Hi
On 30/11/12 16:36, Phil Hunt wrote:
Two things.

1. I think access_token would be a bit confusing in some contexts even though thats what 
it is. However it is likely a foreign access token. "chain" is also shorter.

2. Regarding refresh, any idea on the use case? My impression is that if anything 
lifetime should be shorter than the current access token. All cases i have been 
looking at tend to be closer to single use -->  which has led o feedback that a 
single leg solution would be better for same domain cases.

If 2. refers to my comment re adding another optional parameter to the refresh grant: I thought, that the case of the immediate client issuing a down-scoping request with the help of the refresh grant is very similar to the RS issuing its own down-scoping request, with the only difference being that the proposed redelegate grant additionally introduces an access_token parameter.

My comment was only about the possibility of using the common processing path for both cases: if the scope is there it is a down-scoping request and if the access token parameter is there too then it must be a redelegate one.

However may be it is bad idea :-) to overload refresh grant further and having another dedicated grant type will work better longer term if some more parameters can be possibly added

thanks. Sergey


Phil

Sent from my phone.

On 2012-11-30, at 2:31, Sergey Beryozkin<sberyoz...@gmail.com>  wrote:

On 30/11/12 10:25, Ebling, Sebastian wrote:
Hi Phil,

Some comments on draft-richer-oauth-chain-00.txt:

Section 3.1.
- I dislike the name of the grant type. "redelegate" is the use case but not the grant 
presented to the AS from RS1. I suggest to use "access_token" according to other grant 
types like authorization_code, password, refresh_token.
Interesting. What about adding one more optional parameter to "refresh_grant" ?

thanks, Sergey

Section 3.2
"As this access token is bound to an existing access token, the authorization server 
MUST NOT issue a refresh token."
 From our operating experience [1] it may be useful to issue a refresh token in 
some cases.

Example:
RS1 may be a batch processing system that must be able to access RS2 some hours 
later to fulfill the originary request from the Client. The access tokens (AS 
to C and AS to RS1) may have expired when the job starts from the queue. 
Issuing a refresh token enables RS1 to obtain a fresh access token (AS to RS1).
AS may limit the duration of the refresh token for such clients (RS1).

Regards

Sebastian

[1] I'm a colleague of Torsten Lodderstedt at Deutsche Telekom, responsible for 
the system life cycle of our Secure Token Service. We have already implemented 
a very similar custom grant type for service chaining at Deutsche Telekom.
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to