OK, but with SWD and discovery off the table, can this now be considered to be within that manageable number instead?

 -- Justin

On 04/13/2012 01:10 PM, Mike Jones wrote:
Yes, there was an explicit decision in that regard.  My sense was that the WG 
did think they're important but they only wanted to take on a manageable number 
of tasks at once.

                                -- Mike

-----Original Message-----
From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of 
Justin Richer
Sent: Friday, April 13, 2012 10:02 AM
To: Hannes Tschofenig
Cc: oauth@ietf.org WG
Subject: Re: [OAUTH-WG] Updated Charter to the IESG (this weekend)

Did the "Introspection Endpoint" or "Methods for connecting a PR to an AS" get 
dropped? There seemed to be interest in the list in coming up with a generally applicable scheme, 
or set of schemes, to do this, and there are certainly no shortage of starting points. Both AOL and 
Ping have their own token introspection drafts that got put to the list, we've developed our own 
internal approach here, UMA has an alternative approach, and OpenID Connect has invented its own 
approach for ID Tokens.

I just want to make sure that this was an explicit decision of it being out of 
scope here and not an inadvertent omission.

   -- Justin

On 04/12/2012 06:55 AM, Hannes Tschofenig wrote:
Hey guys

based on the discussion before, during, and after the Paris IETF meeting I am 
going to send the following updated charter / milestones to the IESG.
Please have a quick look (till the end of the week) to double-check the content 
(particularly the suggested milestone dates):

----------


Web Authorization Protocol (oauth)

Description of Working Group

The Web Authorization (OAuth) protocol allows a user to grant a
third-party Web site or application access to the user's protected
resources, without necessarily revealing their long-term credentials,
or even their identity. For example, a photo-sharing site that
supports OAuth could allow its users to use a third-party printing Web
site to print their private pictures, without allowing the printing
site to gain full control of the user's account and without having the
user sharing his or her photo-sharing sites' long-term credential with
the printing site.

The OAuth protocol suite encompasses
* a procedure for allowing a client to discover a resource server,
* a protocol for obtaining authorization tokens from an authorization
server with the resource owner's consent,
* protocols for presenting these authorization tokens to protected
resources for access to a resource, and
* consequently for sharing data in a security and privacy respective way.

In April 2010 the OAuth 1.0 specification, documenting pre-IETF work,
was published as an informational document (RFC 5849). With the
completion of OAuth 1.0 the working group started their work on OAuth
2.0 to incorporate implementation experience with version 1.0,
additional use cases, and various other security, readability, and
interoperability improvements. An extensive security analysis was
conducted and the result is available as a stand-alone document
offering guidance for audiences beyond the community of protocol implementers.

The working group also developed security schemes for presenting
authorization tokens to access a protected resource. This led to the
publication of the bearer token as well as the message authentication
code (MAC) access authentication specification.

OAuth 2.0 added the ability to trade a SAML assertion against an OAUTH
token with the SAML 2.0 bearer assertion profile.  This offers
interworking with existing identity management solutions, in particular SAML 
based deployments.

OAuth has enjoyed widespread adoption by the Internet application
service provider community. To build on this success we aim for
nothing more than to make OAuth the authorization framework of choice
for any Internet protocol. Consequently, the ongoing standardization
effort within the OAuth working group is focused on enhancing
interoperability of OAuth deployments. While the core OAuth
specification truly is an important building block it relies on other
specifications in order to claim completeness. Luckily, these
components already exist and have been deployed on the Internet. Through the 
IETF standards process they will be improved in quality and will undergo a 
rigorous review process.

Goals and Milestones

[Editor's Note: Here are the completed items.]

Done  Submit 'OAuth 2.0 Threat Model and Security Considerations' as a
working group item Done  Submit 'HTTP Authentication: MAC
Authentication' as a working group item Done  Submit 'The OAuth 2.0
Protocol: Bearer Tokens' to the IESG for consideration as a Proposed
Standard Done  Submit 'The OAuth 2.0 Authorization Protocol' to the
IESG for consideration as a Proposed Standard

[Editor's Note: Finishing existing work. Double-check the proposed
dates - are they realistic?]

May  2012  Submit 'SAML 2.0 Bearer Assertion Profiles for OAuth 2.0'
to the IESG for consideration as a Proposed Standard May  2012  Submit
'OAuth 2.0 Assertion Profile' to the IESG for consideration as a
Proposed Standard May  2012  Submit 'An IETF URN Sub-Namespace for
OAuth' to the IESG for consideration as a Proposed Standard May  2012
Submit 'OAuth 2.0 Threat Model and Security Considerations' to the
IESG for consideration as an Informational RFC Dec. 2012  Submit 'HTTP
Authentication: MAC Authentication' to the IESG for consideration as a
Proposed Standard

[Editor's Note: New work for the group]

Nov. 2012  Submit 'Token Revocation' to the IESG for consideration as
a Proposed Standard

[Starting point for the work will be
http://datatracker.ietf.org/doc/draft-lodderstedt-oauth-revocation/]

Dec. 2012  Submit 'OAuth Use Cases' to the IESG for consideration as
an Informational RFC

[Starting point for the work will be
http://tools.ietf.org/html/draft-zeltsan-oauth-use-cases]

Jan. 2013  Submit 'Simple Web Discovery' to the IESG for consideration
as a Proposed Standard

[Starting point for the work will be
http://tools.ietf.org/html/draft-jones-simple-web-discovery]

Mar. 2013  Submit 'JSON Web Token (JWT)' to the IESG for consideration
as a Proposed Standard

[Starting point for the work will be
http://tools.ietf.org/html/draft-jones-json-web-token]

Mar. 2013  Submit 'JSON Web Token (JWT) Bearer Token Profiles for
OAuth 2.0' to the IESG for consideration as a Proposed Standard

[Starting point for the work will be
http://tools.ietf.org/html/draft-jones-oauth-jwt-bearer]

Jul. 2013  Submit 'OAuth Dynamic Client Registration Protocol' to the
IESG for consideration as a Proposed Standard

[Starting point for the work will be
http://tools.ietf.org/html/draft-hardjono-oauth-dynreg]


_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth



_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to