John, What is the reason behind having a separate ID_Token from the access Token? I understand the tokens are used to retrieve different information, but not sure I fully understand why separate tokens are needed.
I ask because I recall others have asked for multi-token response….trying to understand if there is a general use case behind this requirement. Phil @independentid www.independentid.com phil.h...@oracle.com On 2011-10-27, at 10:33 AM, tors...@lodderstedt.net wrote: > Hi John, > > why do you need to include the OAuth request parameters into the JSON > document? I would expect OpenId Connect to extend OAuth none-intrusively. > This would mean to use the JSON document for OpenId connect specific > parameters only. Alternatively, the JSON request style could be adopted as > part of OAuth. Then, the URI request parameters could be omitted. > > regards, > Torsten. > Gesendet mit BlackBerry® Webmail von Telekom Deutschland > > From: John Bradley <ve7...@ve7jtb.com> > Date: Thu, 27 Oct 2011 13:52:31 -0300 > To: Torsten Lodderstedt<tors...@lodderstedt.net> > Cc: Nat Sakimura<sakim...@gmail.com>; OAuth WG<oauth@ietf.org> > Subject: Re: [OAUTH-WG] Rechartering JSON based request. > > Hopefully to make it more compatible with existing OAuth 2 libraries. At > least leave open the possibility of dealing with it at a higher level. > > The argument has been made that you probably need to modify the library > anyway to check that the duplicate parameters are a match. > > If there is consensus that the parameters should only be in the JSON then we > would happily not duplicate them. > > It is mostly a case of trying to fit in to the existing OAuth work and > libraries. > > John B. > > On 2011-10-27, at 2:22 AM, Torsten Lodderstedt wrote: > >> why is it neccessary to duplicate the OAuth request parameters? >> >> Am 27.10.2011 00:31, schrieb John Bradley: >>> >>> Nat and I just refreshed the I-D for draft-sakimura-oauth-requrl. >>> >>> It is essentially a standardization of the method we are using in openID >>> Connect to make signed requests to the Authorization server. >>> >>> We do have the issue that parameters in the signed/encrypted request >>> necessarily duplicate the query parameters to keep it a valid OAuth request >>> plus an extension. >>> >>> Even if it doesn't wind up as a OAuth WG item it is probably worth people >>> looking at it before the final openID spec is voted on. >>> >>> Regards >>> John B. >>> >>> On 2011-10-26, at 3:16 PM, Torsten Lodderstedt wrote: >>> >>>> Hi Nat, >>>> >>>> I think your proposal would be a useful OAuth enhancement. A JSON-based >>>> request format would allow for more complex requests (e.g. carrying >>>> resource server URLs and corresponding scope values ;-)). >>>> >>>> Please note: I also think the way this mechanism is introduced and used in >>>> the current OpenID connect spec requires OpenID connect clients and >>>> servers to handle OAuth request parameters differently than for standard >>>> OAuth requests. Introducing the JSON based claim request capability to >>>> OAuth would be a way to cope with this. >>>> >>>> regards, >>>> Torsten. >>>> >>>> Am 22.10.2011 16:00, schrieb Nat Sakimura: >>>>> >>>>> Hi. >>>>> >>>>> Just a clarification: >>>>> >>>>> Although my expired draft is 'request by reference', what was proposed >>>>> through it at the iiw really is a generalized JSON based claim request >>>>> capability. It could be passed by value as JSON or could be passed by >>>>> reference. The later is an optimization for bandwidth constrained network >>>>> as well as strengthening security in some ways. This capability already >>>>> exists in OpenID Connect but it is actually an underpinning transport, so >>>>> it probably should belong to OAuth instead. This was the primary reason >>>>> for the proposal. >>>>> >>>>> Nat >>>>> >>>>> On Thu, Oct 20, 2011 at 3:56 PM, Torsten Lodderstedt >>>>> <tors...