Agree that they are separate. For the use case I gave the fundamental requi

Sent from my iPhone

On 2012-03-15, at 9:22 AM, "Richer, Justin P." <jric...@mitre.org> wrote:

>> 4) wrt revocation, we definitely see use cases  (enterprise employee is 
>> issued long lived refresh token for a mobile SaaS app, then gets fired and 
>> so enterprise needs to turn off the access) but can probably achieve the 
>> equivalent with a SCIM 'delete user' message
> 
> Token revocation and user deletion are completely separate issues -- there's 
> no real overlap here. It's about closing the session management gap (for both 
> access and refresh tokens) and it has nothing to do with deprovisioning a 
> user in a system. In many cases, there might not even be a "user" that the 
> token directly represents, or the client wouldn't know enough about them to 
> make a delete user message. And that's a very good thing -- Would you really 
> want to give every delegated client the ability to delete your account when 
> it felt like it? Absolutely not - that level of power is completely counter 
> to the whole point of delegated access. 
> 
> Plus, for what it's worth, it's pretty much finished already and we've 
> implemented the endpoint already, too. 
> 
> 
> To answer Hannes's original question, I think the WG's priorities from the 
> list ought to be, in rough order:
> 
> 1) Revocation (for reasons above)
> 2) Dynamic Registration (big need for this and several drafts already out 
> there to start from)
> 3) JWT Bearer (it matches the profile for saml bearer and fits in the OAuth 
> world well)
> 4) JWT, if no one else will take it (and it is basically done, and well 
> deployed already)
> 5) Use cases (since it's informational and bound to cause some level of 
> controversy, I wouldn't want to see this really detract from the real 
> normative standards work, and don't think it should be counted against the 
> total)
> 
> For other documents discussed, like XML encoding, SWD, UX, and things like 
> that, other avenues *may* be a better fit and I'm happy with pursuing some of 
> these myself. But with so much of the work on these and other documents 
> already done, many of the same arguments for inclusion of the above five 
> apply.
> 
>  -- Justin
> 
>> On 3/15/12 7:12 AM, Tschofenig, Hannes (NSN - FI/Espoo) wrote:
>>> 
>>> Hi Paul,
>>>  
>>> Interesting stuff. Thanks for sharing your draft writeup with us.
>>>  
>>> Could you submit the document as Internet Draft when the submission gates 
>>> open again?
>>> The I-D submission tool will be reopened at 00h UTC, 2012-03-26.
>>>  
>>> From the current list of items what do you consider less important?
>>>  
>>> Ciao
>>> Hannes
>>>  
>>> From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of 
>>> ext Paul Madsen
>>> Sent: Thursday, March 15, 2012 12:35 PM
>>> To: Richer, Justin P.
>>> Cc: oauth@ietf.org WG
>>> Subject: Re: [OAUTH-WG] OAuth WG Re-Chartering
>>>  
>>> +1 to defining RS-AS interactions. We've implemented such a 'token 
>>> introspection' endpoint in our AS and I'm be happy to no longer need to 
>>> explain to customers/partners why it's not part of the standard.
>>> 
>>> As input, an (incomplete) spec for our endpoint enclosed. (we modeled the 
>>> verification as a new grant type, leveraging as much as possible the 
>>> existing token endpoint API)
>>> 
>>> Wrt the 5 item limit
>>> 
>>> 1) is this an arbitrary #? if people sign up to work on more items, could 
>>> it be extended?
>>> 2) the use cases document seems already well progressed (and 
>>> informational). Need it count against the 5?
>>> 
>>> paul
>>> 
>>> On 3/14/12 5:53 PM, Richer, Justin P. wrote:
>>> Methods of connecting the PR to the AS are something that several groups 
>>> have invented outside of the OAuth WG, and I think we should try to pull 
>>> some of this work together. OAuth2 gives us a logical separation of the 
>>> concerns but not a way to knit them back together. 
>>>  
>>> Proposals for inclusion in the discussion include UMA's Step 3, OpenID 
>>> Connect's CheckID, and several "token introspection" endpoints in various 
>>> implementations.
>>>  
>>>  -- Justin
>>>  
>>> On Mar 14, 2012, at 4:21 PM, Hannes Tschofenig wrote:
>>>  
>>> So, here is a proposal:
>>>  
>>> -------
>>>  
>>> Web Authorization Protocol (oauth)
>>>  
>>> Description of Working Group
>>>  
>>> The Web Authorization (OAuth) protocol allows a user to grant
>>> a third-party Web site or application access to the user's protected
>>> resources, without necessarily revealing their long-term credentials,
>>> or even their identity. For example, a photo-sharing site that supports
>>> OAuth could allow its users to use a third-party printing Web site to
>>> print their private pictures, without allowing the printing site to
>>> gain full control of the user's account and without having the user 
>>> sharing his or her photo-sharing sites' long-term credential with the 
>>> printing site. 
>>>  
>>> The OAuth protocol suite encompasses
