Thanks for addressing my questions Eran.

For the Assertion Flow I would assume the lifetime of the authorization grant 
would be the same with or without the refresh token support.  It doesn't seem 
to me like the overall lifetime of the authorization grant would change based 
upon the use of the refresh token.

However I certainly do see that the usefulness of the refresh token is very 
questionable based upon wanting the authorization grant lifetimes to be short 
for the Assertion Flow.  And providing the refresh token for this flow almost 
leads the resource provider in granting longer than recommended authorization 
grant lifetimes ... which ultimately should be avoided.  Is this the point?

Thanks.

Doug    

-----Original Message-----
From: Eran Hammer-Lahav [mailto:e...@hueniverse.com] 
Sent: Sunday, May 09, 2010 10:26 AM
To: Foiles, Doug; OAuth WG
Subject: RE: [OAUTH-WG] Autonomous clients and resource owners (editorial)



> -----Original Message-----
> From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf
> Of Foiles, Doug
> Sent: Sunday, May 02, 2010 8:41 AM
> To: OAuth WG
> Subject: Re: [OAUTH-WG] Autonomous clients and resource owners
> (editorial)
> 
> I wanted to poke on the idea of not allowing Refresh Tokens for the
> assertion flow.

How not leaving this up to the server to decide a bad thing? Clearly not all 
assertions will map directly to the OAuth token and expiration, so the token is 
already a different trust relationship. The current draft has a SHOULD NOT for 
refresh token.

> And I am wondering if the assertion flow where the client is acting on behalf
> of a user is on the list of things to be added???

This is a problem with the autonomous grouping, not the flow.

> And I still don't see the corresponding flow in OAuth 2.0 for an OAuth 1.0 - 2
> Legged use case where clients are acting on behalf of a resource owner that
> is not themselves.  Will there be a flow to support this???  I can actually 
> see
> how another type of "end user credentials flow" would work where the
> credential is something different than the username and password.

No. The 1.0 2-legged use-case was really an abuse of the OAuth signature method 
to make signed requests using a username and password (client credentials) 
instead of using Basic auth. In OAuth 2.0, you have to go through an additional 
step: the client first uses its client credentials to get a token (over HTTPS) 
and it uses that token to make requests (signed or not).

EHL


_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to