I'm still a newbie to the OAuth and WRAP discussions, so please bear with me.

In Section 2.2, draft-ietf-oauth-v2-05 states that the access token is basicaly 
an opaque structure to the client, but which can have some "internal structure" 
(having meaning to the authz server and resource server):

] Access token strings can use any internal structure agreed upon
] between the authorization server and the resource server, but their
] structure is opaque to the client.  Since the access token provides
] the client access to the protected resource for the life of the
] access token (or until revoked), the authorization server should
] issue access tokens which expire within an appropriate time, usually
] much shorter than the duration of the access grant.

I was wondering how true this is? 

I want to use a Kerberos v5 ticket as the token (base encoded). The OAuth 
Client need not understand this structure, but could simply pass it down to the 
Kerberos-client (in the OS or in the browser).

Then within this token (now a Kerberos ticket), the ticket fields would contain 
matching entries (as far as possible) to the OAuth token parameters (eg. 
expires_in, token_secret, etc).

For the cryptographic tokens (Section 5.3), I would then use the session-key in 
the ticket to compute he HMAC.

Would this work?  Any suggestions?

/thomas/


_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to