Hi George, perhaps it depends on the reason for the refresh token being 
revoked. If because the user removed their consent then yes I agree that *all* 
tokens should be revoked

Sent from my iPhone

On 2012-06-11, at 5:10 PM, George Fletcher <gffle...@aol.com> wrote:

> Paul, 
> 
> I think I came to a different conclusion...
> 
> If I use the Resource Owner Password Credential flow and get back both an 
> access_token and a refresh_token then I would assume that the issued 
> access_token is tied in some way to the refresh_token. If the refresh_token 
> is revoked, then my expectation is that the simultaneous issued access_token 
> would also be revoked.
> 
> I read the spec as having a typo that should read...
> If the processed token is a refresh token and the authorization
> server supports the revocation of access tokens, then the
> authorization server SHOULD also invalidate all access tokens issued
> *based on* that refresh token.
> Or maybe better... "invalidate all access tokens associated/tied-to that 
> refresh token".
> 
> Now in the case that the client is retrieving a new refresh_token and 
> access_token, then the new ones should be valid and the old ones potentially 
> revoked.
> 
> Thanks,
> George
> 
> On 6/11/12 4:09 PM, Paul Madsen wrote:
>> 
>> Hi Doug, my interpretation is that 'for that refresh token' means those 
>> access tokens issued in exchange for that refresh token. 
>> 
>> Consequently, for the cases you cite below, the access tokens at the same 
>> time as a given refresh token need not be invalidated when that refresh 
>> token is 'processed'
>> 
>> I assume the justification for the rule is that an access token issued in 
>> exchange for a given refresh token may have been compromised if the refresh 
>> token had been. But there is no such causal relationship between an access 
>> token & refresh token issued at same time
>> 
>> paul 
>> 
>> On 6/11/12 3:31 PM, doug foiles wrote:
>>> 
>>> Hi all,
>>> 
>>> I was hoping to get some clarity on a statement in section 2.0 of 
>>> draft-ietf-oauth-revocation-00.
>>> 
>>>    If the processed token is a refresh token and the authorization
>>>    server supports the revocation of access tokens, then the
>>>    authorization server SHOULD also invalidate all access tokens issued
>>>    for that refresh token.
>>> 
>>> My question is on the statement "access tokens issued for that refresh 
>>> token".  What does it mean to have an Access Token "issued" for a Refresh 
>>> Token? 
>>> 
>>> This specific case is clear to me.  I am refreshing an Access Token where I 
>>> keep the same Refresh Token that I used to generate the new Access Token.  
>>> I see the new Access Token was issued for that Refresh Token.
>>> However these two cases are a bit muddy to me.  Let’s say I am using the 
>>> "Resource Owner Password Credentials Grant" where the Access Token Response 
>>> returns both an Access Token and Refresh Token.  Would the Access Token 
>>> have been issued for that Refresh Token?  And let’s say I am refreshing an 
>>> Access Token but choose to create a new Refresh Token and immediately 
>>> revoke the original Refresh Token.  Would the newly created Access Token 
>>> have been issued for the original Refresh Token or the new one that was 
>>> created. 
>>> If a client would revoke a Refresh Token … I would like the Access Tokens 
>>> in all of the above cases to be automatically revoked as well.  I just want 
>>> to make sure I understand the model.  Thanks.
>>> Doug Foiles
>>> Intuit
>>> 
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>> 
>> 
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
> 
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to