By #3 Hannes meant defining another option in the spec, not just allowing it to 
be defined elsewhere.

EHL

> -----Original Message-----
> From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf
> Of Phillip Hunt
> Sent: Friday, February 18, 2011 10:22 AM
> To: Hannes Tschofenig
> Cc: OAuth WG
> Subject: Re: [OAUTH-WG] Client Assertion Credentials (again)
> 
> You can put in client_assertion but also leave the 'other' credential option
> there as well
> 
> Phil
> 
> Sent from my phone.
> 
> On 2011-02-18, at 10:17, Hannes Tschofenig <hannes.tschofe...@gmx.net>
> wrote:
> 
> > Hi all,
> >
> > I asked for feedback regarding the removal of the client assertion
> > credentials earlier this month, see
> > http://www.ietf.org/mail-archive/web/oauth/current/msg05261.html
> >
> > Unfortunately, the feedback did not lead to any new insight other than
> there are three groups of people:
> > 1) Those who want the functionality removed from the draft
> > 2) Those who want it to be included.
> > 3) Those who want something different in the document (namely a
> stronger version).
> >
> > These three groups are equally large (based on the feedback).
> >
> > I have attached the text from version -11 of the draft.
> >
> > So, my suggestion to the group therefore is for those who are interested in
> this functionality in one way or the other to provide text that the group can
> agree with in time before we submit the document to the IESG (1).
> > If that does not happen the client assertion credential will have to be
> developed as a separate document (if there is enough energy and interest in
> the group).
> >
> > A note regarding (1): Currently, the security consideration section is 
> > missing
> since otherwise the document is ready for a working group last call (in my
> view).
> > So, once that is there and agreed I will start a working group last call.
> >
> > Ciao
> > Hannes
> >
> > -----
> >
> > 3.2.  Client Assertion Credentials
> >
> >   The client assertion credentials are used in cases where a password
> >   (clear-text shared symmetric secret) is unsuitable or does not
> >   provide sufficient security for client authentication.  In such cases
> >   it is common to use other mechanisms such as HMAC or digital
> >   signatures that do not require sending clear-text secrets.  The
> >   client assertion credentials provide an extensible mechanism to use
> >   an assertion format supported by the authorization server for
> >   authentication the client.
> >
> >   Using assertions requires the client to obtain an assertion (such as
> >   a SAML [OASIS.saml-core-2.0-os] assertion) from an assertion issuer
> >   or to self-issue an assertion.  The assertion format, the process by
> >   which the assertion is obtained, and the method of validating the
> >   assertion are defined by the assertion issuer and the authorization
> >   server, and are beyond the scope of this specification.
> >
> >   When using a client assertion, the client includes the following
> >   parameters:
> >
> >   client_assertion_type  REQUIRED.  The format of the assertion as
> >         defined by the authorization server.  The value MUST be an
> >         absolute URI.
> >
> >   client_assertion  REQUIRED.  The client assertion.
> >
> >   For example, the client sends the following access token request
> >   using a SAML 2.0 assertion to authenticate itself (line breaks are
> >   for display purposes only):
> >
> >
> >     POST /token HTTP/1.1
> >     Host: server.example.com
> >     Content-Type: application/x-www-form-urlencoded
> >
> >     grant_type=authorization_code&code=i1WsRn1uB1&
> >     client_assertion=PHNhbWxwOl[...omitted for brevity...]ZT4%3D&
> >     client_assertion_type=
> >     urn%3Aoasis%3Anames%sAtc%3ASAML%3A2.0%3Aassertion&
> >     redirect_uri=https%3A%2F%2Fclient%2Eexample%2Ecom%2Fcb
> >
> >
> >   When obtaining an access token using a client assertion together with
> >   an authorization code (as described in  Section 5.1.1), a mechanism is
> >   needed to map between the value of "client_id" parameter used to
> >   obtain the authorization code, and the client assertion.  Such
> >   mechanism is beyond the out of scope for this specification, but MUST
> >   be specified for any client assertion type used in combination with
> >   an authorization code.
> >
> >   The authorization server MUST reject access token requests using
> >   client assertion credentials that do not contain HMAC or signed
> >   values that:
> >
> >   o  State the assertion was specifically issued to be consumed by the
> >      receiving endpoint (typically via an audience or recipient value
> >      containing the receiving endpoint's identifier).
> >
> >   o  Identify the entity that issued the assertion (typically via an
> >      issuer value).
> >
> >   o  Identify when the assertion expires as an absolute time (typically
> >      via an expiration value containing a UTC date/time value).  The
> >      authorization server MUST reject expired assertions.
> >
> >
> >
> >
> >
> >
> >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to