> -----Original Message-----
> From: Torsten Lodderstedt [mailto:tors...@lodderstedt.net]
> Sent: Monday, May 10, 2010 12:12 PM

> >> 3.6.1.1.  End-user Grants Authorization
> >>
> >> Why not call the "code" Parameter "verification_code"? It's called
> >> verification code in the text.
> >>
> > Longer for no reason.
> >
> 
>   for  the  sake  of  clarity?

Anyone with thoughts on this?

> >> 3.6.2.  Client Requests Access Token
> >>
> >> client_secret
> >>            REQUIRED if the client identifier has a matching secret.  The
> >>            client secret as described in Section 3.4.
> >>
> >> 1) I'm having trouble to understand the meaning of  "if the client
> >> identifier has a matching secret". Is the assumption underneath that
> >> authorization servers require this secrets from all clients they have 
> >> issued
> a secret to?

Yes.

> >> What about client w/o a secret? Are they also allowed to use this flow?
> >> Or is there envisioned a dependency
> >> between the client type, clients credentials and the flows a
> >> particular client is authorized to use?

Yes, they are (I think this is the compromise on native apps).

> >> I would have expected a clear policy which flows require
> >> authentication and which not.

Suggest text.

> >> 3.7.2.  Client Requests Access Token
> >>
> >> "authorization_declined"
> >>
> >> Why does the spec interpret a request as bad request if the user just
> >> has declined the authorization? According to rfc2616 the semantics of
> >> 400 is: "The request could not be understood by the server due to
> >> malformed syntax".
> >>
> >> The calling client did not sent a malformed request, it cannot
> >> foresee or influence this outcome. I would suggest to either use
> >> status 403 or to return status code 200 for all syntactically correct
> >> and authorized request and to use another return codes in the response
> body to detail the requests outcome.
> >>
> 
> Did you miss this question?

No. Just ignored it because I need to go over all the HTTP status codes and 
error messages and clean it all up. Its incomplete at best right now.

> >> 7.  Refreshing an Access Token
> >>
> >> I would suggest to add an optional "scope" parameter to this request.
> >> This could be used to downgrade the scope associated with a token.
> >>
> > That would be the wrong way to do it given that people will expect to also
> be able to upgrade scope.
> >
> 
> What would be the right way?

Allow the client to include an access token when asking for additional scope 
(via a normal flow) so that resulting token will include the scope of both new 
and old scopes.

> >> 8.1.  The Authorization Request Header
> >>
> >> I consider the name "Token" of the authentication schema much to
> generic.
> >> That was also the feedback of all colleagues I talked to about the
> >> upcoming standard. Why not call it "OAuth2"?
> >>
> > It is meant to be generic. I consider OAuth to be the part of the protocol
> dealing with getting a token. There will be many new ways to get a token in
> the future.
> >
> 
> That's interesting! I consider the authentication scheme the major
> contribution of OAuth since it allows for a standardized way of service
> interaction. So 3rd party software components can be integrated into a
> companies infrastructure (incl. AS) w/o customization. Moreover, as you
> pointed out, there will be many other ways to get tokens in the future.

I'm not married to the name. I dislike 'OAuth2' because it is wrong to put a 
version number in the name. We can potentially reuse 'OAuth' but I'm opposed to 
using the 'oauth_version=2.0' parameter specified in OAuth 1.0. So we can just 
update 1.0 (since it is now an RFC) to note that 1.0 uses the oauth_ prefix for 
parameters and deprecate the oauth_version parameter. Or something like that.

I'm also open to new suggestions. But I think 'Token' is very descriptive (but 
I agree it does depend on your view of what is OAuth - I think it is really 
just the collection of flows).

> >
> >> 8.2.2.  Form-Encoded Body Parameter
> >>
> >> I would suggest to drop this section/feature.
> >>
> >> General note: Would it make sense to add explicit format handling to
> >> the OAuth API? If we envision authorization servers supporting more
> >> than one token format (e.g. SAML, SWT, ...), the client should given
> >> the option to request a certain format and responses returning access
> >> tokens should indicate the format of this token. The OAuth
> >> authorization header could also have an optional format attribute for the
> same purpose.
> >>
> > You mean token format? OAuth defined the token as opaque so that
> would be counter-productive.
> >
> 
> I dont't mean OAuth shall define token formats. I just ask for a way to
> request tokens in a particular format and pass such meta data from AS to
> resource server via the client. Why is that counter-productive?
> Otherwise the resource server has to implement some token format
> discovery.

Yes it does.

EHL
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to