Hi Doug,

Am 19.05.2011 04:09, schrieb Doug Tangren:
Followup questions from draft 16

1. On storing user password for the resource owner creds flow. If the client stores a access token along with the refresh token [1] to refresh it, there should be no need to store the users password as mentioned here [2] right?

Yes. That's what meant with "It reduces the overall risk of storing username and password in the client".


2. What value does adding the client password to a basic auth encoded header with duplicated client_id info add? [3]

The goal is a cleaner protocol design. The protocol design separates client identification as part of the flow (URI parameter) and originator authentication. While the client_id parameter is required, the authentication can be omitted (unauthenticated access) or performed using other authentication mechanisms. And such mechanisms not neccessarily use client_id's. Moreover, the spec just says, "The authorization server MUST ensure the two identifiers belong to the same client". So the client_id's (request parameter and header) may differ.

<someone else should answer questions 3-5, pls.>


6. Native modified usage of the auth code flow - "Native
applications SHOULD use the authorization code grant type
flow without client password credentials (due to their
inability to keep the credentials confidential) to obtain short-lived
access tokens, and
use refresh tokens to maintain access" [7]

The issue was brought up earlier that clients the implicit flow should not be issued a refresh token because there'd be no way for the server to identify the client without the client secret. Here its suggested they do just that. Does this mean there may be a step added in the implicit flow in the future that will enable the client to refresh their access token without involving the user if the user has already chosen to authorize the app?

The text recommends to use the authorization code grant type not the implicit grant.

regards,
Torsten.

Those are some of the things that jump out at me. I'll read if a few more times so see if anything else comes up.

I'm happy to see this is all coming together! This is great work.

[1]: http://tools.ietf.org/html/draft-ietf-oauth-v2-16#section-4.3.3
[2]: http://tools.ietf.org/html/draft-ietf-oauth-v2-16#section-10.12
[3]: http://tools.ietf.org/html/draft-ietf-oauth-v2-16#section-3.1
[4]: http://tools.ietf.org/html/draft-ietf-oauth-v2-16#section-1.5
[5]: http://tools.ietf.org/html/draft-ietf-oauth-v2-16#section-2.2
[6]: http://tools.ietf.org/html/draft-ietf-oauth-v2-16#section-4.3.2
[7]: http://tools.ietf.org/html/draft-ietf-oauth-v2-16#section-9

-Doug Tangren
http://lessis.me



_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to