I'm 135 messages behind on the list. I'm knee deep in -07.

EHL

From: Torsten Lodderstedt [mailto:tors...@lodderstedt.net]
Sent: Friday, June 11, 2010 10:03 AM
To: Eran Hammer-Lahav
Cc: OAuth WG (oauth@ietf.org)
Subject: Fwd: Re: [OAUTH-WG] in-app logout?

Hi Eran,

you probably didn't notice my posting. What do you think about adding a 
revocation request to the spec?

regards,
Torsten.

-------- Original-Nachricht --------
Betreff:

Re: [OAUTH-WG] in-app logout?

Datum:

Wed, 26 May 2010 20:26:18 +0200

Von:

Torsten Lodderstedt <tors...@lodderstedt.net><mailto:tors...@lodderstedt.net>

An:

Eran Hammer-Lahav <e...@hueniverse.com><mailto:e...@hueniverse.com>

CC:

OAuth WG (oauth@ietf.org<mailto:oauth@ietf.org>) 
<oauth@ietf.org><mailto:oauth@ietf.org>



Hi Eran,



in my perception, there is some support on the list for having a request

to revoke refresh tokens. Will you add such a request to the

specification? Do you need a text proposal?



regards,

Torsten.



> IMHO this would look more like a hack than proper protocol design. We need

> a delete/revoke operation that's the pendant to the other token operations 
> (i.e.

> crud ops).

>

> Hubert

>

>

>

> On Fri, May 21, 2010 at 7:05 PM, Beau 
> Lebens<b...@dentedreality.com.au><mailto:b...@dentedreality.com.au>  wrote:

>

>> Could this just be implemented through support for a scope change

>> where scope=none or revoke or something?

>>

>> On Friday, May 21, 2010, Lukas 
>> Rosenstock<l...@lukasrosenstock.net><mailto:l...@lukasrosenstock.net>  wrote:

>>

>>> Why not simply add this functionality to the token endpoint?The same place 
>>> that was used to fetch the access token first or refresh it could be used 
>>> to revoke the same token with another request. The only requirement would 
>>> be to define something like type=revoke.

>>> I feel that is much easier than making the token a URL which supports 
>>> DELETE.

>>> However, any mechanism will break implementations that rely on minimal or 
>>> no communication between authorization server and protected resource, 
>>> because all protected resources have to be informed.

>>>

>>> Regards, Lukas

>>>

>>> 2010/5/16 Dick Hardt<dick.ha...@gmail.com><mailto:dick.ha...@gmail.com>

>>>

>>> James: An important capability of the refresh token is that it *can* be a 
>>> self contained token in that is not an id, but a signed token that can be 
>>> examined and acted upon on presentation.

>>> Torsten: enabling a client to revoke a refresh token looks like a useful 
>>> mechanism. I anticipate it will be viewed as a vitamin feature rather than 
>>> a painkiller and will fall by the wayside unless the security conscience 
>>> rally to have it included.

>>>

>>>

>>> -- Dick

>>>

>>>

>>> On Thu, May 13, 2010 at 7:10 AM, Manger, James 
>>> H<james.h.man...@team.telstra.com><mailto:james.h.man...@team.telstra.com>  
>>> wrote:

>>> Torsten,

>>>

>>>

>>>> What about refresh token revocation/deletion?

>>>>

>>> HTTP already has a method to do this: DELETE

>>> It just needs each token to have a URI.

>>>

>>> Tokens (almost) already have URIs -- its just not immediately obvious 
>>> because the URI has to be built from a common token endpoint and a 
>>> refresh_token.

>>>

>>> I think it would improve the spec if refresh_token was renamed to, say, 
>>> token_id; and its value defined as a URI (which can be a relative URI so 
>>> the string may not need to change at all).

>>>

>>> To refresh a token you POST to the token's URI.

>>> To delete a token you send a DELETE request to the token's URI.

>>>

>>> It doesn't cause major changes, but there are some benefits.

>>> It is a more web-style design.

>>> It leaves only 1 type of token in the spec -- an access token -- which 
>>> simplifies the text and aids understanding.

>>> There are no arguments about length, allowed chars etc because it is a URI 
>>> -- a well-known type, often with native support.

>>> Its obvious how to delete the token as there is a standard HTTP method 
>>> DELETE to apply to the token URI.

>>>

>>> If a particular service supported an additional way to delete items in its 
>>> API (eg POST with a method=delete query parameter) that could apply to the 
>>> OAuth part as well.

>>>

>>> --

>>> James Manger

>>> _______________________________________________

>>> OAuth mailing list

>>> OAuth@ietf.org<mailto:OAuth@ietf.org>

>>> https://www.ietf.org/mailman/listinfo/oauth

>>>

>>>

>>>

>>> _______________________________________________

>>> OAuth mailing list

>>> OAuth@ietf.org<mailto:OAuth@ietf.org>

>>> https://www.ietf.org/mailman/listinfo/oauth

>>>

>>>

>>>

>>> --

>>> http://lukasrosenstock.net/

>>>

>>>

>>>

>> _______________________________________________

>> OAuth mailing list

>> OAuth@ietf.org<mailto:OAuth@ietf.org>

>> https://www.ietf.org/mailman/listinfo/oauth

>>

>>

> _______________________________________________

> OAuth mailing list

> OAuth@ietf.org<mailto:OAuth@ietf.org>

> https://www.ietf.org/mailman/listinfo/oauth

>





_______________________________________________

OAuth mailing list

OAuth@ietf.org<mailto:OAuth@ietf.org>

https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to