Thanks James. Comments are inline.

> It sounds like you want to use OAuth2 to insert an human/HTML interaction 
> into a app/Atom exchange.

The proposal was designed to provide a single flow that would
accommodate 0 or more human interaction requirements. Additionally,
the scope should not limited to access protected feed but rather any
protected resource.

While the example usecase illustrated access to a protected feed, you
can imagine this being used in more traditional flow scenarios, such
as that of the Web Server client profile.

For example, if a user has already negotiated an access token in the
proposed manner, additional access tokens *could* be granted on the
user's behalf without the requirement of a redirect.


> OAuth2 can do that.
>
> You also want to use a direct OAuth2 flow for access control to the feed.
>
> Your "precondition_uri" addition to the token response is an attempt to 
> combine the 2 OAuth2 flows.

I'd say it's an attempt to create a new flow that's more flexible and
suitable for the type of interactions DiSo requires.


> An alternative would be to run the 2 OAuth2 flows sequentially.
> 1. app use a direct OAuth2 flow (eg the assertion flow) to get a token;
> 2. app tries to get feed with token, but server demands a user-delegation 
> OAuth2 flow;
> 3. app redirects user to service; Terms of Service are shown; user redirected 
> back;
> 4. app tries to get feed again, which succeeds this time.
>
> This example illustrates that OAuth2 discovery needs to let a service
> explicitly indicate whether a direct and/or user-delegation flow is required.
> For instance, a "WWW-Authenticate: OAuth2" response could define 2 parameters:
> 'user-uri' and 'token-uri'. If only one is present, only the corresponding 
> mode
> is useful in this interaction.

Interesting.


> Another interesting facet of this example is what token the app uses
> at step 4. Is it the token the app got in the first OAuth2 flow (step 1),
> or the token from the second OAuth2 flow (step 3)?
>
> Presumably the second token overrides the first.
> In this example, however, it may be sufficient to keep using the first token.
> OAuth2 doesn’t need to make returning a token mandatory -- it is not
> always required in a user-delegation flow.

Also, when the user delegation flow is executed (step 3), how does the
provider associate acknowledgement of the ToS with the assertion grant
(step 1)?


-- 
darren bounds
dar...@cliqset.com
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to