@lodderstedt.net> wrote: >>>>> Hi all, >>>>> >>>>> my prioritization is driven by the goal to make OAuth the authorization >>>>> framework of choice for any internet standard protocol, such as WebDAV, >>>>> IMAP, SMTP or SIP. So let me first explain what is missing from my point >>>>> of view and explain some thoughts how to fill the gaps. >>>>> >>>>> A standard protocol is defined in terms of resource types and messages by >>>>> a body (e.g. IETF, OIDF, OMA), (hopefully) implemented in many places, >>>>> and used by different but deployment-independent clients. OAuth-based >>>>> protocol specifications must also define scope values (e.g. read, write, >>>>> send) and their relation to the resource types and messages. The >>>>> different deployments expose the standard protocol on different resource >>>>> server endpoints. In my opinion, it is fundamental to clearly distinguish >>>>> scope values (standardized, static) and resource server addresses >>>>> (deployment specific) and to manage their relationships. The current >>>>> scope definition is much to weak and insufficient. Probably, the UMA >>>>> concepts of hosts, resources sets, and corresponding scopes could be >>>>> adopted for that purpose. >>>>> >>>>> OAuth today requires clients to register with the service provider before >>>>> they are deployed. Would you really expect IMAP clients, e.g. >>>>> Thunderbird, to register with any a-Mail services upfront? So clients >>>>> should be given a way to register dynamically to the authorization >>>>> servers. This should also allow us to cover "client instance" aspects. It >>>>> is interesting to note, that such a mechanism would allow us to get rid >>>>> of secret-less clients and the one-time usage requirement for >>>>> authorization codes. >>>>> >>>>> We also assume the client to know the URLs of the resource server and the >>>>> corresponding authorization server and to use HTTPS server authentication >>>>> to verify the resource server's authenticity. This is impossible in the >>>>> standard scenario. Clients must be able to discover the authorization >>>>> server a particular resource server relies on at runtime. The discovery >>>>> mechanism could be specified by the OAuth WG, but could also be part of >>>>> an application protocols specification. But we MUST find another way to >>>>> prevent token phishing by counterfeit resource servers. >>>>> >>>>> As one approach, the client could pass the (previously HTTPS validated) >>>>> resource server's URL with the authorization request. The >>>>> authorization server should then refuse such requests for any >>>>> unknown (counterfeit) resource servers. Such an additional parameter >>>>> could also serve as namespace for scope values and enable service >>>>> providers to run multiple instances of the same service within a single >>>>> deployment. >>>>> >>>>> If the additional data enlarges the request payload to much, we could >>>>> consider to adopt the "request by reference" proposal. >>>>> >>>>> Let's now assume, OAuth is successful in the world of standard protocols >>>>> and we will see plenty of deployments with a bunch of different OAuth >>>>> protected resource servers. Shall this servers all be accessible with a >>>>> single token? In my opinion, this would cause security, privacy and/or >>>>> scalability/performance problems. To give just the most obvious example, >>>>> the target audience of such a token cannot be restricted enough, which >>>>> may allow a resource server (or an attacker in control of it) to abuse >>>>> the token on other servers. But the current design of the code grant type >>>>> forces deployments to use the same token for all services. What is needed >>>>> from my point of view is a way to request and issue multiple >>>>> server-specific access tokens with a single authorization process. >>>>> >>>>> I've been advocating this topic for a long time now and I'm still >>>>> convinced this is required to really complete the core design. We at >>>>> Deutsche Telekom needed and implemented this function on top of the >>>>> existing core. In my opinion, a core enhancement would be easier to >>>>> handle and more powerful. If others support this topic, I would be willed >>>>> to submit an I-D describing a possible solution. >>>>> >>>>> If we take standards really seriously, then service providers should be >>>>> given the opportunity to implement their service by utilizing standard >>>>> server