When a token is issued, that's when a secret should be provided if the token is 
to be used with a signature. The specific mac algorithm can be provided either 
with the token or at the resource endpoint (I don't have a strong feeling since 
we are only talking about symmetric secrets at this point).

I don't think a token should be "upgraded" from bearer to a secret-enabled 
using the refresh process.

EHL

From: Raffi Krikorian [mailto:ra...@twitter.com]
Sent: Friday, March 26, 2010 8:24 AM
To: Eran Hammer-Lahav
Cc: Torsten Lodderstedt; oa...@core3.amsl.com; WG
Subject: Re: [OAUTH-WG] Thinking about our secrets for signatures

i concur that it should be the client that decides -- the client knows what its 
access requirements are, and can (possibly) be trusted to better make the 
choice.  of course, it could be possibly be the server's decision whether to 
support signatures or not.

by "when the token is issued", do you mean that during each "flow" a secret 
token could be issued, or (using recordon's notes above) is it #3 -- where 
during the "refresh" you could say "please give me a secret with this token, 
and then make this token impossible to use in a non-signature way".
On Fri, Mar 26, 2010 at 8:09 AM, Eran Hammer-Lahav 
<e...@hueniverse.com<mailto:e...@hueniverse.com>> wrote:
The client can ask for a specific token type, but it is the server's decision. 
Either way, that decision should happen when the token is issued, not when 
using it to access a resource.

EHL

> -----Original Message-----
> From: Torsten Lodderstedt 
> [mailto:tors...@lodderstedt.net<mailto:tors...@lodderstedt.net>]
> Sent: Friday, March 26, 2010 12:43 AM
> To: Eran Hammer-Lahav
> Cc: Brian Eaton; Ethan Jewett; OAuth WG
> Subject: Re: [OAUTH-WG] Thinking about our secrets for signatures
>
> An interesting question is, who decides what kind of token to issue? 1) Is it
> the authorization server because it knows what tokens and signature
> algorithms are used by the targeted protected resource? 2) Or is it the 
> client?
> I would tend to #2 because I can imagine protected resources with multiple
> endpoints (e.g. http and https) using different token types. So it would be
> the task of the client to decide which way is better suited for its use case.
> > I agree.
> >
> > Authorization servers should issue credentials (tokens) with clear
> semantics. If a token is to be used with a signature, its properties should
> reflect it. If a server doesn't require signatures, why waste storage and
> bandwidth with secrets.
> >
> > EHL
> >
> >
> >> -----Original Message-----
> >> From: oauth-boun...@ietf.org<mailto:oauth-boun...@ietf.org> 
> >> [mailto:oauth-boun...@ietf.org<mailto:oauth-boun...@ietf.org>] On
> >> Behalf Of Brian Eaton
> >> Sent: Thursday, March 25, 2010 8:50 PM
> >> To: Ethan Jewett
> >> Cc: OAuth WG
> >> Subject: Re: [OAUTH-WG] Thinking about our secrets for signatures
> >>
> >> On Thu, Mar 25, 2010 at 7:54 PM, Ethan 
> >> Jewett<esjew...@gmail.com<mailto:esjew...@gmail.com>>
> >> wrote:
> >>
> >>> Possibly this is a silly question, but why not #2 and have the
> >>> bearer token method (over SSL of course) include the token secret?
> >>> The provider would always issue a token and a token secret. If the
> >>> client is not interested in signing methods, it can discard the
> >>> token and keep the token secret. This secret is never sent in the
> >>> clear using a signing method. I believe that this is the approach
> >>> taken in OAuth 1.0a and it seems like it should address this concern.
> >>>
> >> Well thought-out bearer tokens and well thought-out proof of
> >> possession tokens rarely look the same.
> >> _______________________________________________
> >> OAuth mailing list
> >> OAuth@ietf.org<mailto:OAuth@ietf.org>
> >> https://www.ietf.org/mailman/listinfo/oauth
> >>
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org<mailto:OAuth@ietf.org>
> > https://www.ietf.org/mailman/listinfo/oauth
> >
>

_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth



--
Raffi Krikorian
Twitter Platform Team
http://twitter.com/raffi
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to