----- Original Message ----
> From: Michael D Adams <m...@automattic.com>
> As Brian mentioned, the client-side component  hosted on thirdparty.com
> does get the access token in the User Agent  flow.  That means the
> client-side script can access multiple protected  resources (upload a
> photo, update the user's profile, flag the user as  "online", download
> a friends list, whatever) in the same page load.
> 
> If  I'm interpreting your idea correctly, only one protected resource
> can be  accessed per access token since the thirdparty.com app never
> sees the  token.  For every resource it needs, thirdparty.com has to
> send the user  through the authorization server again.  Am I  mistaken?

in my example, after:
document.params.setAttribute("action", url);

you can add:
document.cookie="access_token=...

Theoretically, it'll create a cookie in the resource server domain (I'm saying 
theoretically, becuase didn't test it). Next time when UA goes to the same 
resource server, the latter can use the cookie to do authentication. It means 
that you don't need to go to authz server again until token is expired.

If this is correct, why would you need to share the secret with thirdparty.com 
server? It actually makes the solution more secure, if you don't, becuase 
access 
token is known to UA only.

In my Ajax example you don't even need a cookie, becuase access_token can be 
stored in a JavaScript variable.


      
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to