Agreed on Base64, however the SAML already specifies this at it's encoding for 
web profiles, so we'll get the most reuse out of existing infrastructure by 
using it.   

I will work on an example - we should be able to make some sound decisions 
about how best to deal with it once we have something concrete.

thanks 

-cmort

________________________________________
From: Eran Hammer-Lahav [e...@hueniverse.com]
Sent: Friday, April 02, 2010 9:03 AM
To: Chuck Mortimore
Cc: Marius Scurtescu; OAuth WG
Subject: Re: [OAUTH-WG] SAML Assertion Flow (was: Draft progress update)

The problem with base64 (even the uri safe flavor) is the paddind
character (=) is not allowed without percent encoding. This gets messy
without clear encoding process.

The example below show that the profiles are likely to be much longer
than the flow itself, raising my question of whether it is really all
that useful to be included.

If we are going to keep this in the core spec we need a list of what a
profile must specify (just the items, not the actual details) and we
need an example. I can live with that.

Another option is to move it to a separate assertion flows spec which
will include a few generally useful profiles.

EHL

On Apr 2, 2010, at 10:45, "Chuck Mortimore"
<cmortim...@salesforce.com> wrote:

> The format would be specified by a profilie.    For instance, a SAML
> profile might define:
>
> assertion_format=urn:oasis:names:tc:SAML:2.0:cm:bearer
> assertion={SAML 2 bearer assertion, optionally wrapped in a SAML
> response, Signature must cover the assertion and can be inherited
> from the Response signature, based64 encoded.  Subject format and
> attribute statement left undefined and implementation specific}
>
> Some other implementation may want a SAML1.1 profile, or an
> Encrypted Assertion Profile, which would all be base64 encoded, but
> the details of the expected assertion would change. Someone may want
> to develop a Siteminder profile.   In this case, a siteminder
> session token would be exchanged for an Oauth token.   This would
> have a completely opaque format, and might be hex encode.    Someone
> else might want to develop an x.509 profile.   Etc, etc.
>
> It really wouldn't be up to conformant Oauth2 clients to support
> these profiles, or even the core assertion profile for that
> matter.   As Marius points out, the method for obtaining/validating
> the assertions will be out of scope, and hence this is a specialized
> Oauth client/server you're dealing with by definition.
>
> -cmort
>
> ________________________________________
> From: oauth-boun...@ietf.org [oauth-boun...@ietf.org] On Behalf Of
> Eran Hammer-Lahav [e...@hueniverse.com]
> Sent: Thursday, April 01, 2010 9:54 PM
> To: Marius Scurtescu
> Cc: OAuth WG
> Subject: Re: [OAUTH-WG] SAML Assertion Flow (was: Draft progress
> update)
>
> What is the assertion format? Binary? XML? Should the library encode
> it? Is the application using the library responsible for providing
> it with a URI-safe string?
>
> EHL
>
>
> On 4/1/10 9:45 PM, "Marius Scurtescu" <mscurte...@google.com> wrote:
>
> On Thu, Apr 1, 2010 at 9:02 PM, Eran Hammer-Lahav
> <e...@hueniverse.com> wrote:
>> But providing a half baked flow that is short enough to just
>> replicate where
>> needed and cannot be fully implemented by generic libraries doesn’
>> t really
>> offer much.
>
> I think this is similar to the scope parameter argument, that
> libraries cannot really
> use an opaque scope. OAuth libraries will neither generate nor
> consume the
> assertions, the assertion itself can be opaque. The client
> application needs to
> obtain an assertion somehow, this is out of scope, then pass it to a
> library and
> the library can use it as is, pass it to the Authorization Server and
> deal with the
> response. Works perfectly fine IMO.
>
> Marius
>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to