On 6/8/10 9:58 AM, Luke Shepard wrote:
Again: can you provide a specific, real-world example where this is necessary? I'd rather not deal in hypotheticals. I've already answered the case of a hypothetical endpoint that accepts both SAML and JSON-encoded tokens.
I believe one such case is person-to-person sharing where person A is NOT part of the same network as person B.

If I have a protected resource at photos.example.com and I want to share with someone who is NOT a member of photos.example.com there are only a couple of options...

1. Today's method: security by obscurity with "non-guessable" URLs emailed to person B

2. Use OpenID and force Person B to "sign in" to photos.example.com (effectively establishing a relationship with photos.example.com that they might not want)

3. Have photos.example.com be able to accept a token from person B's authorization service saying this is person B when accessing the protected resource.

Option 3 is a much better experience for the user and simpler to implement for any client that person B is using. However, this requires that photos.example.com be able to read and understand the token from person B's authorization server (AS). Hence we need some way to associate origin and format with the token.

Personally, I think that using XRD the origin server could expose a "dumb mode" token validator such that resource owners that don't now how to process the token natively could still validate the token and get some minimal information.

Thanks,
George

Some additional thoughts and links: http://practicalid.blogspot.com/2010/05/identity-as-attribute.html
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to