Mike,

Why can't the same access token be used for both services?  Is it because the 
services have different security systems and demand different tokens?  Why not 
a single token for both?

Phil

@independentid
www.independentid.com
phil.h...@oracle.com





On 2011-10-27, at 10:55 AM, Mike Jones wrote:

> In OpenID Connect, the two tokens are used to access two different sets of 
> resources:  the “id_token” for claims about the logged-in session and the 
> “code” token to access the UserInfo endpoint for claims about the user.
>  
> FYI, see http://openid.net/specs/oauth-v2-multiple-response-types-1_0.html 
> for a write-up on encoding multiple response types.  (I’m told that at least 
> parts of this are already being used by Google and Facebook.)
>  
>                                                                 -- Mike
>  
> From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of 
> Phil Hunt
> Sent: Thursday, October 27, 2011 10:49 AM
> To: tors...@lodderstedt.net
> Cc: OAuth WG
> Subject: Re: [OAUTH-WG] Rechartering JSON based request.
>  
> John,
>  
> What is the reason behind having a separate ID_Token from the access Token?  
> I understand the tokens are used to retrieve different information, but not 
> sure I fully understand why separate tokens are needed.
>  
> I ask because I recall others have asked for multi-token response….trying to 
> understand if there is a general use case behind this requirement.
>  
> Phil
>  
> @independentid
> www.independentid.com
> phil.h...@oracle.com
> 
>  
> 
> 
>  
> On 2011-10-27, at 10:33 AM, tors...@lodderstedt.net wrote:
> 
> 
> Hi John,
> 
> why do you need to include the OAuth request parameters into the JSON 
> document? I would expect OpenId Connect to extend OAuth none-intrusively. 
> This would mean to use the JSON document for OpenId connect specific 
> parameters only. Alternatively, the JSON request style could be adopted as 
> part of OAuth. Then, the URI request parameters could be omitted.
> 
> regards,
> Torsten.
> Gesendet mit BlackBerry® Webmail von Telekom Deutschland
> 
> From: John Bradley <ve7...@ve7jtb.com>
> Date: Thu, 27 Oct 2011 13:52:31 -0300
> To: Torsten Lodderstedt<tors...@lodderstedt.net>
> Cc: Nat Sakimura<sakim...@gmail.com>; OAuth WG<oauth@ietf.org>
> Subject: Re: [OAUTH-WG] Rechartering JSON based request.
>  
> Hopefully to make it more compatible with existing OAuth 2 libraries.    At 
> least leave open the possibility of dealing with it at a higher level.
>  
> The argument has been made that you probably need to modify the library 
> anyway to check that the duplicate parameters are a match.
>  
> If there is consensus that the parameters should only be in the JSON then we 
> would happily not duplicate them.
>  
> It is mostly a case of trying to fit in to the existing OAuth work and 
> libraries.
>  
> John B.
>  
> On 2011-10-27, at 2:22 AM, Torsten Lodderstedt wrote:
> 
> 
> why is it neccessary to duplicate the OAuth request parameters?
> 
> Am 27.10.2011 00:31, schrieb John Bradley:
> Nat and I just refreshed the I-D for draft-sakimura-oauth-requrl.
>  
> It is essentially  a standardization of the method we are using in openID 
> Connect to make signed requests to the Authorization server.
>  
> We do have the issue that parameters in the signed/encrypted request 
> necessarily duplicate the query parameters to keep it a valid OAuth request 
> plus an extension.
>  
> Even if it doesn't wind up as a OAuth WG item it is probably worth people 
> looking at it before the final openID spec is voted on.
>  
> Regards
> John B.
>  
> On 2011-10-26, at 3:16 PM, Torsten Lodderstedt wrote:
> 
> 
> Hi Nat,
> 
> I think your proposal would be a useful OAuth enhancement. A JSON-based 
> request format would allow for more complex requests (e.g. carrying resource 
> server URLs and corresponding scope values ;-)). 
> 
> Please note: I also think the way this mechanism is introduced and used in 
> the current OpenID connect spec requires OpenID connect clients and servers 
> to handle OAuth request parameters differently than for standard OAuth 
> requests. Introducing the JSON based claim request capability to OAuth would 
