I am not concerned with simplifying client development debugging as much as the 
ability for clients to have the proper production logic.  The best that clients 
can do is always attempt a superfluous token refresh though the reason may be 
do to an end user revocation for example.

On Jan 7, 2011, at 5:24 PM, William Mills wrote:

> You're giving away more information than you need to here.  The result is 
> almost always the same, go back to the token issuer and get a new token of 
> the type you need.  I think what we're playing against here is ease of 
> debugging the server with your client, "Why should I get an invalid token 
> error with a new token?" and similar questions.
> 
> I think this is something best left to implementers to put in their own 
> debugging, and not build it into the protocol.
> 
>> -----Original Message-----
>> From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf
>> Of Paul Walker
>> Sent: Friday, January 07, 2011 4:53 PM
>> To: OAuth WG
>> Subject: [OAUTH-WG] expired access token : deserves unique code?
>> 
>> As far as I can tell (which isn't very far on many Friday afternoons),
>> there is no way for a client to distinguish an expired access token
>> from a revoked, malformed, etc token as the invalid_token error
>> parameter value encompasses multiple scenarios.  Of course, a client
>> could parse the error_description, but this is an optional parameter
>> with no guaranty of a common value among providers.
>> 
>> Given that the client would want to make an explicit decision to
>> request another access token using a refresh token (if available),
>> would it not benefit clients if a specific error parameter value was
>> defined for this scenario?
>> 
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to