I had assumed a use case for this was an entirely browser-based client. Such a 
client would be limited to same-host requests. Providing a proxy to make token 
requests just opens the possibility of abuse of client proxies with poor 
security practices - and for no added value. If a client can't secure 
credentials, there's no point in a second round trip. As such, simplify the 
model and, in the process, emphasize the loss of of a layer of security in the 
flow.

In principle, I favor reserving separate flows for credential vs. 
credential-less apps. However, in practice, I see providers evangelizing one 
flow when there are a mix of apps with credentials and those without (eg, mix 
of device & hosted apps in the ecosystem) and thus no need to restrict the code 
flow only to clients with secrets. One flow is enough complication when there 
is provider-specific complexity to explain as well. The implicit flow, then, 
seems appropriate for providers who never issue secret client credentials.

Better use cases anyone?


On Mar 1, 2011, at 2:24 AM, Eran Hammer-Lahav wrote:

> One more round trip is often too slow.
> 
> EHL
> 
>> -----Original Message-----
>> From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf
>> Of Phil Hunt
>> Sent: Monday, February 28, 2011 3:18 PM
>> To: Marius Scurtescu
>> Cc: OAuth WG
>> Subject: Re: [OAUTH-WG] Draft -12 feedback deadline
>> 
>> Given these questions, I am wondering, why does the Implicit Grant flow
>> NOT have an authorization code step?  Having one, would keep architecture
>> of AS and TS clearly separate.
>> 
>> One down side is that issuing of access/refresh token would now have to be
>> opened to SHOULD authenticate the client from MUST.
>> 
>> What was the original case for this flow?  That should point us as to why the
>> separate flow and whether refresh makes sense given the higher risks of the
>> implicit flow.
>> 
>> Phil
>> phil.h...@oracle.com
>> 
>> 
>> 
>> 
>> On 2011-02-28, at 2:58 PM, Marius Scurtescu wrote:
>> 
>>> On Mon, Feb 28, 2011 at 12:16 PM, Igor Faynberg
>>> <igor.faynb...@alcatel-lucent.com> wrote:
>>>> +1
>>>> 
>>>> Igor
>>>> 
>>>> Torsten Lodderstedt wrote:
>>>>> 
>>>>> ...
>>>>> 
>>>>> I'm in favour to add the refresh token parameter to the implicit
>>>>> grant flow as it would make it more useable for native apps.
>>> 
>>> I think it is much safer to go with refresh tokens only sent
>>> indirectly through an authorization code swap.
>>> 
>>> Implicit grant with refresh token also has no client secret swap and
>>> makes things worse by passing the refresh token through the browser.
>>> 
>>> Marius
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>> 
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to