On Tue, Apr 6, 2010 at 12:21 AM, Eran Hammer-Lahav <e...@hueniverse.com>wrote:

> Hi Evan,
>
> On 4/5/10 4:28 PM, "Evan Gilbert" <uid...@google.com> wrote:
>
> > 2.4.1 Web Callback Flow & 2.4.2 Web Client Flow
> > In both flows, the authorization server should be able redirect back to
> the
> > callback URI without interacting directly with the resource owner if
> access
> > has already been approved.  This is not ruled out in the current language
> but
> > it could be made cleaner.
> >
> > Suggested rewording - change
> >
> > "After receiving an authorization decision from the resource owner, the
> server
> > redirects the resource owner to the callback URI."
> >
> >   to
> >
> > "If the client is already approved or denied for access to the protected
> > resource, the authorization service MAY redirect the resource owner to
> the
> > callback URI immediately. If not, the authorization service SHOULD ask
> the
> > resource owner for an authorization decision and after receiving the
> > decision redirect the resource owner to the callback URI."
>
> I opted for a simpler change:
>
> 'After receiving (or establishing via other means) an authorization
> decision'
>

Sounds great


>
> > 2.4.1 Web Callback Flow & 2.4.2 Web Client Flow
> > We should have an OPTIONAL username parameter:
> > username
> >   The resource owner's username. The authorization server MUST only send
> back
> > refresh tokens or access tokens for this user.
> >
> > This is useful for clients where a user is already logged into a 3rd
> party web
> > site with a specific account, and the client wants the authorization to
> match
> > the specific user.
>
> I think introducing the concept of user identity is more complex than just
> a
> username parameter. I agree that it can be useful but we need a more
> detailed discussion about this before we add it.
>

I agree issues around user identity are complex.

Would it help to spin up a separate discussion thread on this one issue?


> > 2.4.2 Web Client Flow
> > Sending an access token as a query parameter is dangerous from a security
> > perspective - these tokens are leaked via referrers and server logs. In
> > previous WRAP discussions, it was felt that we should have a strong
> > recommendation to use the URL fragment.
> >
> > Suggested wording:
> > Client SHOULD send a callback URI with a query fragment, and
> authorization
> > server MAY reject callback URLs without a fragment for security reasons.
>
> Why not require it?


I made the assumption that someone had use cases that drove the examples in
the spec.

I would be OK with requiring it.


> EHL
>
>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to