implementations. This creates the challenge to find a standardized >>>>> protocol between authorization server and resource server to exchange >>>>> authorization data. Depending on the token design (self-contained vs. >>>>> handle) this could be solved by either standardizing a token format (JWT) >>>>> or an authorization API. >>>>> >>>>> Based on the rationale given above, my list is as follows (topics w/o I-D >>>>> are marked with *): >>>>> >>>>> - Revocation (low hanging fruit since I-D is ready and implemented in >>>>> some places) >>>>> - Resource server notion* >>>>> - Multiple access tokens* >>>>> - Dynamic client registration >>>>> >>>>> 1) Dynamic Client Registration Protocol >>>>> 4) Client Instance Extension >>>>> - Discovery >>>>> (10) Simple Web Discovery, probably other specs as well >>>>> - (6) JSON Web Token >>>>> - (7) JSON Web Token (JWT) Bearer Profile >>>>> - 8) User Experience Extension >>>>> - Device flow >>>>> - 9) Request by Reference >>>>> (depending resource server notion and multiple access tokens) >>>>> >>>>> regards, >>>>> Torsten. >>>>> Zitat von Hannes Tschofenig <hannes.tschofe...@gmx.net>: >>>>> >>>>> >>>>> Hi all, >>>>> >>>>> in preparation of the upcoming IETF meeting Barry and I would like to >>>>> start a re-chartering discussion. We both are currently attending the >>>>> Internet Identity Workshop and so we had the chance to solicit input from >>>>> the participants. This should serve as a discussion starter. >>>>> >>>>> Potential future OAuth charter items (in random order): >>>>> >>>>> ---------------- >>>>> >>>>> 1) Dynamic Client Registration Protocol >>>>> >>>>> Available document: >>>>> http://datatracker.ietf.org/doc/draft-hardjono-oauth-dynreg/ >>>>> >>>>> 2) Token Revocation >>>>> >>>>> Available document: >>>>> http://datatracker.ietf.org/doc/draft-lodderstedt-oauth-revocation/ >>>>> >>>>> 3) UMA >>>>> >>>>> Available document: >>>>> http://datatracker.ietf.org/doc/draft-hardjono-oauth-umacore/ >>>>> >>>>> 4) Client Instance Extension >>>>> >>>>> Available document: >>>>> http://tools.ietf.org/id/draft-richer-oauth-instance-00.txt >>>>> >>>>> 5) XML Encoding >>>>> >>>>> Available document: >>>>> http://tools.ietf.org/id/draft-richer-oauth-xml-00.txt >>>>> >>>>> 6) JSON Web Token >>>>> >>>>> Available document: >>>>> http://tools.ietf.org/html/draft-jones-json-web-token-05 >>>>> >>>>> 7) JSON Web Token (JWT) Bearer Profile >>>>> >>>>> Available document: >>>>> http://tools.ietf.org/html/draft-jones-oauth-jwt-bearer-00 >>>>> >>>>> 8) User Experience Extension >>>>> >>>>> Available document: >>>>> http://tools.ietf.org/html/draft-recordon-oauth-v2-ux-00 >>>>> >>>>> 9) Request by Reference >>>>> >>>>> Available document: >>>>> http://tools.ietf.org/html/draft-sakimura-oauth-requrl-00 >>>>> >>>>> 10) Simple Web Discovery >>>>> >>>>> Available document: >>>>> http://tools.ietf.org/html/draft-jones-simple-web-discovery-00 >>>>> >>>>> ---------------- >>>>> >>>>> We have the following questions: >>>>> >>>>> a) Are you interested in any of the above-listed items? (as a reviewer, >>>>> co-author, implementer, or someone who would like to deploy). It is also >>>>> useful to know if you think that we shouldn't work on a specific item. >>>>> >>>>> b) Are there other items you would like to see the group working on? >>>>> >>>>> Note: In case your document is expired please re-submit it. >>>>> >>>>> Ciao >>>>> Hannes & Barry >>>>> >>>>> _______________________________________________ >>>>> OAuth mailing list >>>>> OAuth@ietf.org >>>>> https://www.ietf.org/mailman/listinfo/oauth >>>>> >>>>> >>>>> >>>>> _______________________________________________ >>>>> OAuth mailing list >>>>> OAuth@ietf.org >>>>> https://www.ietf.org/mailman/listinfo/oauth >>>>> >>>>> >>>>> >>>>> -- >>>>> Nat Sakimura (=nat) >>>>> Chairman, OpenID Foundation >>>>> http://nat.sakimura.org/ >>>>> @_nat_en >>>>> >>>> _______________________________________________ >>>> OAuth mailing list >>>> OAuth@ietf.org >>>> https://www.ietf.org/mailman/listinfo/oauth >>> > > _______________________________________________ > OAuth mailing list > OAuth@ietf.org > https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth