I've only been half following the recent assertion threads for this exact reason. I don't understand how these proposals are going to be used and worry about any additional complexity added to the spec.
--David On Thu, Aug 12, 2010 at 1:24 PM, Chuck Mortimore <cmortim...@salesforce.com> wrote: > Personally, I’d first like to see more concrete use-cases of how multiple > assertions are going to be used in practice. Tony alluded to some abstract > use-cases, but fuller descriptions would probably help everyone out. > > -cmort > > > On 8/10/10 9:15 AM, "Eran Hammer-Lahav" <e...@hueniverse.com> wrote: > > WFM. > >> -----Original Message----- >> From: Brian Campbell [mailto:bcampb...@pingidentity.com] >> Sent: Tuesday, August 10, 2010 9:03 AM >> To: Eran Hammer-Lahav >> Cc: oauth >> Subject: Re: [OAUTH-WG] more than one assertion? >> >> To be honest, I somehow overlooked that particular text - my mistake and >> apologies. Reading it again, it probably does preclude parameters from >> repeating, however, I can see some room for varied interpretations as to >> if >> that's a strong normative requirement or a looser suggestion about an >> error >> code that could be used in that circumstance. >> >> Perhaps it could be made more clear by adding some wording about it to the >> end of the first part of sections 3&4 where it says: "Parameters sent >> without >> a value MUST be treated as if they were omitted from the request. The >> authorization server SHOULD ignore unrecognized request parameters."? >> >> That said, does it make sense to relax the ban on repeating parameters in >> some situations, like for the assertion parameter, to facilitate >> easy encoding of multiple assertions? Anthony (Tony?) Nadalin >> suggested that multiple assertions might be a common use case and I think >> allowing for that via repeating assertion parameters is a cleaner and more >> reusable way to do it. >> >> The text at the bottom of section for could say something like: >> >> "Parameters sent without a value MUST be treated as if they were omitted >> from the request. The authorization server SHOULD ignore unrecognized >> request parameters. Parameters MUST NOT repeat unless otherwise noted >> in the parameter definition." >> >> Then in 4.1.3. the assertion parameter could be something like this: >> >> "assertion >> REQUIRED. The assertion(s). This parameter MAY be repeated in >> the >> request, if more than one >> assertion is needed for the access grant" >> >> >> Obviously Eran could improve on the actual text but hopefully that gets >> the >> concept across? >> >> >> >> On Mon, Aug 9, 2010 at 10:43 PM, Eran Hammer-Lahav >> <e...@hueniverse.com> wrote: >> > Do we need to clarify 4.3.1 "repeats a parameter" description for >> "invalid_request" error code does not preclude parameters from repeating? >> I'm not sure. >> > >> > EHL >> > >> >> -----Original Message----- >> >> From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On >> >> Behalf Of Brian Campbell >> >> Sent: Monday, August 09, 2010 12:34 PM >> >> To: oauth >> >> Subject: [OAUTH-WG] more than one assertion? >> >> >> >> The question of allowing for multiple assertions in the SAML profile >> >> came up recently. See http://www.ietf.org/mail- >> >> archive/web/oauth/current/msg04068.html and several subsequent >> >> messages in the thread. >> >> >> >> I pushed back on the idea at first due to added complexity. There >> >> are a number of things that need to be addressed that aren't present >> >> in the single assertion case. One of the sticker ones, to me, was >> >> how to encode the assertions into the request. A SAML <Response> >> >> element is a nice container for multiple assertions but using it in >> >> this context seemed awkward at best. A new schema could be defined >> >> or a special deliminator character could be used but that seems >> >> excessive >> and kludgy respectively. >> >> >> >> What about pushing it up into the HTTP layer and allowing for >> >> multiple occurrences of the assertion=XXX parameter in the POST body? >> >> I don't see anything in core OAuth that would necessarily preclude >> >> doing >> this. >> >> It seems cleaner and more lightweight than some of the other options. >> >> And perhaps it could be a more general (not just SAML) method of >> >> sending multiple assertions in a single assertion grant type request? >> >> >> >> It'd look something like this: >> >> >> >> POST /token.oauth2 HTTP/1.1 >> >> Host: authz.example.net >> >> Content-Type: application/x-www-form-urlencoded >> >> >> >> grant_type=assertion&assertion_type=http%3A%2F%2Foauth.net%2Fa >> sse >> >> rtion_type%2Fsaml%2F2.0%2Fbearer&assertion=[...1st >> >> assertion...]&assertion= >> >> [...2nd assertion...]&assertion=[...3nd assertion...] >> >> _______________________________________________ >> >> OAuth mailing list >> >> OAuth@ietf.org >> >> https://www.ietf.org/mailman/listinfo/oauth >> > > _______________________________________________ > OAuth mailing list > OAuth@ietf.org > https://www.ietf.org/mailman/listinfo/oauth > > > _______________________________________________ > OAuth mailing list > OAuth@ietf.org > https://www.ietf.org/mailman/listinfo/oauth > > _______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth