Marius

Isn't the risk of the refresh token leaking the same as the risk of the
access token leaking, i.e. why not provide both? IMO, the refresh token
just provides a server side mechanism for revoking access, where resource
servers are distributed, through having short lived access tokens

Of course, the refresh access token flow currently requires a secret so
would need to be changed or alternative flow introduced. Will wait for
details of how auth code flow can be used


Mark
e-mail: mark.mcgl...@ie.ibm.com


oauth-boun...@ietf.org wrote on 16/02/2011 21:38:45:

> Marius Scurtescu <mscurte...@google.com>
> Sent by: oauth-boun...@ietf.org
>
> 16/02/2011 21:38
>
> To
>
> Eran Hammer-Lahav <e...@hueniverse.com>
>
> cc
>
> OAuth WG <oauth@ietf.org>
>
> Subject
>
> Re: [OAUTH-WG] Draft -12 feedback deadline
>
> On Wed, Feb 16, 2011 at 12:28 PM, Eran Hammer-Lahav
> <e...@hueniverse.com> wrote:
> > The reason why we don't return a refresh token in the implicit
> grant is exactly because there is no client authentication...
>
> Not sure that's the main reason. AFAIK it is because the response is
> sent through the user-agent and it could leak.
>
>
> > These are all well-balanced flows with specific security
> properties. If you need something else, even if it is just a tweak,
> it must be considered a different flow. That doesn't mean you need
> to register a new grant type, just that you are dealing with
> different implementation details unique to your server.
>
> The Authorization Code flow, with no client secret, is perfectly fine
> for Native Apps IMO.
>
> Marius
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to