I was thinking more about how the client knows what to use.  The ubiquitous 
"service documentation" may come in to play here.  Some form of serv ice 
discovery/webfinger thing could also be used.

> -----Original Message-----
> From: Phil Hunt [mailto:phil.h...@oracle.com]
> Sent: Friday, February 04, 2011 11:37 AM
> To: William Mills
> Cc: Marius Scurtescu; OAuth WG
> Subject: Re: [OAUTH-WG] Bearer token type and scheme name (deadline:
> 2/10)
> 
> Yes. This should be defined in each token type specification.
> 
> Phil
> phil.h...@oracle.com
> 
> 
> 
> 
> On 2011-02-04, at 11:29 AM, William Mills wrote:
> 
> > The only challenge is to know what scheme to use and what the nuances
> are of how to present the credential.
> >
> >> -----Original Message-----
> >> From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On
> Behalf
> >> Of Phil Hunt
> >> Sent: Friday, February 04, 2011 9:42 AM
> >> To: Marius Scurtescu
> >> Cc: OAuth WG
> >> Subject: Re: [OAUTH-WG] Bearer token type and scheme name (deadline:
> >> 2/10)
> >>
> >> OAuth should be able to support other token schemes.
> >>
> >> Or conversely you don't have to have OAuth to use MAC, JWT, or
> >> whatever.
> >>
> >> Phil
> >> phil.h...@oracle.com
> >>
> >>
> >>
> >>
> >> On 2011-02-04, at 9:39 AM, Marius Scurtescu wrote:
> >>
> >>> On Thu, Feb 3, 2011 at 11:39 AM, Eran Hammer-Lahav
> >> <e...@hueniverse.com> wrote:
> >>>> Hey Marius,
> >>>>
> >>>>> -----Original Message-----
> >>>>> From: Marius Scurtescu [mailto:mscurte...@google.com]
> >>>>> Sent: Thursday, February 03, 2011 10:36 AM
> >>>>> To: Eran Hammer-Lahav
> >>>>> Cc: OAuth WG
> >>>>> Subject: Re: [OAUTH-WG] Bearer token type and scheme name
> >> (deadline:
> >>>>> 2/10)
> >>>>>
> >>>>> On Thu, Feb 3, 2011 at 12:34 AM, Eran Hammer-Lahav
> >>>>> <e...@hueniverse.com> wrote:
> >>>>>
> >>>>>> 2. Single OAuth2 scheme with sub-schemes
> >>>>>>
> >>>>>> Define a single authentication scheme for all token types with
> >> some
> >>>>>> attribute used to detect which scheme is actually being used.
> >>>>>>
> >>>>>> Benefits:
> >>>>>>
> >>>>>> - single scheme, reuse of the 1.0 pattern.
> >>>>>>
> >>>>>> Downsides:
> >>>>>>
> >>>>>> - requires a new registry for authentication header parameters.
> >>>>>
> >>>>> How is this different from option 1? Wouldn't that need some
> >> registry?
> >>>>
> >>>> #1 relies on the existing practice of creating HTTP scheme names
> (no
> >> current registry but httpbis might be creating one), as well as the
> -12
> >> token type registry. Using a sub-scheme means you also need a
> registry
> >> for the header attributes that each token type will need (unless you
> >> just don't care about using the same attribute name for different
> >> needs).
> >>>
> >>> Sure, there is no registry for schemes yet, but we would still need
> >>> some coordination. The fact that a sub-scheme needs a registry that
> >> we
> >>> control is a benefit not a downside IMO.
> >>>
> >>>
> >>>>>> - schemes are not easily reusable outside OAuth.
> >>>>>
> >>>>> Sure. But I really don't see this group trying to create generic
> >> authentication
> >>>>> schemes.
> >>>>
> >>>> MAC is exactly that.
> >>>
> >>> May or may not be. My point is that this group is not focused on
> >>> creating generic authentication schemes. Are you aware of any other
> >>> protocols that might use MAC or BEARER? Are we willing to put in
> the
> >>> effort to create generic schemes? Is it our charter?
> >>>
> >>>
> >>>>>> - existing frameworks usually switch on scheme name, not on sub
> >>>>>> scheme, which will cause difficulty in some deployments.
> >>>>>
> >>>>> I can see this as a potential problem. But considering that there
> >> wasn't much
> >>>>> objection to use "OAuth" as a scheme name before (total overlap
> >> with
> >>>>> OAuth 1, and the suggested solution was to look for the signature
> >>>>> parameter) I don't see how this is suddenly an issue.
> >>>>
> >>>> There was pretty strong objection to reusing OAuth.
> >>>
> >>> Yes, because there was no sub-scheme nor version (and the grammar
> was
> >>> totally broken). Even so, lots of implementations went ahead and
> did
> >>> it. Were there any scheme switching issues we are aware of?
> >>>
> >>>
> >>>>> Do we have a concrete problem here or this is just theoretical?
> >>>>
> >>>> This came up during the review of draft-hammer-http-token-auth
> [1].
> >> There was a long thread about it where people posted actual
> framework
> >> issues.
> >>>>
> >>>>>> - potential to produce a very complicated scheme once many sub
> >> schemes
> >>>>>> are added.
> >>>>>
> >>>>> Why? I would argue that this option actually produces more
> uniform
> >>>>> schemes because it forces all of them to be name/value pairs.
> >> Beyond
> >>>>> token_type everything is scheme specific. I really don't see what
> >> is very
> >>>>> complicate here.
> >>>>
> >>>> It is still a single scheme with many different sub-schemes, each
> >> with different key-value pairs that may have conflicting meaning.
> The
> >> way I look at it is that if I try to fully implement this mega
> scheme
> >> (which means all its sub-schemes), it will likely be a complicated
> >> task. On the other hand, if you split it across scheme name, we
> already
> >> have a well-established system in place to pick and choose HTTP
> >> authentication schemes.
> >>>
> >>> No one has to implement a mega scheme. All schemes must use
> >> name/value
> >>> pairs and that's where the common part stops.
> >>>
> >>>
> >>>>>> - requires its own discovery method for which schemes are
> >> supported.
> >>>>>
> >>>>> Why is this a downside only for this option?
> >>>>
> >>>> Because the other options get this for free by using the WWW-
> >> Authenticate header (since each scheme has a unique name). You can
> list
> >> multiple headers in the 401 response.
> >>>
> >>> I thought we dropped WWW-Authenticate. Why cannot WWW-Authenticate
> >>> work for sub-schemes as well?
> >>>
> >>>
> >>>> Should I record your vote for #2?
> >>>
> >>> #2 or #3
> >>>
> >>>
> >>> Thanks,
> >>> Marius
> >>> _______________________________________________
> >>> OAuth mailing list
> >>> OAuth@ietf.org
> >>> https://www.ietf.org/mailman/listinfo/oauth
> >>
> >> _______________________________________________
> >> OAuth mailing list
> >> OAuth@ietf.org
> >> https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to