Hi Eran,

Am 15.08.2011 08:57, schrieb Eran Hammer-Lahav:
Added to 1.4.2:

             When issuing an implicit grant, the authorization server does not 
authenticate the
             client and [[in some cases]], the client identity [[can]] be 
verified via the redirection URI
             used to deliver the access token to the client. The access token 
may be exposed to the
             resource owner or other applications with access to the resource 
owner's user-agent.

Hope this is sufficient.

What do you want to express? Clients can sometimes be verified via redirection URI?

My intention was to point out that an invalid redirect URI is a counter-evidence for a client's identity but a valid redirect URI is _not_ an evidence for its identity.

I would suggest to add the text below to section 10.1., last paragraph after the sentence

"For
   example, by requiring the registration of the client redirection URI
   or enlisting the resource owner to confirm identity."

proposed text:

Please note: while an invalid redirection URI indicates a counterfeit client, a valid redirection URI is not sufficient to confirm a client's identity.

regards,
Torsten.



EHL

-----Original Message-----
From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf
Of Eran Hammer-Lahav
Sent: Sunday, August 14, 2011 11:09 PM
To: Torsten Lodderstedt
Cc: tors...@lodderstedt-online.de; oauth@ietf.org
Subject: Re: [OAUTH-WG] redirect uri validation

Where would you suggest I add this?

EHL

-----Original Message-----
From: Torsten Lodderstedt [mailto:tors...@lodderstedt.net]
Sent: Monday, July 25, 2011 10:42 AM
To: Eran Hammer-Lahav
Cc: tors...@lodderstedt-online.de; oauth@ietf.org
Subject: Re: [OAUTH-WG] redirect uri validation

Hi Eran,

OAuth 1.0 was highly criticized for failing to address client
identity in public clients. I believe OAuth 2.0 offers a much
better story, within the boundaries>of what’s possible today.
Agreed. I think we must honestly discuss the value of client
authentication/identification itself. I personally think it is
over-emphazised right now. The strength of OAuth 2.0 is that it
allows solutions where neither client nor resource server have
access or
do store end-user credentials.
Client authentication is nice but not the main feature.
Do you have any specific suggestions not already mentioned on the list?
I would suggest to mention that while an invalid redirect_uri
indicates a counterfeit clients a valid redirect does not prove the calling
client's identity.
regards,
Torsten.


EHL

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to