+1 Eran
On Fri, Jun 17, 2011 at 12:46 AM, Eran Hammer-Lahav <e...@hueniverse.com> wrote:
> OAuth has been successful because of its simple architecture and because it 
> is based on actual deployment experience. Offering multi-token responses 
> would be premature standardization. I am not convinced that adding it later 
> would entail any real technical difficulty.
>
> EHL
>
>> -----Original Message-----
>> From: Torsten Lodderstedt [mailto:tors...@lodderstedt.net]
>> Sent: Friday, June 17, 2011 12:41 AM
>> To: Eran Hammer-Lahav
>> Cc: Manger, James H; OAuth WG
>> Subject: Re: [OAUTH-WG] issuing multiple tokens
>>
>> this is kind of a self-fulfilling prophecy. If we do not encourage 
>> implementors
>> to use service-specific tokens by supporting it in OAuth most people will not
>> consider it.
>>
>> As James pointed out, there are good reasons to use service-specific tokens
>> in multi-service environments. That's why Deutsche Telekom employs a strict
>> security policy to use different tokens for different services. And as a 
>> multi-
>> service provider an increasing percentage of our apps need to access
>> multiple services. That's why we have implemented support for issuing
>> multiple tokens in a single authorization flow. We will have this feature in
>> production before IETF-81.
>>
>> regards,
>> Torsten.
>>
>> Zitat von Eran Hammer-Lahav <e...@hueniverse.com>:
>>
>> > I'm standing behind my 99.99% projection for the next 5 years.
>> >
>> > EHL
>> >
>> > From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf
>> > Of Manger, James H
>> > Sent: Thursday, June 16, 2011 9:04 PM
>> > To: OAuth WG
>> > Subject: Re: [OAUTH-WG] issuing multiple tokens
>> >
>> >> [Issuing multiple tokens] is not an important enough feature.
>> >> Parsing an array response when
>> >> 99.99% will be a single object array is annoying.
>> >
>> > I would agree... if I believed the 99.99%, but not if it will be 80%
>> > and falling in a year or two.
>> >
>> > A major benefit of OAuth2 is that resource servers only handle
>> > limited-lifetime, limited-capability access tokens so there is limited
>> > damage and easier recovery if one resource service is compromised. If
>> > the same access token works at all the resource servers that a client
>> > app uses, then an attacker that compromises one resource server can
>> > re-use the access tokens elsewhere. The bigger your portfolio of
>> > services, the worse the risk.
>> >
>> >> Also, what would you return in case of error? A single object?
>> >
>> > Yes. It is not that hard to test if JSON.parse(...) returns an array
>> > or a single object with an error field, or to notice the 4xx status
>> > code.
>> >
>> >> What is the client supposed to do if it gets an empty array?
>> >
>> > The delegation succeeded, but you don't need to use temporary
>> > credentials (perhaps client auth is sufficient, perhaps a [MAC] cookie
>> > was issued, perhaps the service is using URIs-as-capabilities...).
>> > Continue on to use the API.
>> >
>> >> Array with more than one token?
>> >
>> > If the client app hasn't bothered to write the extra code to handle
>> > multiple tokens then it just uses the first token. If separate tokens
>> > are now needed for servers that previously shared the same token, then
>> > the service has made a deliberate decision to increase security in a
>> > way that wasn't backwardly compatible.
>> >
>> >> *This* would be the hack... If this is something people want to
>> >> deploy, a full proposal end-to-end is required. And not now.
>> > I few proposals have been made in the past. Some try hard to leave the
>> > single token case alone, but always at a cost to complexity: eg the
>> > first token needs to be handled differently to the other tokens.
>> >
>> >
>> > Responding to William Mills' comments:
>> >>> Probably defining a token type of "multiple_tokens" would be my
>> preference,
>> >>> and if you get that back then you have to parse an array of {type,
>> token}*.
>> >>>  What that array looks like could be JSON in the payload, or
>> >>> something else.
>> >>>  That leaves the single token use case alone.
>> >
>> > This is a good example of how it is awkward to add multiple token
>> > support later.
>> > With this suggestion a service that starts issuing multiple tokens
>> > (eg for clients to access an enhanced version of an API) can't just
>> > add an extra token for the enhanced API that old clients will
>> > ignore. Instead, it has to change the top-level token_type, which
>> > will fail in all old clients. It also leaves other top-level
>> > mandatory fields such as access_token with confusing semantics.
>> >
>> >
>> > --
>> > James Manger
>> >
>>
>>
>>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to