So how do we resolve if the language goes into the spec?
        Thanks,
                Yaron

> -----Original Message-----
> From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf
> Of Eran Hammer-Lahav
> Sent: Tuesday, July 27, 2010 8:36 AM
> To: Brian Campbell; oauth
> Subject: Re: [OAUTH-WG] Proposed language for section 2.2 on Client
> Assertions
> 
> Makes sense. Personally, I don't have any preference on including it or not.
> 
> EHL
> 
> > -----Original Message-----
> > From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf
> > Of Brian Campbell
> > Sent: Tuesday, July 27, 2010 5:49 AM
> > To: oauth
> > Subject: Re: [OAUTH-WG] Proposed language for section 2.2 on Client
> > Assertions
> >
> > A client_id parameter would still be presented in the end user
> > authorization request. The text Brian E. quoted is what mandates any
> > specifications/documents/agreements that define how to use client
> > assertions must also define the association between the client_id and
> > some
> > field(s) in the assertion.
> >
> > If someone sees a cleaner way to deal with client identity on the user
> > authorization request when using assertions to authenticate the client
> > to the token endpoint, please speak up and lets discuss it.   However,
> > in general I do feel it's important to have better defined support in
> > the core OAuth spec to allow for client authentication methods beyond
> > just password.
> >
> > -Brian
> >
> > On Mon, Jul 26, 2010 at 5:18 PM, Brian Eaton <bea...@google.com> wrote:
> > > On Mon, Jul 26, 2010 at 4:11 PM, Eran Hammer-Lahav
> > <e...@hueniverse.com> wrote:
> > >> How do you link the client_id using in the authorization endpoint
> > >> with the
> > client assertion using in the token endpoint?
> > >
> > > In theory:
> > >
> > > "any document that defines how to use an assertion of a particular
> > > type with OAuth 2.0 MUST define how to map the value from the
> > > client_id parameter in the authorization request to a value or
> > > values in the assertion subsequently submitted with the code to
> > > obtain an access token."
> > >
> > > In practice: you do it the same way you handle any kind of identity
> > > assertion.  There is some combination of issuer and subject and
> > > signature that ends up producing an identity that you trust.
> > > _______________________________________________
> > > OAuth mailing list
> > > OAuth@ietf.org
> > > https://www.ietf.org/mailman/listinfo/oauth
> > >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to