OAuth doesn't get into the business of what the UI for managing grants is like. Having the user, admin, or resource owner revoke, downscope, or otherwise alter a grant needs to happen with user interactions that are going to be different depending on the provider and use case.

 -- Justin

On 02/21/2013 10:42 AM, Donald F Coffin wrote:

Torsten,

Thanks for the response. What is the "respective portal belonging to the AS"? I haven't seen anything in the OAuth 2.0 Authorization Framework that describes a "portal" on the AS a Resource Owner can log into to view a valid list of authorization grants. Is this an out-of-band implementation suggestion?

Best regards,

Don

Donald F. Coffin

Founder/CTO

REMI Networks

22751 El Prado Suite 6216

Rancho Santa Margarita, CA  92688-3836

Phone: (949) 636-8571

Email: donald.cof...@reminetworks.com <mailto:donald.cof...@reminetworks.com>

*From:*Torsten Lodderstedt [mailto:tors...@lodderstedt.net]
*Sent:* Thursday, February 21, 2013 12:13 AM
*To:* Donald F Coffin
*Cc:* <oauth@ietf.org>; Anne Hendry; Dave Robin; Edward Denson; Jay Mitra; John Adkins; John Teeter; Lynne Rodoni; Marty Burns; <pmad...@pingidentity.com>; Ray Perlner; Scott Crowder; Uday Verma
*Subject:* Re: draft-ietf-oauth-revocation-05 Questions

Hi Donald,

thank you for sharing your thoughts with us. I've never seen revocation as change of scope of the authorization, but it sounds reasonable. The current design handles the issues you raised differently.

The AS is involved in the revocation process as it exposes the revocation endpoint. So if the token is revoked (from a technical perspective), it knows it. If the user wants to check whether the application really sent the request, she is supposed to visit the respective portal belonging to the AS. There the AS provides a list of all valid authorization grants in its database.

Does this address your issues?

regards,

Torsten.


Am 21.02.2013 um 01:09 schrieb "Donald F Coffin" <donald.cof...@reminetworks.com <mailto:donald.cof...@reminetworks.com>>:

    Torsten,

    A colleague of mine and I were discussing what should occur when a
    Retail Customer desires to change the existing authorized access
    of a Third Party.  During our discussion they asked "How does the
    Retail Customer know the Third Party actually issued a Token
    revocation request?  Isn't there a potential trust issue with the
    current design"?

    The current draft provides a Third Party mechanism that "allows a
    client to invalidate its tokens if the end-user logs out, changes
    identity, or uninstalls the respective application (sic)." While
    none of these fit the situation we were discussing they do seem to
    be based on the assumption a Third Party application will be a
    good citizen and stop using access tokens. Unfortunately, none of
    the addressed situations require the participation of a AS for
    completion, therefore the risk exists that a Retail Customer may
    believe they have removed a Third Party application from accessing
    their protected data, but in reality there does not seem to be a
    mechanism to either force or verify the Third Party can no longer
    have access to the protected data.

    A possible modification to the current draft that would correct
    this potential security risk, is to treat a Token revocation using
    a message flow similar to the existing authorization_code response
    type.  A Retail Customer requesting a change to the Third Party
    authorized access would be redirected to an AS endpoint that would
    allow the Retail Customer to either terminate a relationship
    completely or modify the existing Third Party access
    authorization.  The successful response from the AS would indicate
    the Third Party needs to remove the current Token from its Token
    store.  In the event the Retail Customer has changed the Third
    Party access authorization, the AS response could include an
    optional "scope" element, which the Third Party would then use to
    obtain a new access token utilizing an Authorization Code request.

    There are several other potential implementations that could be
    developed to protect a Retail Customer from a "rogue" Third Party
    application that does not inform the AS their authorization to
    access a Retail Customer's protected data has been revoked, but
    the above suggestion meets the current draft's view that Third
    Parties should be able to request Tokens be revoked.

    I look forward to your comments on the above topic.

    Best regards,

    Don

    Donald F. Coffin

    Founder/CTO

    REMI Networks

    22751 El Prado Suite 6216

    Rancho Santa Margarita, CA  92688-3836

    Phone: (949) 636-8571

    Email: donald.cof...@reminetworks.com
    <mailto:donald.cof...@reminetworks.com>



_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to