Adam,

We have made some changes in the latest draft to address some input from Google 
that I think may also address your need to using the id_token in an assertion 
or possibly as an access token to a federated RS.

I can go over it with you if you like.

John B.

On 2013-02-06, at 9:05 AM, Lewis Adam-CAL022 <adam.le...@motorolasolutions.com> 
wrote:

> Hi Bill,
>  
> My reason for using OAuth rather than OIDC is because the id_token in OIDC is 
> audience restricted to the client.  This was clearly intended for WebSSO / 
> authentication to a client running on a web server.  It does not help the 
> case where the user of a RESTful native client want to authenticate to a 
> RESTful web service. 
>  
> I agree that OAuth lacks a “defined” way to communicate what is in the AT (as 
> OAuth does not define the content of the AT), but within an enterprise domain 
> this is easy to solve by profiling.  And in any implementation of OAuth on 
> the Internet, the AT must at some level identify the user to the RS.  
> Otherwise how else would the RS know who’s protected resources the client is 
> trying to access?  Now whether the RS learns that through introspection or by 
> parsing a JWT-structured AT is of course not defined.  But at the end of the 
> day, the AT definitely (in all cases that I can think of) identifies the 
> user. 
>  
> I am open minded to using OIDC if in the future if the client can request an 
> id_token that is audience restricted to the RS it is going to communicate.  
> In other words, yes I agree that OIDC is the preferred mechanism for 
> performing “user authentication to a client,” but I also argue that OAuth is 
> the best method to perform “user authentication to an RS” (if you want to get 
> your RS out of the password consumption business).  I am not at all 
> advocating OAuth for authentication to a client. 
>  
> -adam
>  
> From: William Mills [mailto:wmills_92...@yahoo.com] 
> Sent: Tuesday, February 05, 2013 6:49 PM
> To: Lewis Adam-CAL022; Tim Bray
> Cc: "WG <oauth@ietf.org>"@il06exr02.mot.com
> Subject: Re: [OAUTH-WG] Why OAuth it self is not an authentication framework ?
>  
> Why use OAuth when OpenID does everything that OAuth can do as an 
> authentication method and does a few things much better?
>  
> Specifically OAuth lacks any defined way to:
>  
> -    feed back any additional information like the real user ID (as opposed 
> to what the entered)
> -    bound an authentication event in time
> -    provide any form of additional SSO payload like a display name for the 
> user
>  
> there's probably other things.
>  
> It'll mostly work but there are things it doesn't do.  Could you solve some 
> of the rest of this with token introspection or a user API that the RP could 
> use to fetch user info, sure, but why rebuild OpenID when OpenID exists?
>  
> -bill
>  
>  
> From: Lewis Adam-CAL022 <adam.le...@motorolasolutions.com>
> To: Tim Bray <twb...@google.com>; William Mills <wmills_92...@yahoo.com> 
> Cc: "oauth@ietf.org WG" <oauth@ietf.org> 
> Sent: Tuesday, February 5, 2013 2:27 PM
> Subject: RE: [OAUTH-WG] Why OAuth it self is not an authentication framework ?
>  
> I think this is becoming a largely academic / philosophical argument by this 
> time.  The people who designed OAuth will likely point out that it was 
> conceptualized as an authorization protocol to enable a RO to delegate access 
> to a client to access its protected resources on some RS.  And of course this 
> is the history of it.  And the RO and end-user were typically the same 
> entity.  But get caught up in what it was envisioned to do vs. real life use 
> cases that OAuth can solve (and is solving) beyond its initial use cases 
> misses the point … because OAuth is gaining traction in the enterprise and 
> will be used in all different sorts of ways, including authentication. 
>  
> This is especially true of RESTful APIs within an enterprise where the RO and 
> end-user are *not* the same: e.g. RO=enterprise and end-user=employee.  In 
> this model the end-user is not authorizing anything when their client 
> requests a token from the AS … they authenticate to the AS and the client 
> gets an AT, which will likely be profiled by most enterprise deployments to 
> look something like an OIDC id_token.  The AT will be presented to the RS 
> which will examine the claims (user identity, LOA, etc.) and make 
> authorization decisions based on business logic.  The AT has not authorized 
> the user to do anything, it has only made an assertion that the user has been 
> authenticated by the AS (sort of sounds a lot like an IdP now).
>  
> All this talked of OAuth being authorization and not authentication was 
> extremely confusing to me when I first started looking at OAuth for my use 
> cases, and I think at some point the authors of OAuth are going to have to 
> recognize that their baby has grown up to be multi-faceted (and I mean this 
> as a complement).  The abstractions left in the OAuth spec (while some have 
> claimed of the lack of interoperability it will cause) will also enable it to 
> be used in ways possibly still not envisioned by any of us.  I think as soon 
> as we can stop trying to draw the artificial line around OAuth being “an 
> authorization protocol” the better things will be.
>  
> I like to say that they authors had it right when they named it “OAuth” and 
> not “OAuthR” J
>  
> -adam
>  
> From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of Tim 
> Bray
> Sent: Tuesday, February 05, 2013 3:28 PM
> To: William Mills
> Cc: oauth@ietf.org WG
> Subject: Re: [OAUTH-WG] Why OAuth it self is not an authentication framework ?
>  
> OIDC seems about the most plausible candidate for a “good general solution” 
> that I’m aware of.   -T
> On Tue, Feb 5, 2013 at 1:22 PM, William Mills <wmills_92...@yahoo.com> wrote:
> There are some specific design mis-matches for OAuth as an authentication 
> protocol, it's not what it's designed for and there are some problems you 
> will run into.  Some have used it as such, but it's not a good general 
> solution.
>  
> -bill
>  
> From: Paul Madsen <paul.mad...@gmail.com>
> To: John Bradley <ve7...@ve7jtb.com> 
> Cc: "oauth@ietf.org WG" <oauth@ietf.org> 
> Sent: Tuesday, February 5, 2013 1:12 PM
> Subject: Re: [OAUTH-WG] Why OAuth it self is not an authentication framework ?
>  
> why pigeonhole it? 
> 
> OAuth can be deployed with no authz semantics at all (or at least as little 
> as any authn mechanism), e.g client creds grant type with no scopes
> 
> I agree that OAuth is not an *SSO* protocol.
> On 2/5/13 3:36 PM, John Bradley wrote:
> OAuth is an Authorization protocol as many of us have pointed out.
>  
> The post is largely correct and based on one of mine.
>  
> John B.
>  
> On 2013-02-05, at 12:52 PM, Prabath Siriwardena <prab...@wso2.com> wrote:
>  
> FYI and for your comments..
>  
> http://blog.facilelogin.com/2013/02/why-oauth-it-self-is-not-authentication.html
>  
> Thanks & Regards,
> Prabath
>  
> Mobile : +94 71 809 6732 
> http://blog.facilelogin.com/
> http://rampartfaq.com/
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>  
>  
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>  
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
> 
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>  
>  
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to