com> wrote:
> I'd like to describe a token-related use case that, right now, is how some
> people are using parts of OAuth 1.0. I think it's a real use case and I'm
> wondering how the proposed OAuth 2.0 would handle it. (I'm on the IETF call
> too and it is very quiet.)
>
>
>
> We have seen APIs out there that require that the "application" or device be
> authenticated, but not necessarily the individual user. This happens in
> mobile apps, for instance -- there is a requirement to identify which mobile
> app, version, platform, etc, is making API calls. However, the data being
> retrieved is not terribly sensitive and does not require user-level
> authentication.
>
>
>
> The standard way to handle this in the API world today is by using the "API
> key" pattern -- a unique identifier is handed to every application, buried
> in the code somewhere, and used on every API call.
>
>
>
> Some users of APIs want a layer of security in between a simple API key (a
> bearer token) and full OAuth-based user authentication. They do this today
> using the OAuth 1.0 "consumer key" -- they bury a consumer key and secret
> inside the mobile device, and use the OAuth 1.0 signature mechanism to sign
> each request using the key and secret. This gives them a reasonable amount
> of assurance that requests are coming from a particular version of the
> mobile app, while not requiring full user authentication. (Some people call
> this "one-legged OAuth.")
>
>
>
> Furthermore, some existing OAuth 1.0-based APIs -- or at least the Netflix
> API -- use different levels of authentication for different calls, depending
> on the sensitivity of the data involved. To use OAuth 1.0a terminology,
> certain calls require a "consumer key only," others must be signed using the
> consumer key and secret, and others must be signed by a consumer key and
> access token.
>
>
>
> Eran's proposal from a while ago to split OAuth into "how to get a token"
> and "how to use a token" handled this nicely because customers involved in
> this kind of use case could select only the "how to use a token" part of the
> spec when they planned to use only a small number of tokens and distribute
> them manually. It seems like the current OAuth 2.0 proposal is a little
> different. I'd like to make sure that this use case still works in the final
> specs.
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to