> I can't really understand how steps D, E and F works. Once I get the 
> access_token in the fragment, what happens then?
In step C client receives from authorization server an access token in the 
fragment part of the redirection URL, which the client provided to the 
authorization server in step A.
In step D the client follows that URL (without sending the fragment).
In step E client receives a script embedded in an HTML page (in response to the 
request of step D).
In step F client runs the script locally. The script extracts the access token 
from the URL received in step C and passes it to the client.

> How can I avoid from a malicious user check the source of my user-agent app, 
> get the app-id and repeat the same steps from his own application somewhere 
> else?

I do not see how it can be done. The client's authentication to authorization 
server is not specified clearly in the draft.
The specification says:
"These clients cannot keep client
secrets confidential and the authentication of the client is based on
the user-agent's same-origin policy".

Can anyone explain how client's authentication works in the User-Agent use case?

Zachary

________________________________
From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of 
Jonathan Leibiusky
Sent: Monday, August 30, 2010 9:45 AM
To: oauth@ietf.org
Subject: [OAUTH-WG] Doubts about the User-Agent Profile in OAuth2

Hi, I read the OAuth2 draft and I still have lots of doubts regard security 
when talking about the User-Agent Profile.
I can't really understand how steps D, E and F works. Once I get the 
access_token in the fragment, what happens then?
How can I avoid from a malicious user check the source of my user-agent app, 
get the app-id and repeat the same steps from his own application somewhere 
else?

Thanks!

Jonathan
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to