>>> * a procedure for allowing a client to discover a resource server, 
>>> * a protocol for obtaining authorization tokens from an authorization 
>>> server with the resource owner's consent, 
>>> * protocols for presenting these authorization tokens to protected 
>>> resources for access to a resource, and 
>>> * consequently for sharing data in a security and privacy respective way.
>>>  
>>> In April 2010 the OAuth 1.0 specification, documenting pre-IETF work,
>>> was published as an informational document (RFC 5849). With the 
>>> completion of OAuth 1.0 the working group started their work on OAuth 2.0
>>> to incorporate implementation experience with version 1.0, additional
>>> use cases, and various other security, readability, and interoperability
>>> improvements. An extensive security analysis was conducted and the result 
>>> is available as a stand-alone document offering guidance for audiences 
>>> beyond the community of protocol implementers.
>>>  
>>> The working group also developed security schemes for presenting 
>>> authorization
>>> tokens to access a protected resource. This led to the publication of
>>> the bearer token as well as the message authentication code (MAC) access 
>>> authentication specification. 
>>>  
>>> OAuth 2.0 added the ability to trade a SAML assertion against an OAUTH 
>>> token with 
>>> the SAML 2.0 bearer assertion profile.  This offers interworking with 
>>> existing 
>>> identity management solutions, in particular SAML based deployments.
>>>  
>>> OAuth has enjoyed widespread adoption by the Internet application service 
>>> provider 
>>> community. To build on this success we aim for nothing more than to make 
>>> OAuth the 
>>> authorization framework of choice for any Internet protocol. Consequently, 
>>> the 
>>> ongoing standardization effort within the OAuth working group is focused on 
>>> enhancing interoperability of OAuth deployments. While the core OAuth 
>>> specification 
>>> truly is an important building block it relies on other specifications in 
>>> order to 
>>> claim completeness. Luckily, these components already exist and have been 
>>> deployed 
>>> on the Internet. Through the IETF standards process they will be improved 
>>> in 
>>> quality and will undergo a rigorous review process. 
>>>  
>>> Goals and Milestones
>>>  
>>> [Editor's Note: Here are the completed items.] 
>>>  
>>> Done     Submit 'OAuth 2.0 Threat Model and Security Considerations' as a 
>>> working group item
>>> Done     Submit 'HTTP Authentication: MAC Authentication' as a working 
>>> group item
>>> Done     Submit 'The OAuth 2.0 Protocol: Bearer Tokens' to the IESG for 
>>> consideration as a Proposed Standard
>>> Done     Submit 'The OAuth 2.0 Authorization Protocol' to the IESG for 
>>> consideration as a Proposed Standard
>>>  
>>> [Editor's Note: Finishing existing work. Double-check the proposed dates - 
>>> are they realistic?] 
>>>  
>>> Jun. 2012       Submit 'HTTP Authentication: MAC Authentication' to the 
>>> IESG for consideration as a Proposed Standard
>>> Apr. 2012       Submit 'SAML 2.0 Bearer Assertion Profiles for OAuth 2.0' 
>>> to the IESG for consideration as a Proposed Standard
>>> Apr. 2012  Submit 'OAuth 2.0 Assertion Profile' to the IESG for 
>>> consideration as a Proposed Standard 
>>> Apr. 2012  Submit 'An IETF URN Sub-Namespace for OAuth' to the IESG for 
>>> consideration as a Proposed Standard 
>>> May 2012    Submit 'OAuth 2.0 Threat Model and Security Considerations' to 
>>> the IESG for consideration as an Informational RFC
>>>  
>>> [Editor's Note: New work for the group. 5 items maximum! ]
>>>  
>>> Aug. 2012    Submit 'Token Revocation' to the IESG for consideration as a 
>>> Proposed Standard
>>>  
>>> [Starting point for the work will be 
>>> http://datatracker.ietf.org/doc/draft-lodderstedt-oauth-revocation/]
>>>  
>>> Nov. 2012    Submit 'JSON Web Token (JWT)' to the IESG for consideration as 
>>> a Proposed Standard
>>>  
>>> [Starting point for the work will be 
>>> http://tools.ietf.org/html/draft-jones-json-web-token]
>>>  
>>> Nov. 2012    Submit 'JSON Web Token (JWT) Bearer Token Profiles for OAuth 
>>> 2.0' to the IESG for consideration as a Proposed Standard
>>>  
>>> [Starting point for the work will be 
>>> http://tools.ietf.org/html/draft-jones-oauth-jwt-bearer]
>>>  
>>> Jan. 2013    Submit 'OAuth Dynamic Client Registration Protocol' to the 
>>> IESG for consideration as a Proposed Standard
>>>  
>>> [Starting point for the work will be 
>>> http://tools.ietf.org/html/draft-hardjono-oauth-dynreg] 
>>>  
>>> Sep. 2012    Submit 'OAuth Use Cases' to the IESG for consideration as an 
>>> Informational RFC
>>>  
>>> [Starting point for the work will be 
>>> http://tools.ietf.org/html/draft-zeltsan-oauth-use-cases] 
>>>  
>>>  
>>>  
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>>  
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
> 
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to