> be a way to cope with this.
> 
> regards,
> Torsten.
> 
> Am 22.10.2011 16:00, schrieb Nat Sakimura:
> Hi. 
>  
> Just a clarification: 
>  
> Although my expired draft is 'request by reference', what was proposed 
> through it at the iiw really is a generalized JSON based claim request 
> capability. It could be passed by value as JSON or could be passed by 
> reference. The later is an optimization for bandwidth constrained network as 
> well as strengthening security in some ways. This capability already exists 
> in OpenID Connect but it is actually an underpinning transport, so it 
> probably should belong to OAuth instead. This was the primary reason for the 
> proposal. 
>  
> Nat
>  
> On Thu, Oct 20, 2011 at 3:56 PM, Torsten Lodderstedt 
> <tors...@lodderstedt.net> wrote:
> Hi all,
> 
> my prioritization is driven by the goal to make OAuth the authorization 
> framework of choice for any internet standard protocol, such as WebDAV, IMAP, 
> SMTP or SIP. So let me first explain what is missing from my point of view 
> and explain some thoughts how to fill the gaps.
> 
> A standard protocol is defined in terms of resource types and messages by a 
> body (e.g. IETF, OIDF, OMA), (hopefully) implemented in many places, and used 
> by different but deployment-independent clients. OAuth-based protocol 
> specifications must also define scope values (e.g. read, write, send) and 
> their relation to the resource types and messages. The different deployments 
> expose the standard protocol on different resource server endpoints. In my 
> opinion, it is fundamental to clearly distinguish scope values (standardized, 
> static) and  resource server addresses (deployment specific) and to manage 
> their relationships. The current scope definition is much to weak and 
> insufficient. Probably, the UMA concepts of hosts, resources sets, and 
> corresponding scopes could be adopted for that purpose.
> 
> OAuth today requires clients to register with the service provider before 
> they are deployed. Would you really expect IMAP clients, e.g. Thunderbird, to 
> register with any a-Mail services upfront? So clients should be given a way 
> to register dynamically to the authorization servers. This should also allow 
> us to cover "client instance" aspects. It is interesting to note, that such a 
> mechanism would allow us to get rid of secret-less clients and the one-time 
> usage requirement for authorization codes.
> 
> We also assume the client to know the URLs of the resource server and the 
> corresponding authorization server and to use HTTPS server authentication to 
> verify the resource server's authenticity. This is impossible in the standard 
> scenario. Clients must be able to discover the authorization server a 
> particular resource server relies on at runtime. The discovery mechanism 
> could be specified by the OAuth WG, but could also be part of an application 
> protocols specification. But we MUST find another way to prevent token 
> phishing by counterfeit resource servers.
> 
> As one approach, the client could pass the (previously HTTPS validated) 
> resource server's URL with the authorization request. The authorization 
> server should then refuse such requests for any unknown (counterfeit) 
> resource servers. Such an additional parameter could also serve as namespace 
> for scope values and enable service providers to run multiple instances of 
> the same service within a single deployment.
> 
> If the additional data enlarges the request payload to much, we could 
> consider to adopt the "request by reference" proposal.
> 
> Let's now assume, OAuth is successful in the world of standard protocols and 
> we will see plenty of deployments with a bunch of different OAuth protected 
> resource servers. Shall this servers all be accessible with a single token? 
> In my opinion, this would cause security, privacy and/or 
> scalability/performance problems. To give just the most obvious example, the 
> target audience of such a token cannot be restricted enough, which may allow 
> a resource server (or an attacker in control of it) to abuse the token on 
> other servers. But the current design of the code grant type forces 
> deployments to use the same token for all services. What is needed from my 
> point of view is a way to request and issue multiple server-specific access 
> tokens with a single authorization process.
> 
> I've been advocating this topic for a long time now and I'm still convinced 
> this is required to really complete the core design. We at Deutsche Telekom 
> needed and implemented this function on top of the existing core. In my 
> opinion, a core enhancement would be easier to handle and more powerful. If 
> others support this topic, I would be willed to submit an I-D describing a 
> possible solution.
> 
> If we take standards really seriously, then service providers should be given 
> the opportunity to implement their service by utilizing standard server 
> implementations. This creates the challenge to find a standardized protocol 
> between authorization server and resource server to exchange authorization 
> data. Depending on the token design (self-contained vs. handle) this could be 
> solved by either standardizing a token format (JWT) or an authorization API.
> 
> Based on the rationale given above, my list is as follows (topics w/o I-D are 
> marked with *):
> 
> - Revocation (low hanging fruit since I-D is ready and implemented in some 
> places)
> - Resource server notion*
> - Multiple access tokens*
> - Dynamic client registration
> 
>  1) Dynamic Client Registration Protocol
>  4) Client Instance Extension
> - Discovery
>  (10) Simple Web Discovery, probably other specs as well
> - (6) JSON Web Token
> - (7) JSON Web Token (JWT) Bearer Profile
> - 8) User Experience Extension
> - Device flow
> - 9) Request by Reference
>  (depending resource server notion and multiple access tokens)
> 
> regards,
> Torsten.
> Zitat von Hannes Tschofenig <hannes.tschofe...@gmx.net>:
>  
> 
> Hi all,
> 
> in preparation of the upcoming IETF meeting Barry and I would like to start a 
> re-chartering discussion.  We both are currently attending the Internet 
> Identity Workshop and so we had the chance to solicit input from the 
> participants. This should serve as a discussion starter.
> 
> Potential future OAuth charter items (in random order):
> 
> ----------------
> 
> 1) Dynamic Client Registration Protocol
> 
> Available document:
> http://datatracker.ietf.org/doc/draft-hardjono-oauth-dynreg/
> 
> 2) Token Revocation
> 
> Available document:
> http://datatracker.ietf.org/doc/draft-lodderstedt-oauth-revocation/
> 
> 3) UMA
> 
> Available document:
> http://datatracker.ietf.org/doc/draft-hardjono-oauth-umacore/
> 
> 4) Client Instance Extension
> 
> Available document:
> http://tools.ietf.org/id/draft-richer-oauth-instance-00.txt
> 
> 5) XML Encoding
> 
> Available document:
> http://tools.ietf.org/id/draft-richer-oauth-xml-00.txt
> 
> 6) JSON Web Token
> 
> Available document:
> http://tools.ietf.org/html/draft-jones-json-web-token-05
> 
> 7) JSON Web Token (JWT) Bearer Profile
> 
> Available document:
> http://tools.ietf.org/html/draft-jones-oauth-jwt-bearer-00
> 
> 8) User Experience Extension
> 
> Available document:
> http://tools.ietf.org/html/draft-recordon-oauth-v2-ux-00
> 
> 9) Request by Reference
> 
> Available document:
> http://tools.ietf.org/html/draft-sakimura-oauth-requrl-00
> 
> 10) Simple Web Discovery
> 
> Available document:
> http://tools.ietf.org/html/draft-jones-simple-web-discovery-00
> 
> ----------------
> 
> We have the following questions:
> 
> a) Are you interested in any of the above-listed items? (as a reviewer, 
> co-author, implementer, or someone who would like to deploy). It is also 
> useful to know if you think that we shouldn't work on a specific item.
> 
> b) Are there other items you would like to see the group working on?
> 
> Note: In case your document is expired please re-submit it.
> 
> Ciao
> Hannes & Barry
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
> 
> 
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
> 
> 
>  
> -- 
> Nat Sakimura (=nat)
> Chairman, OpenID Foundation
> http://nat.sakimura.org/
> @_nat_en
>  
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>  
>  
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to