Looking at the .txt version:

1. Line 260 s/authentication/authenticate

   OAuth defines two client types, based on their ability to maintain
   the confidentiality of their client credential, used to
   authentication with the authorization server:

2. Line 274 s/with with/with

   Before initiating the protocol, the client registers with with the

3. Line 508 s/denote/denotes

   the client.  The token denote an identifier used to retrieve the

4. In section 1.6, I still find it misleading to say:
   The refresh token is bound to the client it was issued to, and its usage
requires client authentication.
This still implies "public clients" can't use refresh tokens by way of the
authentication requirement. I now understand the language in section 3
regarding an authorization server's discretion with client authentication,
but I would propose either dropping ", and it's usage requires client
authentication" above, or changing it to:
    The refresh token is bound to the client it was issued to.
Authorization servers should require client authentication for private
clients when a refresh token is presented.

5. Is section 3.1 still [[Pending Consensus]] ?

6. Section 4.1.1 Authorization Request and section 4.2.1 Authorization
Request
To protect against CSRF I believe the state parameter should be REQUIRED,
unless someone can demonstrate a scenario where it is not used and CSRF is
avoided by other means.


Regards,
Shane.






From:   Eran Hammer-Lahav <e...@hueniverse.com>
To:     OAuth WG <oauth@ietf.org>
Date:   05-07-11 03:13 PM
Subject:        [OAUTH-WG] Timely review request: pre-draft-17
Sent by:        oauth-boun...@ietf.org



I have started sharing my planned changes for ­17:

https://github.com/hueniverse/draft-ietf-oauth

Change log:

https://github.com/hueniverse/draft-ietf-oauth/commit/24a48f99c204331264028
f66708427961a1bc102#diff-3


My main focus right now is to clarify client types, registration, and
identification, as well as tweak the registration requirements for
redirection URIs. This is still very raw. However, I would very much like
to get feedback about the following sections:

1.1.1.  Client Types
1.2.  Client Registration

2.1.1.  Redirection URI


In section 2.1.1, please note that it includes many new normative
requirements, but in practice, they mostly boil down to the requirement to
register a redirection URI for using the implicit grant type as well as
using the authorization code with a public client (new term for describing
client incapable of keeping secrets).

I have turned the spec around, making registered redirection URIs the
default, and using the parameter as an optional feature.

Feedback is very much appreciated as we only have a few more days before I
have to push out -17 and would like a few more eyes looking at the new
text before published.

I am still not ready to share changes to section 3. Also, I have a long
list of additional changes raised on the list.

Thanks,

EHL




_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth


_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to