This is pretty straight-forward. There are no special parameters to indicated 
which client authentication is being used. It's either there or not, using 
whatever the server supports.

Simply have the token endpoint return a 401 with these WWW-Authenticate 
headers. As long as you make it clear how to make between the client identifier 
and the credentials used, you are set.

For example, a token response can return:

401 Unauthorized
WWW-Authenticate: Basic realm="example"
WWW-Authenticate: Digest realm="example"

There is no discovery for support for the client_id and client_secret 
parameters. The client can simply try it or hardcode it based on the server's 
documentation.

Does this help?

EHL

> -----Original Message-----
> From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf
> Of Torsten Lodderstedt
> Sent: Monday, January 24, 2011 1:10 PM
> To: OAuth WG
> Subject: [OAUTH-WG] How to integrated DIGEST or SPNEGO with tokens
> endpoint?
> 
> Hi all,
> 
> I'm currently thinking about the integration of existing HTTP authentication
> schemes with OAuth 2.0 for the purpose of end-user authentication on the
> tokens endpoint. Possible candidates are "Digest"
> for challenge-response-based username/password authentication and
> "Spnego" for Kerberos-based authentication. Direct support for both could
> be beneficially in enterprise and other security sensitive deployments.
> 
> An direct integration with the tokens endpoint would allow to leverage
> existing implementations and infrastructure for OAuth/HTTP-based
> architectures. For example, HTTPClient has direct support for Spnego-
> Authentication.
> 
> Both HTTP authentication schemes use dedicated WWW-Authenticate and
> Authorization headers for passing credential and other data between client
> and server. OAuth in contrast uses grant types to indicate the authentication
> method, credentials are passed as URI query parameters and it lacks any
> discovery of available authentication methods/ grant types.
> 
> How could one integrate existing schemes into that design? What is our
> story? Do we need to define a special grant type "HTTP authorization"?
> Shall Authorization headers overrule URI parameters?
> 
> Any ideas of the WG are higly appreciated.
> 
> regards,
> Torsten.
> 
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to