I'm assuming that the WWW-Authenticate style will also be supported (because I'm going to try to make sure it gets added). I specifically want this for SASL discovery.
-bill > -----Original Message----- > From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] > On Behalf Of Torsten Lodderstedt > Sent: Wednesday, August 04, 2010 12:39 AM > To: Torsten Lodderstedt > Cc: OAuth WG (oauth@ietf.org) > Subject: Re: [OAUTH-WG] OAuth Discovery Requirements > > Would it make sense to support two scenarios? (1) Discovery > as described in my original posting independent of > "functional" requests. (2) Discovery for unauthorized > requests (WWW-Authenticate header). > > The later might be a lightweight variant of the first scenario. > > regards, > Torsten. > > > > Am 02.08.2010 um 22:20 schrieb Torsten Lodderstedt > <tors...@lodderstedt.net>: > > > In the WG meeting at Maastricht, I have been asked to write > down my requirements regarding Discovery. And here they are: > > > > Assumptions: Discovery allows a compliant client to > automatically obtain all deployment specific data required to > securely access a particular resource servers as well as its > respective authorization server for the purpose of obtaining > access tokens. > > > > Starting point of the discovery process is a resource URL. > This URL can be hard-coded into the client, bundled with the > applications resources or manually configured by the end-user > at runtime. > > > > 1) Client -> Resource > > The client uses the resource URL to obtain resource-specific data, > > such as > > a) one URI refering to its authorization server > > b) a definition of all scopes of the resource > > c) additional data, e.g. supported signature methods and algorithms > > > > I do not make any assumption about how many requests are > processed in order to gather this information and whether > there will be any levels of indirections (e.g. from resource > to resource server). > > > > 2) Client -> Authz Server > > The authz server URI obtained in step 1 is used to gather > the following data from the authz server: > > a) endpoint URLs (end-user authorization, tokens, ...) > > b) information about the server's capabilities, e.g. the supported > > response (end-user authorization endpoint) and grant types (tokens > > endpoint) > > > > The client stores the authz server's discovery URL along > with the token(s) it obtains for further use. > > > > And that's it from my point of view. I would very much > appreciate if we could have a discussion towards a consensus > about discovery requirements. > > > > regards, > > Torsten. > > > > > > > > _______________________________________________ > > OAuth mailing list > > OAuth@ietf.org > > https://www.ietf.org/mailman/listinfo/oauth > _______________________________________________ > OAuth mailing list > OAuth@ietf.org > https://www.ietf.org/mailman/listinfo/oauth > _______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth