On Tue, Jul 13, 2010 at 1:46 PM, Andrew Arnott <andrewarn...@gmail.com> wrote:
> Ah, got it.  Yes, we're on the same page.
> I happen to store the authorization tuple (mentioned in another thread)
> rather than the refresh token itself.  That way I can issue an arbitrary
> number of refresh tokens for the same client/user/scope/issued_date set
> without storing any extra data in the database, but I can still support
> revocations by deleting the standing authorization from the db.  Obviously,
> each time a refresh token is received, its corresponding tuple in the table
> is checked to be present to detect revocations.

That's a reasonable design trade-off...

One possible issue there is compromise of the token database.  If a
token database leaks for any reason, all of the refresh tokens would
have to be revoked.

If you stored a one-way hash of the tokens instead, compromise of the
token database would be less dangerous.  (Note that this depends how
the database was compromised, of course...)
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to