Yes.

> -----Original Message-----
> From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf
> Of William Mills
> Sent: Wednesday, August 04, 2010 9:05 AM
> To: Torsten Lodderstedt
> Cc: OAuth WG (oauth@ietf.org)
> Subject: Re: [OAUTH-WG] OAuth Discovery Requirements
> 
> I'm assuming that the WWW-Authenticate style will also be supported
> (because I'm going to try to make sure it gets added).  I specifically want 
> this
> for SASL discovery.
> 
> -bill
> 
> > -----Original Message-----
> > From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf
> > Of Torsten Lodderstedt
> > Sent: Wednesday, August 04, 2010 12:39 AM
> > To: Torsten Lodderstedt
> > Cc: OAuth WG (oauth@ietf.org)
> > Subject: Re: [OAUTH-WG] OAuth Discovery Requirements
> >
> > Would it make sense to support two scenarios? (1) Discovery as
> > described in my original posting independent of "functional" requests.
> > (2) Discovery for unauthorized requests (WWW-Authenticate header).
> >
> > The later might be a lightweight variant  of the first scenario.
> >
> > regards,
> > Torsten.
> >
> >
> >
> > Am 02.08.2010 um 22:20 schrieb Torsten Lodderstedt
> > <tors...@lodderstedt.net>:
> >
> > > In the WG meeting at Maastricht, I have been asked to write
> > down my requirements regarding Discovery. And here they are:
> > >
> > > Assumptions: Discovery allows a compliant client to
> > automatically obtain all deployment specific data required to securely
> > access a particular resource servers as well as its respective
> > authorization server for the purpose of obtaining access tokens.
> > >
> > > Starting point of the discovery process is a resource URL.
> > This URL can be hard-coded into the client, bundled with the
> > applications resources or manually configured by the end-user at
> > runtime.
> > >
> > > 1) Client -> Resource
> > > The client uses the resource URL to obtain resource-specific data,
> > > such as
> > > a) one URI refering to its authorization server
> > > b) a definition of all scopes of the resource
> > > c) additional data, e.g. supported signature methods and algorithms
> > >
> > > I do not make any assumption about how many requests are
> > processed in order to gather this information and whether there will
> > be any levels of indirections (e.g. from resource to resource server).
> > >
> > > 2) Client -> Authz Server
> > > The authz server URI obtained in step 1 is used to gather
> > the following data from the authz server:
> > > a) endpoint URLs (end-user authorization, tokens, ...)
> > > b) information about the server's capabilities, e.g. the supported
> > > response (end-user authorization endpoint) and grant types (tokens
> > > endpoint)
> > >
> > > The client stores the authz server's discovery URL along
> > with the token(s) it obtains for further use.
> > >
> > > And that's it from my point of view. I would very much
> > appreciate if we could have a discussion towards a consensus about
> > discovery requirements.
> > >
> > > regards,
> > > Torsten.
> > >
> > >
> > >
> > > _______________________________________________
> > > OAuth mailing list
> > > OAuth@ietf.org
> > > https://www.ietf.org/mailman/listinfo/oauth
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
> >
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to