The use case is pretty simple: the user uses the server and approves a third 
party site access to their data directly (i.e. They are not sent to the server 
from the client, but just use the server). The third part then uses their 
client credentials to request a token. That token has access to whatever data 
was authorized previously by any user on the server side. This is still a 
client-only flow, but the grant isn't just for the client's own resources, but 
to whatever has been authorized to that client.

All I was trying to say was that when the client uses client credentials alone, 
it can access resources beyond those under its control (i.e. Its own resources) 
if such grant was previously arranged. For example, I think FireEagle had an 
API to ask if any of the users who authorized a client have changed location 
since last time the client checked. That was done using a client-only token, 
but it provided some information about individual users (which one was updated).

IOW, the client-credentials flow is not limited to cases where the client is 
also the resource owner. The client can also access other resources as 
authorized.

EHL


On 7/17/10 8:52 AM, "Luke Shepard" <lshep...@facebook.com> wrote:

Facebook does need to implement this - formerly the "client_cred" flow. We need 
apps to be able to interact directly with the service without a user involved.

As far as consistency, it is just a little weird to call it "client password" 
in one part of the spec, when it's defined as "client secret" elsewhere. We 
wouldn't call it the "client secret" flow because the client secret is used in 
other flows; I think the same argument applies to the term "client password".

How about just "client_only" ? Eran, I don't think I understand the other use 
cases you're talking about.

On Jul 16, 2010, at 3:27 PM, Brian Eaton wrote:

> I withdraw my question.  David might not be interested in implementing
> the client password flow, but he is certainly interested in
> implementing other flows that involve the client password term.  So
> he's entitled to an opinion on what color the client password bike
> shed should be painted. =)
>
> (David, no offense, I'm just trying to stick by my guns on the whole
> "stop screwing up the spec by merging separate use cases into single
> flows" thing...)
>
> On Fri, Jul 16, 2010 at 2:23 PM, Eran Hammer-Lahav <e...@hueniverse.com> 
> wrote:
>> And that matters how?
>>
>> EHL
>>
>>
>>
>> On Jul 16, 2010, at 16:57, "Brian Eaton" <bea...@google.com> wrote:
>>
>>> On Fri, Jul 16, 2010 at 1:37 PM, David Recordon <record...@gmail.com> wrote:
>>>> I've always found "client password" to be a confusing term.
>>>
>>> Are you going to support this flow at all...?
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to