First up, nice work with the latest version ­ it¹s considerably easier to
follow than previous version. Based on a simple attempt to implement a
compliant authentication server, I have the following requests for
clarification:

1. The error response mechanism for the authorization endpoint depends on
the response_type being requested. Assuming that the client and redirect URI
are valid, the endpoint might place the error information in the query
string (for repsonse_type ³code², section 4.1.2.1) or in the fragment (for
response type ³token², section 4.2.2.1). I believe it is ambiguous what
should be done if the response_type is missing, or invalid. Clarification
would be appreciated.
2. The error response for the authorization endpoint is directed to include
the state, if a state were supplied in the request (sections 4.1.2.1,
4.2.2.1). Assuming that including multiple state parameters in the request
makes the request malformed, how should the server include state in the
error response if the request contains multiple state parameters? I could
see justifications for a number of options (not including the state,
including all the state parameters, including just the first state
parameter, etc). Clarification would be appreciated. Note that, if multiple
state parameters may be legally included in the request, this same question
applies to the grant response, rather than the error response.
3. I believe that section 5.2 is ambiguous as to the error code that should
be returned from the token endpoint when the client credentials are valid,
when the client is authorized to use the authorization code grant type in
general, but when the authorization code supplied is not valid for the
client. I could see unauthorized_client being right, but the wording of the
section doesn¹t include the exact case above. Please clarify.
4. I believe that section 5.2 is ambiguous as to the error code that should
be returned from the token endpoint when the grant type is ³password², and
the resource owner¹s credentials are invalid. Section 4.3.3 implies that
such a request is ³invalid², suggesting that invalid_request is the correct
response, but section 5.2 could be clearer on this. Please clarify.

In addition, I wonder if the authors have given any thought to the
applicability of the protocol in a federated authentication domain
environment, for example where the authorization endpoint and token
endpoints are on different servers that retain a trust relationship with
each other. Clearly, in this case, the format of the authorization code is
an integration point, much in the same way as the access token is in the
currently provided use cases. Whereas a number of access token formats are
provided in companion specifications, I see no references for authorization
codes. Any thoughts on this would be gratefully received.

Mark.
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to