This feels right to me. Additionally, any client consuming multiple tokens
(whcih would be new) shoudl be able to add something onto the token request
indicating they are capable of such. This means we never break existing
clients.
________________________________
From: Justin Richer <jric...@mitre.org>
To: oauth@ietf.org
Sent: Friday, June 17, 2011 12:15 PM
Subject: Re: [OAUTH-WG] issuing multiple tokens
Incidentally, I'd like to clarify my position that the below or any
other kind of multi-token formatting doesn't belong in the core
spec.
-- Justin
On 6/17/2011 9:46 AM, Justin Richer wrote:
I completely agree that the single-token case needs to be left alone, and I
rather like this idea. The AS would return something like:
>
>{
> access_token: [
> {
> access_token: "1234656",
> expires_in: 3600,
> token_type: bearer
> },
> {
> access_token: "abcdefg",
> expires_in: 3600,
> token_type: MAC,
> mac_stuff: "goes_here"
> }
> ],
> token_type: multiple
>}
>
>This would not only let clients who are doing the common one-token
flow ignore the "multiple" token type, it would also allow for
re-use of token storage libraries for the inner token bits. And
you could go crazy and pass a multiple token full of multiple
tokens, too. It's turtles all the way down!
>
> -- Justin
>
>On 6/16/2011 7:23 PM, William J. Mills wrote:
>Probably defining a token type of "multiple_tokens" would be my preference,
>and if you get that back then you have to parse an array of {type, token}*.
>What that array looks like could be JSON in the payload, or something else.
>That leaves the single token use case alone.
>>
>>
>>
>>
>>________________________________
>>From: Eran Hammer-Lahav <e...@hueniverse.com>
>>To: Phil Hunt <phil.h...@oracle.com>; "Manger, James H"
>><james.h.man...@team.telstra.com>
>>Cc: OAuth WG <oauth@ietf.org>
>>Sent: Wednesday, June 15, 2011 10:46 PM
>>Subject: Re: [OAUTH-WG] issuing multiple tokens
>>
>>It is not an important enough feature. Parsing an array
response when 99.99% will be a single object array is
annoying. Also, what would you return in case of error? A
single object? What is the client supposed to do if it
gets an empty array? Array with more than one token?
>>
>>*This* would be the hack... If this is something people
want to deploy, a full proposal end-to-end is required.
And not now.
>>
>>EHL
>>
>>
>>> -----Original Message-----
>>> From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf
>>> Of Phil Hunt
>>> Sent: Wednesday, June 15, 2011 10:40 PM
>>> To: Manger, James H
>>> Cc: OAuth WG
>>> Subject: Re: [OAUTH-WG] issuing multiple tokens
>>>
>>> +1
>>>
>>> Phil
>>>
>>> @independentid
>>> www.independentid.com
>>> phil.h...@oracle.com
>>>
>>>
>>>
>>>
>>>
>>> On 2011-06-15, at 10:01 PM, Manger, James H wrote:
>>>
>>> > Torsten Lodderstedt needs to issue multiple
tokens; Igor Faynberg said +1
>>> to that; John Bradley identified that OpenID Connect
needs to request
>>> multiple tokens; Eran Hammer-Lahav even mentioned a
no-token flow as
>>> something that could make sense; ...
>>> >
>>> > Issuing 0, 1 or more tokens looks like an
important enough feature to fix
>>> now, instead of trying to hack it in after the spec
is finalised.
>>> >
>>> >
>>> > Changing the access token response [5.1] to be a
JSON array of JSON
>>> objects (one JSON object per issued token) seems like
a simple way to get
>>> this important functionality -- with very limited
overhead for services that will
>>> only ever issue a single token, and client written
just for those services.
>>> >
>>> > P.S. Does Facebook return a JSON object for its
access token response (as
>>> in draft-ietf-oauth-v2-12 that they reference), or
x-www-form-urlencoded
>>> as the example at http://developers.facebook.com/docs/authentication/
>>> implies [4th screen shot down]?
>>> >
>>> > --
>>> > James Manger
>>> >
>>> >
>>> > Eran said (on a different thread):
>>> >
>>> > ...if the client can authenticate with the
authorization server. Why not just
>>> include the client identifier and user identifier and
let the authorization
>>> server lookup what the user already authorized?
>>> >
>>> >
>>> > Igor Faynberg wrote:
>>> >
>>> > +1
>>> >
>>> > Torsten Lodderstedt wrote:
>>> >> Hi,
>>> >>
>>> >> I also see the need to request and issue
multiple tokens in a single
>>> >> authorization process. There has already
been some discussion about
>>> >> this topic roughly a year ago:
>>> >> - http://www.ietf.org/mail-archive/web/oauth/current/msg02688.html.
>>> >> - http://www.ietf.org/mail-archive/web/oauth/current/msg03639.html
>>> >>
>>> >> We at Deutsche Telekom have implemented an
OAuth 2.0 extension
>>> >> supporting that use case. It's called "bulk
authorization".
>>> >>
>>> >> Would that be an interessting topic we could
discuss at IETF-81 for
>>> >> the re-chartering? I could present our
approach there.
>>> >>
>>> >> regards,
>>> >> Torsten.
>>> >
>>> >> Am 10.06.2011 21:08, schrieb John Bradley:
>>> >>> We have identified the need to request
multiple tokens as one issue
>>> >>> that we would have to extend.
>>> > _______________________________________________
>>> > OAuth mailing list
>>> > OAuth@ietf.org
>>> > https://www.ietf.org/mailman/listinfo/oauth
>>>
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>_______________________________________________
>>OAuth mailing list
>>OAuth@ietf.org
>>https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>>
>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth