My design preference would be to have a new request type. A AS could then support or not support the feature, and it keeps refresh as refresh rather than overloading it.
On Mon, May 10, 2010 at 10:43 PM, David Recordon <record...@gmail.com>wrote: > I'm wondering if this could be achieved by adding an optional scope > parameter to the existing refresh request versus creating a new > request type. Both because Dick's proposed text requires a refresh > token and it seems like services worried about this sort of risk would > not want to issue long lived access tokens. > > --David > > > On Mon, May 10, 2010 at 10:39 PM, John Panzer <jpan...@google.com> wrote: > > Yes; a service that does a one time configuration step, requiring > > extensive access, followed by an ongoing lower level of access (say, > > read-only). Lowering access means it only needs to store low-risk > > tokens in its data store, limiting exposure (and liability). > > > > On Monday, May 10, 2010, Eran Hammer-Lahav <e...@hueniverse.com> wrote: > >> Are there actual use cases for this? Either way sounds like it belongs > in an extension. > >> > >> EHL > >> > >>> -----Original Message----- > >>> From: Marius Scurtescu [mailto:mscurte...@google.com] > >>> Sent: Monday, May 10, 2010 12:49 PM > >>> To: Eran Hammer-Lahav > >>> Cc: Dick Hardt; OAuth WG (oauth@ietf.org) > >>> Subject: Re: [OAUTH-WG] modifying the scope of an access token > >>> > >>> On Sun, May 9, 2010 at 10:17 PM, Eran Hammer-Lahav > >>> <e...@hueniverse.com> wrote: > >>> > This would only work for the client credentials flow (because you > keep the > >>> same authorization source). For all other flows you are breaking the > >>> authorization boundaries. > >>> > >>> If the requested scope is a subset of the original scope associated > with the > >>> refresh token then it should be acceptable, right? > >>> > >>> This would allow a client to request a larger set of scopes, needed for > all API > >>> calls need for its function, but then get sub-scoped access tokens, > particular > >>> to each API. This will prevent an API from receiving a too powerful > access > >>> token. A compromised API could use access tokens to place calls against > >>> other APIs, but not if it is narrowly scoped. > >>> > >>> Marius > >>> > >>> > > >>> > What would be useful is to allow asking for more scope. For example, > when > >>> asking for a token (the last step of each flow), also include a valid > token to > >>> get a new token with the combined scope (new approval and previous). > >>> > > >>> > EHL > >>> > > >>> >> -----Original Message----- > >>> >> From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On > >>> >> Behalf Of Dick Hardt > >>> >> Sent: Sunday, May 09, 2010 7:19 PM > >>> >> To: OAuth WG (oauth@ietf.org) > >>> >> Subject: [OAUTH-WG] modifying the scope of an access token > >>> >> > >>> >> There has been some discussion about modifying the scope of the > >>> >> access token during a refresh. Perhaps we can add another "method" > to > >>> >> what the AS MAY support that allows modifying the scope of an access > >>> >> token. Type of request is "modify" and the scope parameter is > >>> >> required to indicate the new scope required. Suggested copy below: > >>> >> > >>> >> type > >>> >> REQUIRED. The parameter value MUST be set to modify > >>> >> > >>> >> client_id > >>> >> REQUIRED. The client identifier as described in Section 3.4. > >>> >> > >>> >> client_secret > >>> >> REQUIRED if the client was issued a secret. The client secret. > >>> >> > >>> >> refresh_token > >>> >> REQUIRED. The refresh token associated with the access token > to > >>> >> be refreshed. > >>> >> > >>> >> scope > >>> >> REQUIRED. The new scope of the access request expressed as a > >>> >> list of space-delimited strings. The value of the scope parameter is > >>> >> defined by the authorization server. If the value contains multiple > >>> >> space-delimited strings, their order does not matter, and each > string > >>> >> adds additional access range to the requested scope. > >>> >> > >>> >> secret_type > >>> >> OPTIONAL. The access token secret type as described by Section > 8.3. > >>> >> If omitted, the authorization server will issue a bearer token (an > >>> >> access token without a matching secret) as described by Section 8.2. > >>> >> > >>> >> _______________________________________________ > >>> >> OAuth mailing list > >>> >> OAuth@ietf.org > >>> >> https://www.ietf.org/mailman/listinfo/oauth > >>> > _______________________________________________ > >>> > OAuth mailing list > >>> > OAuth@ietf.org > >>> > https://www.ietf.org/mailman/listinfo/oauth > >>> > > >> _______________ > > > > -- > > -- > > John Panzer / Google > > jpan...@google.com / abstractioneer.org / @jpanzer > > _______________________________________________ > > OAuth mailing list > > OAuth@ietf.org > > https://www.ietf.org/mailman/listinfo/oauth > > > _______________________________________________ > OAuth mailing list > OAuth@ietf.org > https://www.ietf.org/mailman/listinfo/oauth >
_______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth