Following up on the Token Revocation extension proposed at:
http://datatracker.ietf.org/doc/draft-lodderstedt-oauth-revocation/

I am suggesting three changes to this extension:

1. Either drop client authentication or make it optional. If clients
want to revoke tokens, more power to them. If it is a malicious
client, why would the authorization server deny revoking tokens?

2. Can we drop the "token_type" parameter, as suggested before?

3. "authorization server MUST also invalidate all access tokens issued
for that refresh token." can we change this MUST to a SHOULD?


In case of success, why is the server supposed to return 204 instead
of 200? Just worried that this will confuse clients.


Thanks,
Marius



On Thu, Jan 13, 2011 at 8:39 AM, Marius Scurtescu <mscurte...@google.com> wrote:
> On Wed, Jan 12, 2011 at 4:31 PM, Torsten Lodderstedt
> <tors...@lodderstedt.net> wrote:
>> Am 12.01.2011 22:19, schrieb Richer, Justin P.:
>>>
>>> Yes, let the server do the work. In practice, it's going to be looking up
>>> the token based on the token value anyway (for bearer tokens, at least). All
>>> the client really cares about is asking to "revoke this token that I am
>>> sending you". If the client credentials and token are correct and
>>> verifiable, then the revoke should go through.
>>
>> What do others think?
>
> I agree with Justin's suggestion, let the server figure the token
> type. The server should be able to do that anyhow.
>
>
>>> A client wanting to revoke both a request token and an access token will
>>> have to make several calls to this, unless you want to put in a way to put
>>> multiple token values in. I don't recommend that though, as it seems to me
>>> an optimization for a problem nobody has yet.
>>
>> the token_type does not control whether the server deletes all access tokens
>> associated with a refresh token.
>>
>> This depends on the authorization servers policy.
>
> There are cases when the server cannot revoke the access tokens
> associated with a refresh token (static access tokens for example).
> That being said, I think the server SHOULD revoke all access tokens if
> possible.
>
>
> Marius
>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to