Again apologies for my late comments.
__________________________________________


> -----Original Message-----
> From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf
> Of Brian Campbell
> Sent: Monday, August 09, 2010 12:30 PM
> To: oauth
> Subject: [OAUTH-WG] SAML profile comments/questions from the SAML
> people
> 
> I received some feedback on the SAML profile from a cross posting on
> the OASIS SSTC (SAML) list.  Links to the thread topic index are
> below[1], if you are interested, but I'll try and summarize the two
> primary issues here.
> 
> First, concern was expressed that restricting the assertion to only
> allow for a single <SubjectConfirmation> element was too limiting.
> The restriction basically limits the ability of a single assertion to
> be issued for use across multiple use-cases/profiles.   A good example
> is the use-case that Prateek recently brought up in a different thread
> on this list[2] where the assertion is delivered to an SP via Web SSO
> and then that SP uses that same assertion to acquire an access token
> for data services at a 3rd party site.    As currently written,
> draft-campbell-oauth-saml-00[3], wouldn't allow for that use-case.
> I'm starting to think that my attempt at simplification was is indeed
> too restrictive.  Allowing for more than one <SubjectConfirmation> will
> make the wording in the profile a bit more complicated (as well as
> implementing validation) but I think, in the longer term, it's probably
> the right thing to do from a spec perspective.  At this point I'm
> planning on loosening that restriction in the next draft.  I'm curious,
> however, if anyone has any strong opinions on it one way or the other?

I was under the impression that the Oauth use-case was 
intentionally made to be simple, where the client talks direct to 
the Authorization Server (not via Web-SSO and the SP, 
as in the classic SAML use-case).  Does Oauth-v2 today allow 
the Authorization Server to delegate/relegate the actual 
obtaining of the access token to a 3rd Party?


> The second issue involves my assumption and requirement in the profile
> that the subject of the assertion be the resource owner.  To me, it
> seemed like a reasonable and useful constraint that was generally
> inline with the spirit of the assertion flow, ...

I think there are a large number of SAML-based use cases that 
can be interestingly "layered" atop OAuth.  I guess the question 
is how complex should we get in Oauth-v2.  Perhaps for now you 
should make the subject of the assertion be the resource owner, 
to be in-line with the basic Oauth design assumptions.


/thomas/



_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to