Hey Torsten -

I'm trying to parse through these messages to figure out the flows
you're interested in.

I think you're aiming for rules like this one, right?

kerberos authentication -> access token

    or

digest authentication -> access token

And furthermore your intended use cases are applications installed on
an end-users machine, where the end-users machine participates in some
kind of authentication service.  For example, maybe the machine is
joined to some kerberos realm, or maybe the user has a smart card.

Have I identified the use cases properly?  Or are you dealing with
three-legged OAuth situations, where you actually want user consent on
a web page?

Cheers,
Brian

On Tue, Jan 25, 2011 at 12:22 AM, Torsten Lodderstedt
<tors...@lodderstedt.net> wrote:
> Zitat von Eran Hammer-Lahav <e...@hueniverse.com>:
>
>> There is no clean way to do with without defining new HTTP authentication
>> schemes. The token endpoints takes:
>>
>> 1. Client authentication
>> 2. Authorization grant
>>
>> There is no user authentication. Even the resource owner password
>> credentials is not user authentication but only validation of "some grant
>> values".
>
> What's the difference from a conceptual point of view? In my opinion, the
> resource owners password is used for both, authenticating the resource owner
> and authorizing the token issuance.
>
>>
>> What you can do is define an authentication scheme which will authenticate
>> the client and provide the grant in one header, or
>
> the spec makes the grant type a required parameter, so a lonely
> authorization header won't be suffiencent.
>
>> define a new grant type for such credentials. But you can't use
>
> That brings us back to the mix between POST parameters and authz headers for
> credential transmission. Something you critized for good reasons.
>
>> something like Basic or Digest to provide the resource owner's
>> credentials. That's against the endpoint design.
>
> It's good to know that restriction, but I'm not happy :-( So based on that
> information I would say, the only proper way to integrate standard HTTP
> schemes would be to invent another endpoint for that purpose.
>
> Comments?
>
> regards,
> Torsten.
>
>>
>> EHL
>>
>>
>>> -----Original Message-----
>>> From: tors...@lodderstedt.net [mailto:tors...@lodderstedt.net]
>>> Sent: Monday, January 24, 2011 10:35 PM
>>> To: Eran Hammer-Lahav; OAuth WG
>>> Subject: AW: RE: [OAUTH-WG] How to integrated DIGEST or SPNEGO with
>>> tokensendpoint?
>>>
>>> Hi Eran,
>>>
>>> thanks for your response. My inquiry was about end-user authentication
>>> and
>>> not about client authentication. All http schemes I'm aware of
>>> authenticate
>>> users and I want to find a way to leverage them with OAuth to determine
>>> the
>>> token's identity.
>>>
>>> Regards,
>>> Torsten.
>>> Gesendet mit BlackBerry(r) Webmail von Telekom Deutschland
>>>
>>> -----Original Message-----
>>> From: Eran Hammer-Lahav <e...@hueniverse.com>
>>> Date: Mon, 24 Jan 2011 15:25:38
>>> To: Torsten Lodderstedt<tors...@lodderstedt.net>; OAuth
>>> WG<oauth@ietf.org>
>>> Subject: RE: [OAUTH-WG] How to integrated DIGEST or SPNEGO with tokens
>>> endpoint?
>>>
>>> This is pretty straight-forward. There are no special parameters to
>>> indicated
>>> which client authentication is being used. It's either there or not,
>>> using
>>> whatever the server supports.
>>>
>>> Simply have the token endpoint return a 401 with these WWW-Authenticate
>>> headers. As long as you make it clear how to make between the client
>>> identifier and the credentials used, you are set.
>>>
>>> For example, a token response can return:
>>>
>>> 401 Unauthorized
>>> WWW-Authenticate: Basic realm="example"
>>> WWW-Authenticate: Digest realm="example"
>>>
>>> There is no discovery for support for the client_id and client_secret
>>> parameters. The client can simply try it or hardcode it based on the
>>> server's
>>> documentation.
>>>
>>> Does this help?
>>>
>>> EHL
>>>
>>> > -----Original Message-----
>>> > From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf
>>> > Of Torsten Lodderstedt
>>> > Sent: Monday, January 24, 2011 1:10 PM
>>> > To: OAuth WG
>>> > Subject: [OAUTH-WG] How to integrated DIGEST or SPNEGO with tokens
>>> > endpoint?
>>> >
>>> > Hi all,
>>> >
>>> > I'm currently thinking about the integration of existing HTTP
>>> > authentication schemes with OAuth 2.0 for the purpose of end-user
>>> > authentication on the tokens endpoint. Possible candidates are "Digest"
>>> > for challenge-response-based username/password authentication and
>>> > "Spnego" for Kerberos-based authentication. Direct support for both
>>> > could be beneficially in enterprise and other security sensitive
>>> deployments.
>>> >
>>> > An direct integration with the tokens endpoint would allow to leverage
>>> > existing implementations and infrastructure for OAuth/HTTP-based
>>> > architectures. For example, HTTPClient has direct support for Spnego-
>>> > Authentication.
>>> >
>>> > Both HTTP authentication schemes use dedicated WWW-Authenticate and
>>> > Authorization headers for passing credential and other data between
>>> > client and server. OAuth in contrast uses grant types to indicate the
>>> > authentication method, credentials are passed as URI query parameters
>>> > and it lacks any discovery of available authentication methods/ grant
>>> > types.
>>> >
>>> > How could one integrate existing schemes into that design? What is our
>>> > story? Do we need to define a special grant type "HTTP authorization"?
>>> > Shall Authorization headers overrule URI parameters?
>>> >
>>> > Any ideas of the WG are higly appreciated.
>>> >
>>> > regards,
>>> > Torsten.
>>> >
>>> >
>>> >_______________________________________________
>>> > OAuth mailing list
>>> > OAuth@ietf.org
>>> > https://www.ietf.org/mailman/listinfo/oauth
>>
>
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to