Great comments; thanks to Christian for responding.  To answer just a couple of 
more points that I don't think got addressed yet:

Yes, we would very much like for dynamic client registration to become a work 
item of this group.  (Do we need to take any steps other than stating so in 
this email?)

And, I've written to this list a couple of times in the past, describing ways 
in which UMA builds on top of OAuth (it's basically a series of profiles and 
extensions, any of which I'm willing to believe might have value to a wider 
community on its own), but it seems like a summary at this juncture would be a 
good idea.  If OAuth has two steps, "get a token" and "use a token", UMA has 
three, adding one at the beginning:

- Step 1: trust a token: Authorizing user introduces host to authorization 
manager as an OAuth client of it.  The host and AM need to acquaint themselves 
with each other in the context of this user to support the user's setting of 
policies at the AM that will govern the giving out of requester access tokens 
for the host's protected resources later.  The specifics involve the host 
actually getting its own access token that it can use at a host-specific set of 
endpoints at the AM (it's basically an embedded instance of OAuth).  As 
necessary, the dynamic client registration stuff comes in.

- Step 2: get a token: The requester approaches a protected resource, learns 
where to go to get an access token, and sets about trying to get it in mostly a 
normal fashion (engaging in dynamic client registration as necessary).  What 
UMA adds on top is that the AM can ask the requester to produce "claims" in 
support of proving its suitability for getting the token.  If the authorizing 
user had set policies that could be applied unilaterally in token issuance, 
great, but if the user had set policies that require the requester to (say) 
promise to adhere to the user's licensing terms, that can be provided in a 
claim.  (The mechanism is simple so far, but the implications are powerful...  
We've been exploring legal considerations of authorizing access by fully 
autonomous parties.)

- Step 3: use a token: Requester wields token at host to get access.  What UMA 
adds on top is the host's ability to talk to the AM on a back channel to 
validate that token, to support minimal host implementations and fully dynamic 
host deployments.

We're still in the process of defining (and in some cases redefining) the 
various protocol bits, and welcome input and engagement from others if the use 
cases we're solving for float your boat.  If you want to see a full 
experimental implementation (soon to be open-sourced, I understand) in action, 
I-D coauthor Maciej and his crew are documenting their work at 
http://smartjisc.wordpress.com/.

        Eve

On 11 Aug 2010, at 3:40 AM, Torsten Lodderstedt wrote:

> Eve,
> 
> thank you for writting this document. I consider it a good starting point for 
> a discussion about client registration and discovery. Will you propose this 
> as a WG item?
> 
> My comments & questions:
> 
> You propose a host-meta based discovery of the registration endpoint on the 
> authz server. Could this mechanism be used for discovering all AS endpoints, 
> e.g. tokens and end-user authorization?
> 
> How is a UMA requestor envisioned to discover the auth server?
> 
> I think host-meta based client discovery could be to limited since it does 
> not allow (at least in my understanding) to serve different clients (or their 
> home web apps) on the same host. What about using JRD or XRD? This would 
> allow for a client-URL-related discovery.
> 
> What means for authentication a client against its home web app. do you 
> envision?
> 
> regards,
> Torsten.
> 
> Am 10.08.2010  um 21:31 schrieb Eve Maler <e...@xmlgrrl.com>:
> 
>> Folks-- The UMA group has produced the following I-D as input to the OAuth 
>> discovery/registration/binding discussion.  We wanted to set forth our 
>> requirements (knowing that there may be other requirements from the wider 
>> community) and propose some solutions that meet them.  If further discussion 
>> seems to warrant an updating of this draft, we're happy to do that.  (If you 
>> have interest in getting involved in UMA-specific work, feel free to drop me 
>> a note.)
>> 
>>   Eve
>> 
>> http://www.ietf.org/id/draft-oauth-dyn-reg-v1-00.txt
>> 
>> Begin forwarded message:
>> 
>>> From: IETF I-D Submission Tool <idsubmiss...@ietf.org>
>>> Date: 10 August 2010 12:23:59 PM PDT
>>> To: e...@xmlgrrl.com
>>> Cc: c...@comlounge.net, m.p.machu...@ncl.ac.uk
>>> Subject: New Version Notification for draft-oauth-dyn-reg-v1-00 
>>> 
>>> 
>>> A new version of I-D, draft-oauth-dyn-reg-v1-00.txt has been successfully 
>>> submitted by Eve Maler and posted to the IETF repository.
>>> 
>>> Filename:     draft-oauth-dyn-reg-v1
>>> Revision:     00
>>> Title:         OAuth Dynamic Client Registration Protocol
>>> Creation_date:     2010-08-10
>>> WG ID:         Independent Submission
>>> Number_of_pages: 20
>>> 
>>> Abstract:
>>> This specification proposes an OAuth Dynamic Client Registration
>>> protocol.
>>> 
>>> 
>>> 
>>> The IETF Secretariat.
>>> 
>>> 
> 


Eve Maler
http://www.xmlgrrl.com/blog
http://www.twitter.com/xmlgrrl
http://www.linkedin.com/in/evemaler

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to