The only challenge is to know what scheme to use and what the nuances are of how to present the credential.
> -----Original Message----- > From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf > Of Phil Hunt > Sent: Friday, February 04, 2011 9:42 AM > To: Marius Scurtescu > Cc: OAuth WG > Subject: Re: [OAUTH-WG] Bearer token type and scheme name (deadline: > 2/10) > > OAuth should be able to support other token schemes. > > Or conversely you don't have to have OAuth to use MAC, JWT, or > whatever. > > Phil > phil.h...@oracle.com > > > > > On 2011-02-04, at 9:39 AM, Marius Scurtescu wrote: > > > On Thu, Feb 3, 2011 at 11:39 AM, Eran Hammer-Lahav > <e...@hueniverse.com> wrote: > >> Hey Marius, > >> > >>> -----Original Message----- > >>> From: Marius Scurtescu [mailto:mscurte...@google.com] > >>> Sent: Thursday, February 03, 2011 10:36 AM > >>> To: Eran Hammer-Lahav > >>> Cc: OAuth WG > >>> Subject: Re: [OAUTH-WG] Bearer token type and scheme name > (deadline: > >>> 2/10) > >>> > >>> On Thu, Feb 3, 2011 at 12:34 AM, Eran Hammer-Lahav > >>> <e...@hueniverse.com> wrote: > >>> > >>>> 2. Single OAuth2 scheme with sub-schemes > >>>> > >>>> Define a single authentication scheme for all token types with > some > >>>> attribute used to detect which scheme is actually being used. > >>>> > >>>> Benefits: > >>>> > >>>> - single scheme, reuse of the 1.0 pattern. > >>>> > >>>> Downsides: > >>>> > >>>> - requires a new registry for authentication header parameters. > >>> > >>> How is this different from option 1? Wouldn't that need some > registry? > >> > >> #1 relies on the existing practice of creating HTTP scheme names (no > current registry but httpbis might be creating one), as well as the -12 > token type registry. Using a sub-scheme means you also need a registry > for the header attributes that each token type will need (unless you > just don't care about using the same attribute name for different > needs). > > > > Sure, there is no registry for schemes yet, but we would still need > > some coordination. The fact that a sub-scheme needs a registry that > we > > control is a benefit not a downside IMO. > > > > > >>>> - schemes are not easily reusable outside OAuth. > >>> > >>> Sure. But I really don't see this group trying to create generic > authentication > >>> schemes. > >> > >> MAC is exactly that. > > > > May or may not be. My point is that this group is not focused on > > creating generic authentication schemes. Are you aware of any other > > protocols that might use MAC or BEARER? Are we willing to put in the > > effort to create generic schemes? Is it our charter? > > > > > >>>> - existing frameworks usually switch on scheme name, not on sub > >>>> scheme, which will cause difficulty in some deployments. > >>> > >>> I can see this as a potential problem. But considering that there > wasn't much > >>> objection to use "OAuth" as a scheme name before (total overlap > with > >>> OAuth 1, and the suggested solution was to look for the signature > >>> parameter) I don't see how this is suddenly an issue. > >> > >> There was pretty strong objection to reusing OAuth. > > > > Yes, because there was no sub-scheme nor version (and the grammar was > > totally broken). Even so, lots of implementations went ahead and did > > it. Were there any scheme switching issues we are aware of? > > > > > >>> Do we have a concrete problem here or this is just theoretical? > >> > >> This came up during the review of draft-hammer-http-token-auth [1]. > There was a long thread about it where people posted actual framework > issues. > >> > >>>> - potential to produce a very complicated scheme once many sub > schemes > >>>> are added. > >>> > >>> Why? I would argue that this option actually produces more uniform > >>> schemes because it forces all of them to be name/value pairs. > Beyond > >>> token_type everything is scheme specific. I really don't see what > is very > >>> complicate here. > >> > >> It is still a single scheme with many different sub-schemes, each > with different key-value pairs that may have conflicting meaning. The > way I look at it is that if I try to fully implement this mega scheme > (which means all its sub-schemes), it will likely be a complicated > task. On the other hand, if you split it across scheme name, we already > have a well-established system in place to pick and choose HTTP > authentication schemes. > > > > No one has to implement a mega scheme. All schemes must use > name/value > > pairs and that's where the common part stops. > > > > > >>>> - requires its own discovery method for which schemes are > supported. > >>> > >>> Why is this a downside only for this option? > >> > >> Because the other options get this for free by using the WWW- > Authenticate header (since each scheme has a unique name). You can list > multiple headers in the 401 response. > > > > I thought we dropped WWW-Authenticate. Why cannot WWW-Authenticate > > work for sub-schemes as well? > > > > > >> Should I record your vote for #2? > > > > #2 or #3 > > > > > > Thanks, > > Marius > > _______________________________________________ > > OAuth mailing list > > OAuth@ietf.org > > https://www.ietf.org/mailman/listinfo/oauth > > _______________________________________________ > OAuth mailing list > OAuth@ietf.org > https://www.ietf.org/mailman/listinfo/oauth _______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth