Hi Adam, My employer's product supports the STS case for getting SAML to be used in the assertion flow. We and the employer of one of my co-authors on the spec have a few very significant mutual customers that are using it today. The JWT variant is 'on the road map' as we juggle other priorities and wait for JOSE/JWT specs to stabilize a little more. It's just a different token format from SAML though so I view it as much more concrete and likely to happen. Granted the nature of JWT lends itself better to the self-signed case so I think that will be more common but certainly won't preclude the STS case.
On Wed, Dec 5, 2012 at 7:48 AM, Lewis Adam-CAL022 < adam.le...@motorolasolutions.com> wrote: > Hi Brian,**** > > ** ** > > This is sort of my feeling on the STS as well (theoretical). Are there > any real-life examples of obtaining a JWT assertion from an STS that can be > used for the assertion flow? And if so then how is it obtained? It cannot > be an id_token because that is audience restricted to the client. I guess > it could be an access_token with a scope of assertion? But I’ve not seen > any discussion of that. I’ve been interested in this flow for a while but > the only examples I’m aware of are self-issued JWTs. I’d be very > interested in knowing real life of examples of clients obtaining a JWT > assertion from an STS to use as a grant, and the method they use to do that. > **** > > ** ** > > tx**** > > adam**** > > ** ** > > *From:* oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] *On Behalf > Of *Brian Campbell > *Sent:* Wednesday, December 05, 2012 8:05 AM > *To:* zhou.suj...@zte.com.cn > *Cc:* oauth@ietf.org > *Subject:* Re: [OAUTH-WG] Assertion Framework - Why does issuer have to > be either the client or a third party token service?**** > > ** ** > > I say that it's only theoretical because I don't believe there are any > actual deployments supporting, or planning on supporting, RO as an > assertion issuer. **** > > ** ** > > On Tue, Dec 4, 2012 at 5:39 PM, <zhou.suj...@zte.com.cn> wrote:**** > > > Why RO as an issuer is only theoretical today? > > **** > > *Brian Campbell <bcampb...@pingidentity.com>* **** > > 2012-12-04 23:41 **** > > 收件人**** > > Nat Sakimura <sakim...@gmail.com> **** > > 抄送**** > > zhou.suj...@zte.com.cn, "oauth@ietf.org" <oauth@ietf.org> **** > > 主题**** > > Re: [OAUTH-WG] Assertion Framework - Why does issuer have to be either the > client or a third party token service?**** > > ** ** > > > > > The intent was definitely not to constrain who/what could be the issuer. > But also try to provide > some guidance around the common cases that are actually being deployed > now, which are the client self-issued and STS variants. Resource owner as > an issuer is an interesting case but seems mostly theoretical at this point. > > I feel like mentioning the resource owner there in §5.1 would cause more > confusion than anything else. I'd prefer to just strike the whole sentence > in question and maybe add some additional text to §3 that clarifies that > the issuer can really be any entity, if folks think a change is needed > here? > > > > On Mon, Dec 3, 2012 at 9:20 PM, Nat Sakimura <sakim...@gmail.com> wrote: > Actually, "The issuer may be either > an OAuth client (when assertions are self-issued) or any other > entity, e.g., a third party > token service, resource owner. " is not really clean. > > OAuth client is just another example of an issuer. > > So, perhaps the sentence could be: > > "Example of issuers include an OAuth client, resource owner, an > independent third party." > > So, the clause becomes: > > Issuer The unique identifier for the entity that issued the > assertion. Generally this is the entity that holds the key > material used to generate the assertion. > Example of issuers include an OAuth client, resource owner, an > independent third party. > > Nat > > Nat > > On Tue, Dec 4, 2012 at 11:40 AM, <zhou.suj...@zte.com.cn> wrote: > > > > Chuck Mortimore <cmortim...@salesforce.com> 写于 2012-12-04 10:26:50: > > > > Please feel free to suggest better language. > > > > > Issuer simply allows the token service to know who created the > > assertion, so it can look them up and see if they're trusted. > > Effectively the same as an Issuer in SAML. > > a conflict : "The token service is the assertion issuer" in assertion > document. > while you said "token service know who created the assertion" > > I wonder if the following text is acceptable: > > Issuer The unique identifier for the entity that issued the > assertion. Generally this is the entity that holds the key > material used to generate the assertion. The issuer may be either > an OAuth client (when assertions are self-issued) or any other > entity, e.g., a third party > token service, resource owner. > > > 6.3. Client Acting on Behalf of a User > > The Issuer of the assertion MUST identify the entity that issued > the assertion as recognized by the Authorization Server. If the > assertion is self-issued, the Issuer SHOULD be the "client_id". > If the assertion was issued by a Security Token Service (STS), the > Issuer SHOULD identify the STS as recognized by the Authorization > Server.If the assertion was issued by the resource owner, the > Issuer SHOULD identify the resource owner as recognized by the > Authorization > Server. > > > > > -cmort > > > > On Dec 3, 2012, at 6:23 PM, <zhou.suj...@zte.com.cn> wrote: > > > > > > Obviously, it is not so clear from the language there. > > > > > > Chuck Mortimore <cmortim...@salesforce.com> 写于 2012-12-04 10:17:12: > > > > > There's no reason why it can't be resource owner today. > > > > > > On Dec 3, 2012, at 6:06 PM, <zhou.suj...@zte.com.cn> < > zhou.suj...@zte.com.cn > > > > wrote: > > > > > > > > > +1. > > > And why it was not looked at that time? > > > > > > oauth-boun...@ietf.org 写于 2012-12-04 01:30:55: > > > > > > > Actually, I think it is a good time to start looking at the resourse > > > > owner issuing assertions@ (Interestingly enough, Hui-Lan had brought > > > > this up a couple of years ago.) > > > > > > > > Igor > > > > > > > > On 12/3/2012 3:58 AM, Nat Sakimura wrote: > > > > I suppose, yes. I was reading it like that all the time. > > > > Whether it is or not, if it is still ok, it might be better to > > clarify it. > > > > Word like "third party" tends to be a bit of problem without > > > clearlydefining. > > > > I had similar experience in other fora. > > > > > > > > Nat > > > > > > > > Sent from iPad > > > > > > > > 2012/12/03 0:52、"zhou.suj...@zte.com.cn" <zhou.suj...@zte.com.cn> の > > > > メッセ�`ジ: > > > > > > > > > > > could be Resource owner? > > > > > > > > > > > > > > > "Tschofenig, Hannes (NSN - FI/Espoo)" <hannes.tschofe...@nsn.com> > > > > 发件人: oauth-boun...@ietf.org > > > > 2012-12-03 16:49 > > > > > > > > 收件人 > > > > > > > > "ext Nat Sakimura" <sakim...@gmail.com>, "Brian Campbell" < > > > > bcampb...@pingidentity.com>, "oauth" <oauth@ietf.org> > > > > > > > > 抄送 > > > > > > > > 主题 > > > > > > > > Re: [OAUTH-WG] Assertion Framework - Why does issuer have to be > > > > either the client or a third party token service? > > > > > > > > > > > > > > > > > > > > Hi Nat, > > > > > > > > The current text essentially says that the assertion can either be > > > > created by the client (in which case it is self-signed) or it can be > > > > created by some other entity (which is then called the third party > > > > token service). So, this third party could be the authorization > server. > > > > > > > > Ciao > > > > Hannes > > > > > > > > > > > > From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On > Behalf Of > > > > ext Nat Sakimura > > > > Sent: Monday, December 03, 2012 10:35 AM > > > > To: Brian Campbell; oauth > > > > Subject: [OAUTH-WG] Assertion Framework - Why does issuer have to be > > > > either the client or a third party token service? > > > > > > > > Hi Brian, > > > > > > > > > > > > The assertion framework defines the Issuer as: > > > > > > > > Issuer The unique identifier for the entity that issued the > > > > assertion. Generally this is the entity that holds the key > > > > material used to generate the assertion. The issuer may be > either > > > > an OAuth client (when assertions are self-issued) or a third > party > > > > token service. > > > > > > > > I was wondering why it has to be either the client or a third party > > > > token service. > > > > Conceptually, it could be any token service (functionality) > > > residingin any of > > > > > > > > the stakeholders (Resource Owner, OAuth Client, Authorization > Server, or > > > > a third party). > > > > > > > > > > > > I would appreciate if you could clarify why is the case. > > > > > > > > > > > > Best, > > > > > > > > -- > > > > Nat Sakimura (=nat) > > > > Chairman, OpenID Foundation > > > > http://nat.sakimura.org/ > > > > @_nat_en > > > > _______________________________________________ > > > > OAuth mailing list > > > > OAuth@ietf.org > > > > https://www.ietf.org/mailman/listinfo/oauth > > > > > > > > > > > > > > > _______________________________________________ > > > > OAuth mailing list > > > > OAuth@ietf.org > > > > https://www.ietf.org/mailman/listinfo/oauth > > > > _______________________________________________ > > > > OAuth mailing list > > > > OAuth@ietf.org > > > > https://www.ietf.org/mailman/listinfo/oauth > > > _______________________________________________ > > > OAuth mailing list > > > OAuth@ietf.org > > > https://www.ietf.org/mailman/listinfo/oauth > > _______________________________________________ > OAuth mailing list* > *OAuth@ietf.org* > *https://www.ietf.org/mailman/listinfo/oauth > > > > > -- > Nat Sakimura (=nat) > Chairman, OpenID Foundation* > *http://nat.sakimura.org/ > @_nat_en > > > _______________________________________________ > OAuth mailing list* > *OAuth@ietf.org* > *https://www.ietf.org/mailman/listinfo/oauth > > **** > > ** ** >
_______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth