On Sun, Dec 5, 2010 at 10:34 PM, Eran Hammer-Lahav <e...@hueniverse.com> wrote:
> This is not how most HTTP authentication frameworks work (that was the 
> conclusion from my HTTP Token scheme proposal a year ago). Most frameworks 
> rather switch on the scheme name, not on a parameter inside the header.

The alternative, as suggested by James, requires a new scheme for each
token type. My guess is that we will have quite a few types pretty
soon:
- bearer opaque
- bearer transparent (JSON, signed by authz server)
- JWT signed
- MAC
- etc.

Who controls the auth header scheme names? Aren't we asking for a
collision here?

Marius


>
> EHL
>
> -----Original Message-----
> From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of 
> Marius Scurtescu
> Sent: Friday, December 03, 2010 4:27 PM
> To: Manger, James H
> Cc: oauth@ietf.org
> Subject: Re: [OAUTH-WG] OAuth 2.0 Bearer Token specification draft -01
>
> How about:
> - keeping the scheme "OAuth2", for both WWW-Authenticate and Authorization
> - define both as name/value pairs (WWW-Authenticate is already)
> - require that one of the pairs be "type=<token-type>"
>
> For example:
> WWW-Authenticate: OAuth2 type=bearer
> Authorization: OAuth2 token=vF9dft4qmT, type=bearer
>
> Marius
>
>
>
> On Thu, Dec 2, 2010 at 7:59 PM, Manger, James H 
> <james.h.man...@team.telstra.com> wrote:
>> Eran,
>>
>>> What does scheme=basic mean [in a token response]?
>>
>> It means this token response contains credentials that can be used with the 
>> HTTP BASIC authentication scheme. Don't try to use the credentials with any 
>> other scheme. The access_token value would be used as the user-id, and the 
>> token_secret value as the password.
>>
>>
>>> I think tying type and scheme together is less intuitive then letting
>>> the type definition provide the right scheme(s).
>>
>> Keeping them separate offers an additional degree of indirection.
>> Indirection is sometimes useful, but I don't think it adds any value here.
>> It just means we need another registry (of token_types, with associated 
>> procedures); and we need an extra spec for each authentication mechanism to 
>> define the linkage to OAuth2.
>>
>> A lot of authentication mechanisms take similar inputs (an id and a secret) 
>> so they shouldn't each need a separate spec to define their binding to 
>> OAuth2.
>>
>>
>>> I am using 'MAC' for my draft.
>>
>> As the token_type? As the HTTP authentication scheme? I hope both.
>>
>>> But its still an OAuth2 extension, not a completely generic HTTP scheme.
>>
>> I guess it is an OAuth2 extension in as much as it defines how to get MAC 
>> credentials from an OAuth2 token response: check token_type=MAC; 
>> access_token is the id; token_secret is the MAC key; mac_algorithm is the 
>> MAC algorithm.
>>
>>> It can be used independent of OAuth2 if you somehow got a token,
>>> secret, and mac algorithm name.
>>
>> Hopefully you define a "WWW-Authenticate: MAC ..." response header that can 
>> list acceptable MAC algorithms.
>> I think an OAuth2 token response for a MAC scheme should contain the same 
>> information as the WWW-Authenticate response header for the MAC scheme, plus 
>> the credentials to use (id & secret) and the OAuth2-specific lifetime 
>> management bits (eg how/when to refresh). We should explicitly define (in 
>> core) how to put a WWW-Authenticate header into a token response.
>>
>> --
>> James Manger
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to