On Tue, May 25, 2010 at 1:46 PM, Torsten Lodderstedt
<tors...@lodderstedt.net> wrote:
>>
>> On Tue, May 25, 2010 at 1:21 PM, Torsten Lodderstedt
>> <tors...@lodderstedt.net>  wrote:
>>
>>>
>>> As proposed by Marius, the authorization server could issue a refresh
>>> token
>>> and the client could use the refresh request in combination with the
>>> downscoping feature in order to acquire access tokens.
>>> Consequences?
>>> In the setup illustrated above, the authorization server cannot create
>>> any
>>> access token (or an arbitrary one), it can only return a refresh token.
>>> This
>>> would mean to make the access token response parameter optional. Here I'm
>>> colliding with my mental picture of refresh tokens as long-living and
>>> storable tokens. Are these refresh tokens still long-living or as
>>> short-living as a Kerberos TGT? If they are still long-living, what about
>>> the use cases where we don't want to return refresh tokens? As far as I
>>> remember, user agent and username/password flow were candidates. How
>>> shall
>>> we handle them?
>>>
>>
>> I think the authz server can create an access token that will grant
>> access to all requested scopes, just as the corresponding refresh
>> token. If the client intends to do down-scoping then it will probably
>> just discard this initial access token.
>>
>> One way to ensure that the client is not lazy and it is not using the
>> broadly scoped access token is to have services refuse access tokens
>> that are not narrowed down to only what the service needs.
>>
>> Marius
>>
>
> As I said, every service in our setup needs another access token, with
> different content, signed and encrypted with another shared secret. It is
> technically impossible to create the super access token. Refresh tokens are
> just handles representing the user's authorization and are used by the authz
> server only. They therefore can represent any scope.

I see, thanks for clarifying.

Marius
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to