I'm wondering if this could be achieved by adding an optional scope parameter to the existing refresh request versus creating a new request type. Both because Dick's proposed text requires a refresh token and it seems like services worried about this sort of risk would not want to issue long lived access tokens.
--David On Mon, May 10, 2010 at 10:39 PM, John Panzer <jpan...@google.com> wrote: > Yes; a service that does a one time configuration step, requiring > extensive access, followed by an ongoing lower level of access (say, > read-only). Lowering access means it only needs to store low-risk > tokens in its data store, limiting exposure (and liability). > > On Monday, May 10, 2010, Eran Hammer-Lahav <e...@hueniverse.com> wrote: >> Are there actual use cases for this? Either way sounds like it belongs in an >> extension. >> >> EHL >> >>> -----Original Message----- >>> From: Marius Scurtescu [mailto:mscurte...@google.com] >>> Sent: Monday, May 10, 2010 12:49 PM >>> To: Eran Hammer-Lahav >>> Cc: Dick Hardt; OAuth WG (oauth@ietf.org) >>> Subject: Re: [OAUTH-WG] modifying the scope of an access token >>> >>> On Sun, May 9, 2010 at 10:17 PM, Eran Hammer-Lahav >>> <e...@hueniverse.com> wrote: >>> > This would only work for the client credentials flow (because you keep the >>> same authorization source). For all other flows you are breaking the >>> authorization boundaries. >>> >>> If the requested scope is a subset of the original scope associated with the >>> refresh token then it should be acceptable, right? >>> >>> This would allow a client to request a larger set of scopes, needed for all >>> API >>> calls need for its function, but then get sub-scoped access tokens, >>> particular >>> to each API. This will prevent an API from receiving a too powerful access >>> token. A compromised API could use access tokens to place calls against >>> other APIs, but not if it is narrowly scoped. >>> >>> Marius >>> >>> > >>> > What would be useful is to allow asking for more scope. For example, when >>> asking for a token (the last step of each flow), also include a valid token >>> to >>> get a new token with the combined scope (new approval and previous). >>> > >>> > EHL >>> > >>> >> -----Original Message----- >>> >> From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On >>> >> Behalf Of Dick Hardt >>> >> Sent: Sunday, May 09, 2010 7:19 PM >>> >> To: OAuth WG (oauth@ietf.org) >>> >> Subject: [OAUTH-WG] modifying the scope of an access token >>> >> >>> >> There has been some discussion about modifying the scope of the >>> >> access token during a refresh. Perhaps we can add another "method" to >>> >> what the AS MAY support that allows modifying the scope of an access >>> >> token. Type of request is "modify" and the scope parameter is >>> >> required to indicate the new scope required. Suggested copy below: >>> >> >>> >> type >>> >> REQUIRED. The parameter value MUST be set to modify >>> >> >>> >> client_id >>> >> REQUIRED. The client identifier as described in Section 3.4. >>> >> >>> >> client_secret >>> >> REQUIRED if the client was issued a secret. The client secret. >>> >> >>> >> refresh_token >>> >> REQUIRED. The refresh token associated with the access token to >>> >> be refreshed. >>> >> >>> >> scope >>> >> REQUIRED. The new scope of the access request expressed as a >>> >> list of space-delimited strings. The value of the scope parameter is >>> >> defined by the authorization server. If the value contains multiple >>> >> space-delimited strings, their order does not matter, and each string >>> >> adds additional access range to the requested scope. >>> >> >>> >> secret_type >>> >> OPTIONAL. The access token secret type as described by Section 8.3. >>> >> If omitted, the authorization server will issue a bearer token (an >>> >> access token without a matching secret) as described by Section 8.2. >>> >> >>> >> _______________________________________________ >>> >> OAuth mailing list >>> >> OAuth@ietf.org >>> >> https://www.ietf.org/mailman/listinfo/oauth >>> > _______________________________________________ >>> > OAuth mailing list >>> > OAuth@ietf.org >>> > https://www.ietf.org/mailman/listinfo/oauth >>> > >> _______________ > > -- > -- > John Panzer / Google > jpan...@google.com / abstractioneer.org / @jpanzer > _______________________________________________ > OAuth mailing list > OAuth@ietf.org > https://www.ietf.org/mailman/listinfo/oauth > _______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth