Hopefully to make it more compatible with existing OAuth 2 libraries. At least leave open the possibility of dealing with it at a higher level.
The argument has been made that you probably need to modify the library anyway to check that the duplicate parameters are a match. If there is consensus that the parameters should only be in the JSON then we would happily not duplicate them. It is mostly a case of trying to fit in to the existing OAuth work and libraries. John B. On 2011-10-27, at 2:22 AM, Torsten Lodderstedt wrote: > why is it neccessary to duplicate the OAuth request parameters? > > Am 27.10.2011 00:31, schrieb John Bradley: >> >> Nat and I just refreshed the I-D for draft-sakimura-oauth-requrl. >> >> It is essentially a standardization of the method we are using in openID >> Connect to make signed requests to the Authorization server. >> >> We do have the issue that parameters in the signed/encrypted request >> necessarily duplicate the query parameters to keep it a valid OAuth request >> plus an extension. >> >> Even if it doesn't wind up as a OAuth WG item it is probably worth people >> looking at it before the final openID spec is voted on. >> >> Regards >> John B. >> >> On 2011-10-26, at 3:16 PM, Torsten Lodderstedt wrote: >> >>> Hi Nat, >>> >>> I think your proposal would be a useful OAuth enhancement. A JSON-based >>> request format would allow for more complex requests (e.g. carrying >>> resource server URLs and corresponding scope values ;-)). >>> >>> Please note: I also think the way this mechanism is introduced and used in >>> the current OpenID connect spec requires OpenID connect clients and servers >>> to handle OAuth request parameters differently than for standard OAuth >>> requests. Introducing the JSON based claim request capability to OAuth >>> would be a way to cope with this. >>> >>> regards, >>> Torsten. >>> >>> Am 22.10.2011 16:00, schrieb Nat Sakimura: >>>> >>>> Hi. >>>> >>>> Just a clarification: >>>> >>>> Although my expired draft is 'request by reference', what was proposed >>>> through it at the iiw really is a generalized JSON based claim request >>>> capability. It could be passed by value as JSON or could be passed by >>>> reference. The later is an optimization for bandwidth constrained network >>>> as well as strengthening security in some ways. This capability already >>>> exists in OpenID Connect but it is actually an underpinning transport, so >>>> it probably should belong to OAuth instead. This was the primary reason >>>> for the proposal. >>>> >>>> Nat >>>> >>>> On Thu, Oct 20, 2011 at 3:56 PM, Torsten Lodderstedt >>>> <tors...@lodderstedt.net> wrote: >>>> Hi all, >>>> >>>> my prioritization is driven by the goal to make OAuth the authorization >>>> framework of choice for any internet standard protocol, such as WebDAV, >>>> IMAP, SMTP or SIP. So let me first explain what is missing from my point >>>> of view and explain some thoughts how to fill the gaps. >>>> >>>> A standard protocol is defined in terms of resource types and messages by >>>> a body (e.g. IETF, OIDF, OMA), (hopefully) implemented in many places, and >>>> used by different but deployment-independent clients. OAuth-based protocol >>>> specifications must also define scope values (e.g. read, write, send) and >>>> their relation to the resource types and messages. The different >>>> deployments expose the standard protocol on different resource server >>>> endpoints. In my opinion, it is fundamental to clearly distinguish scope >>>> values (standardized, static) and resource server addresses (deployment >>>> specific) and to manage their relationships. The current scope definition >>>> is much to weak and insufficient. Probably, the UMA concepts of hosts, >>>> resources sets, and corresponding scopes could be adopted for that purpose. >>>> >>>> OAuth today requires clients to register with the service provider before >>>> they are deployed. Would you really expect IMAP clients, e.g. Thunderbird, >>>> to register with any a-Mail services upfront? So clients should be given a >>>> way to register dynamically to the authorization servers. This should also >>>> allow us to cover "client instance" aspects. It is interesting to note, >>>> that such a mechanism would allow us to get rid of secret-less clients and >>>> the one-time usage requirement for authorization codes. >>>> >>>> We also assume the client to know the URLs of the resource server and the >>>> corresponding authorization server and to use HTTPS server authentication >>>> to verify the resource server's authenticity. This is impossible in the >>>> standard scenario. Clients must be able to discover the authorization >>>> server a particular resource server relies on at runtime. The discovery >>>> mechanism could be specified by the OAuth WG, but could also be part of an >>>> application protocols specification. But we MUST find another way to >>>> prevent token phishing by counterfeit resource servers. >>>> >>>> As one approach, the client could pass the (previously HTTPS validated) >>>> resource server's URL with the authorization request. The authorization >>>> server should then refuse such requests for any unknown (counterfeit) >>>> resource servers. Such an additional parameter could also serve as >>>> namespace for scope values and enable service providers to run multiple >>>> instances of the same service within a single deployment. >>>> >>>> If the additional data enlarges the request payload to much, we could >>>> consider to adopt the "request by reference" proposal. >>>> >>>> Let's now assume, OAuth is successful in the world of standard protocols >>>> and we will see plenty of deployments with a bunch of different OAuth >>>> protected resource servers. Shall this servers all be accessible with a >>>> single token? In my opinion, this would cause security, privacy and/or >>>> scalability/performance problems. To give just the most obvious example, >>>> the target audience of such a token cannot be restricted enough, which may >>>> allow a resource server (or an attacker in control of it) to abuse the >>>> token on other servers. But the current design of the code grant type >>>> forces deployments to use the same token for all services. What is needed >>>> from my point of view is a way to request and issue multiple >>>> server-specific access tokens with a single authorization process. >>>> >>>> I've been advocating this topic for a long time now and I'm still >>>> convinced this is required to really complete the core design. We at >>>> Deutsche Telekom needed and implemented this function on top of the >>>> existing core. In my opinion, a core enhancement would be easier to handle >>>> and more powerful. If others support this topic, I would be willed to >>>> submit an I-D describing a possible solution. >>>> >>>> If we take standards really seriously, then service providers should be >>>> given the opportunity to implement their service by utilizing standard >>>> server implementations. This creates the challenge to find a standardized >>>> protocol between authorization server and resource server to exchange >>>> authorization data. Depending on the token design (self-contained vs. >>>> handle) this could be solved by either standardizing a token format (JWT) >>>> or an authorization API. >>>> >>>> Based on the rationale given above, my list is as follows (topics w/o I-D >>>> are marked with *): >>>> >>>> - Revocation (low hanging fruit since I-D is ready and implemented in some >>>> places) >>>> - Resource server notion* >>>> - Multiple access tokens* >>>> - Dynamic client registration >>>> >>>> 1) Dynamic Client Registration Protocol >>>> 4) Client Instance Extension >>>> - Discovery >>>> (10) Simple Web Discovery, probably other specs as well >>>> - (6) JSON Web Token >>>> - (7) JSON Web Token (JWT) Bearer Profile >>>> - 8) User Experience Extension >>>> - Device flow >>>> - 9) Request by Reference >>>> (depending resource server notion and multiple access tokens) >>>> >>>> regards, >>>> Torsten. >>>> Zitat von Hannes Tschofenig <hannes.tschofe...@gmx.net>: >>>> >>>> >>>> Hi all, >>>> >>>> in preparation of the upcoming IETF meeting Barry and I would like to >>>> start a re-chartering discussion. We both are currently attending the >>>> Internet Identity Workshop and so we had the chance to solicit input from >>>> the participants. This should serve as a discussion starter. >>>> >>>> Potential future OAuth charter items (in random order): >>>> >>>> ---------------- >>>> >>>> 1) Dynamic Client Registration Protocol >>>> >>>> Available document: >>>> http://datatracker.ietf.org/doc/draft-hardjono-oauth-dynreg/ >>>> >>>> 2) Token Revocation >>>> >>>> Available document: >>>> http://datatracker.ietf.org/doc/draft-lodderstedt-oauth-revocation/ >>>> >>>> 3) UMA >>>> >>>> Available document: >>>> http://datatracker.ietf.org/doc/draft-hardjono-oauth-umacore/ >>>> >>>> 4) Client Instance Extension >>>> >>>> Available document: >>>> http://tools.ietf.org/id/draft-richer-oauth-instance-00.txt >>>> >>>> 5) XML Encoding >>>> >>>> Available document: >>>> http://tools.ietf.org/id/draft-richer-oauth-xml-00.txt >>>> >>>> 6) JSON Web Token >>>> >>>> Available document: >>>> http://tools.ietf.org/html/draft-jones-json-web-token-05 >>>> >>>> 7) JSON Web Token (JWT) Bearer Profile >>>> >>>> Available document: >>>> http://tools.ietf.org/html/draft-jones-oauth-jwt-bearer-00 >>>> >>>> 8) User Experience Extension >>>> >>>> Available document: >>>> http://tools.ietf.org/html/draft-recordon-oauth-v2-ux-00 >>>> >>>> 9) Request by Reference >>>> >>>> Available document: >>>> http://tools.ietf.org/html/draft-sakimura-oauth-requrl-00 >>>> >>>> 10) Simple Web Discovery >>>> >>>> Available document: >>>> http://tools.ietf.org/html/draft-jones-simple-web-discovery-00 >>>> >>>> ---------------- >>>> >>>> We have the following questions: >>>> >>>> a) Are you interested in any of the above-listed items? (as a reviewer, >>>> co-author, implementer, or someone who would like to deploy). It is also >>>> useful to know if you think that we shouldn't work on a specific item. >>>> >>>> b) Are there other items you would like to see the group working on? >>>> >>>> Note: In case your document is expired please re-submit it. >>>> >>>> Ciao >>>> Hannes & Barry >>>> >>>> _______________________________________________ >>>> OAuth mailing list >>>> OAuth@ietf.org >>>> https://www.ietf.org/mailman/listinfo/oauth >>>> >>>> >>>> >>>> _______________________________________________ >>>> OAuth mailing list >>>> OAuth@ietf.org >>>> https://www.ietf.org/mailman/listinfo/oauth >>>> >>>> >>>> >>>> -- >>>> Nat Sakimura (=nat) >>>> Chairman, OpenID Foundation >>>> http://nat.sakimura.org/ >>>> @_nat_en >>>> >>> _______________________________________________ >>> OAuth mailing list >>> OAuth@ietf.org >>> https://www.ietf.org/mailman/listinfo/oauth >>
smime.p7s
Description: S/MIME cryptographic signature
_______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth