Are you actually (planning on) writing something like this? EHL
> -----Original Message----- > From: John Panzer [mailto:jpan...@google.com] > Sent: Monday, May 10, 2010 10:40 PM > To: Eran Hammer-Lahav > Cc: Marius Scurtescu; OAuth WG (oauth@ietf.org) > Subject: Re: [OAUTH-WG] modifying the scope of an access token > > Yes; a service that does a one time configuration step, requiring extensive > access, followed by an ongoing lower level of access (say, read-only). > Lowering access means it only needs to store low-risk tokens in its data > store, > limiting exposure (and liability). > > On Monday, May 10, 2010, Eran Hammer-Lahav <e...@hueniverse.com> > wrote: > > Are there actual use cases for this? Either way sounds like it belongs in an > extension. > > > > EHL > > > >> -----Original Message----- > >> From: Marius Scurtescu [mailto:mscurte...@google.com] > >> Sent: Monday, May 10, 2010 12:49 PM > >> To: Eran Hammer-Lahav > >> Cc: Dick Hardt; OAuth WG (oauth@ietf.org) > >> Subject: Re: [OAUTH-WG] modifying the scope of an access token > >> > >> On Sun, May 9, 2010 at 10:17 PM, Eran Hammer-Lahav > >> <e...@hueniverse.com> wrote: > >> > This would only work for the client credentials flow (because you > >> > keep the > >> same authorization source). For all other flows you are breaking the > >> authorization boundaries. > >> > >> If the requested scope is a subset of the original scope associated > >> with the refresh token then it should be acceptable, right? > >> > >> This would allow a client to request a larger set of scopes, needed > >> for all API calls need for its function, but then get sub-scoped > >> access tokens, particular to each API. This will prevent an API from > >> receiving a too powerful access token. A compromised API could use > >> access tokens to place calls against other APIs, but not if it is narrowly > scoped. > >> > >> Marius > >> > >> > > >> > What would be useful is to allow asking for more scope. For > >> > example, when > >> asking for a token (the last step of each flow), also include a valid > >> token to get a new token with the combined scope (new approval and > previous). > >> > > >> > EHL > >> > > >> >> -----Original Message----- > >> >> From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On > >> >> Behalf Of Dick Hardt > >> >> Sent: Sunday, May 09, 2010 7:19 PM > >> >> To: OAuth WG (oauth@ietf.org) > >> >> Subject: [OAUTH-WG] modifying the scope of an access token > >> >> > >> >> There has been some discussion about modifying the scope of the > >> >> access token during a refresh. Perhaps we can add another "method" > >> >> to what the AS MAY support that allows modifying the scope of an > >> >> access token. Type of request is "modify" and the scope parameter > >> >> is required to indicate the new scope required. Suggested copy below: > >> >> > >> >> type > >> >> REQUIRED. The parameter value MUST be set to modify > >> >> > >> >> client_id > >> >> REQUIRED. The client identifier as described in Section 3.4. > >> >> > >> >> client_secret > >> >> REQUIRED if the client was issued a secret. The client secret. > >> >> > >> >> refresh_token > >> >> REQUIRED. The refresh token associated with the access token > >> >> to be refreshed. > >> >> > >> >> scope > >> >> REQUIRED. The new scope of the access request expressed as a > >> >> list of space-delimited strings. The value of the scope parameter > >> >> is defined by the authorization server. If the value contains > >> >> multiple space-delimited strings, their order does not matter, and > >> >> each string adds additional access range to the requested scope. > >> >> > >> >> secret_type > >> >> OPTIONAL. The access token secret type as described by Section > 8.3. > >> >> If omitted, the authorization server will issue a bearer token (an > >> >> access token without a matching secret) as described by Section 8.2. > >> >> > >> >> _______________________________________________ > >> >> OAuth mailing list > >> >> OAuth@ietf.org > >> >> https://www.ietf.org/mailman/listinfo/oauth > >> > _______________________________________________ > >> > OAuth mailing list > >> > OAuth@ietf.org > >> > https://www.ietf.org/mailman/listinfo/oauth > >> > > > _______________ > > -- > -- > John Panzer / Google > jpan...@google.com / abstractioneer.org / @jpanzer _______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth