> -----Original Message-----
> From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf
> Of Brian Campbell
> Sent: Thursday, July 07, 2011 12:06 PM
> To: oauth
> Subject: [OAUTH-WG] SAML Assertion Draft Items
> 
> WG,
> 
> Unfortunately I will not be at IETF#81 and will probably not be able to post a
> new draft of draft-ietf-oauth-saml2-bearer prior to the I-D submission cutoff
> date.  In lieu of that, I'd like to make a few proposals and/or ask a few
> questions regarding the next draft in hopes of fostering some productive
> discussion.
> 
> Item 1: Profiling of draft-ietf-oauth-assertions Assuming the WG continues to
> support draft-ietf-oauth-assertions, the SAML draft should become a
> profile/extension of it.  For SAML as a grant type, that should be easy and
> even shorten/simplify this draft.
> 
> However, the SAML draft does not currently cover SAML for client
> authentication and profiling draft-ietf-oauth-assertions would suggest that it
> should.  Is there any general consensus as to if SAML should be profiled as a
> client authentication method?  It is certainly feasible but might require
> restructuring and retitling the draft.

Are there use cases pending such functionality today? It would be a shame to 
delay an otherwise useful draft when the functionality can be added later.

> Item 2: URI(s)
> The value for grant_type is currently defined as
> http://oauth.net/grant_type/saml/2.0/bearer but there have been some
> questions raised about the stability and appropriateness of the URL.

I'm not a fan. 

> I really did read RFCs 2648 & 3553, as was suggested at the last F2F meeting,
> but it's not clear to me how to register an IETF URI and/or if those RFCs are
> fully appropriate for this.  If someone could explain it to me in terms my
> preschooler could understand, maybe I could jump though the proper hoops
> to get the URI to be something like urn:ietf:something:something.

Asking on the URN list usually helps.

> Otherwise, I can continue to use
> http://oauth.net/grant_type/saml/2.0/bearer and, assuming the draft
> should also cover client authentication, also define
> http://oauth.net/client_assertion_type/saml/2.0/bearer.  The JWT version
> could then follow a similar pattern.  Or perhaps we could use the URI,
> urn:oasis:names:tc:SAML:2.0:cm:bearer which is defined in section 3.3 of
> saml-profiles-2.0-os as URI that identifies the bearer subject confirmation
> method.  It seems like that might be close enough to work out without
> violating anything serious.  And it could be used for both grant_type and
> client_assertion_type, which is nice.

Don't use an OASIS URN. That's asking for trouble.

EHL
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to