Good explanation, thanks Chuck.
On Wed, Aug 4, 2010 at 9:43 AM, Chuck Mortimore <cmortim...@salesforce.com> wrote: > Hi Prateek > > The use-case we were going for here is really more like a classic 2-legged > oauth scenario. A company has an existing SAML web federation established > with a service provider which is providing SSO to it's users. They now > want to perform API based integration with the service provider to perform > some data integration on-behalf of the user, for instance sync their > calendar. This function needs to execute as that user account, and the > company does not wish to establish or use passwords at the service provider. > They have 10000 users, and do not wish for each of them to go through a > classic 3 legged delegation flow; there are too many users to coordinate and > 1 single trust decision by a privileged admin will suffice. So - the > company / service provider decide to reuse their existing SAML configuration > for API federation. (note that nothing about the profile dictates you need > to have web sso in place, nor reuse the metadata exchange...just and example ) > > The company acts as both the IDP and OAuth2 client. Their integration > client obtains the assertion and posts it to the token endpoint. The token > endpoint generates an access token for the subject of the SAML assertion and > the integration client can now execute as that user. The assertion is > discarded. > > So - this is intended to be very much like web sso and use short lived bearer > assertions that are exchanged for API sessions. > > Hope that helps clarify. > > -cmort > > > ________________________________________ > From: oauth-boun...@ietf.org [oauth-boun...@ietf.org] On Behalf Of Prateek > Mishra [prateek.mis...@oracle.com] > Sent: Wednesday, August 04, 2010 8:08 AM > To: Brian Campbell > Cc: oauth > Subject: Re: [OAUTH-WG] SAML 2.0 Bearer Assertion Profile for OAuth 2.0 draft > > Brian, > > it would probably help to clarify that you are proposing this as a > additional or follow-on step to SSO implemented via the SAML web browser > profiles (right?). > > Maybe some text could be added to the draft to make that explicit. This > is in contrast to more general token exchange scenarios - here > are bunch of SAML /XYZ tokens, now give me an OAuth token for for a > certain purpose. I agree with you that the latter would require quite a > bit of additional work. > > Here is my understanding of the current use-case - > > The user delivers a SAML bearer token (issued at an IdP) via a browser > profile to an SP. The SP, performs some business service for the user > and at some point > requires access to user resources at the IdP or at some third-party > site. Switching to OAuth terminology, the Client (SP) exchanges the said > SAML bearer token to the Authorization server (could be at the IdP - > this would be a common case I think) for an OAuth token. This is the > exchange you are describing in your draft. > > Once the client obtains the OAuth token, it can bind it to a request for > the user resource. > > I have some mild SAMology concerns about this - historically the SAML > bearer token has been constrained to have a short life-time and the > general advice is not to forward it beyond the SP. I am aware that in > practice this isnt the case - often the token is bound to some > subsequent flows - somewhat along the lines you are proposing. I will > follow up with these concerns on the SAML list. > > - prateek >> Seems like a much more complicated scenario. Allowing more than one >> assertion, off the top of my head, would necessitate some major >> changes to this profile: >> >> * Define how multiple assertions are encoded into the single >> "assertion" form control (samlp:Response, concatenated, something >> else?) >> * Deal with subject equality across the assertions >> * Define the processing rules for multiple assertion (from different >> issuers) and the expected behavior when some but not all are valid. >> >> That seems like it would add significant complexity to the existing >> draft (that I'm trying to keep simple) for a particular scenario that >> I'm not sure is very common. But maybe I'm wrong. Is this something >> that others anticipate needing? If so, does it belong here? >> >> >> On Mon, Aug 2, 2010 at 4:26 PM, Anthony Nadalin <tony...@microsoft.com> >> wrote: >> >>> So the scenario we have is where there are multiple tokens from attribute >>> and identity providers need to be delivered to an OAuth authorization >>> server to satisfy the resource owner's policy of required claims. So this >>> is a case where a single SAML token/assertion is not enough to satisfy the >>> claim, we still expect that the signature verification is out of scope. >>> >>> -----Original Message----- >>> From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of >>> Brian Campbell >>> Sent: Monday, August 02, 2010 2:53 PM >>> To: oauth >>> Subject: Re: [OAUTH-WG] SAML 2.0 Bearer Assertion Profile for OAuth 2.0 >>> draft >>> >>> I guess I'd need to understand the scenario better before I'd have an >>> opinion one way or the other. However, I will say that In this >>> profile I was specifically looking to avoid the complexity that exists in >>> SAML Web SSO by allowing for multiple assertions and multiple subject >>> confirmations. >>> >>> On Mon, Aug 2, 2010 at 3:20 PM, Anthony Nadalin <tony...@microsoft.com> >>> wrote: >>> >>>> There are many cases where we need to have more than 1 SAML assertion be >>>> used to represent the authorization token, so would want a provision for >>>> multiple SAML tokens and not sure it makes sense to have a separate >>>> profile for that or add it as an option here. >>>> >>>> -----Original Message----- >>>> From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf >>>> Of Brian Campbell >>>> Sent: Thursday, July 15, 2010 1:50 PM >>>> To: oauth >>>> Subject: [OAUTH-WG] SAML 2.0 Bearer Assertion Profile for OAuth 2.0 >>>> draft >>>> >>>> I'm gong to join the growing list of people attaching a potential I-D >>>> to an email due to he cut off time for the I-D submissions. Attached >>>> is a draft that aims to tightly define the particular format of a SAML >>>> 2.0 bearer assertion in requesting an access token using the assertion >>>> grant_type. I've been working with Chuck at Salesforce.com on this >>>> and the primary goal is to have some documentation or specification >>>> that is sufficient to facilitate interoperability between >>>> independently developed implementations or products. This, of course, >>>> wouldn't preclude using SAML in other ways - it would only provide one >>>> concrete definition to implement against. >>>> >>>> I intend to submit this as an I-D when the submission process reopens. >>>> Any feedback from this group would be appreciated as well as thoughts >>>> about this eventually becoming a working group draft. >>>> >>>> Thanks, >>>> Brian Campbell >>>> >>>> >>> _______________________________________________ >>> OAuth mailing list >>> OAuth@ietf.org >>> https://www.ietf.org/mailman/listinfo/oauth >>> >>> >>> >> _______________________________________________ >> OAuth mailing list >> OAuth@ietf.org >> https://www.ietf.org/mailman/listinfo/oauth >> > _______________________________________________ > OAuth mailing list > OAuth@ietf.org > https://www.ietf.org/mailman/listinfo/oauth > _______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth