On Tue, May 25, 2010 at 1:43 PM, Murali VP <mural...@gmail.com> wrote:

> Anyway to find out what the outcome was from the May 20th interim meeting?
> I
> wanted to participate but had to be at Google I/O.
>
> 3.5.  User-Agent Flow
>
> 1. Since the client_id is public, the only check that prevents from
> any client posing as a registered client is the redirect_uri, this is
> fine, except that if client web application has numerous domains, each
> domain should register and have a separate client_id which is a pain.
> The alternative of a single redirect_uri returning a 302 won't work
> since the fragment will no more be available (I guess there are ways
> to get around this).
>

You can have a single redirect_uri that does a client side redirect using
JavaScript. The only catch is that this is dangerous from a security
perspective - your additional redirect needs to have strict rules about the
domains it can forward to - so this should be considered a power-developer
technique and we need to write up best practices or better provide a JS
library that has gone through review.


>
>
> 2. It is not clear from the draft how a user agent flow would refresh
> an access token. As per section 4, client does a HTTP(S) POST to
> authorization server which seems to return a 200 to user-agent if the
> request was successful leaving the user-agent in authorization
> server's domain with a JSON response data! If user-agent flow cannot
> refresh access token, why did it send the refresh_token in the first
> place in the fragment?
>
>
> 3. The draft doesn't seem to mention how a client in the user-agent
> can make protected resource requests given that such requests would be
> cross domain. The only viable option seems to be JSONP requests (eg.
> Facebook). The specification should include some material describing
> protected resource requests in the user-agent flow case.
>
>
> A relatively less important question:
>
> Since the request token has been eliminated, the web server flow (3.6)
> which comes close to the widely adopted OAuth 1.0's 3-legged oauth
> flow but without much of a dance isn't backward compatible, is this a
> known decision?
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to