Yes, that's correct, the actions you've described and the "portal/UI"
components are of band as far as the OAuth 2 protocol is concerned. In
fact, you don't *have* to have anything of the sort, though many
deployments and implementations do have it in some fashion.
To bring it back to the original question: the token revocation endpoint
is meant to service well-meaning clients who want to clean up any tokens
they have in the wild. It's not meant for something end-users or
resource owners would be dealing with directly.
-- Justin
On 02/21/2013 11:21 AM, Donald F Coffin wrote:
Justin,
My response was not meant to ask the UI of the "respective portal
belonging to the AS". The question was where in the various OAuth 2.0
Authorization Framework is such a portal even discussed? Clearly if
it is NOT discussed in any existing OAuth 2.0 Authorization Framework
RFC or existing draft, then it must be an out-of-band customized
implementation.
Best regards,
Don
Donald F. Coffin
Founder/CTO
REMI Networks
22751 El Prado Suite 6216
Rancho Santa Margarita, CA 92688-3836
Phone: (949) 636-8571
Email: donald.cof...@reminetworks.com
<mailto:donald.cof...@reminetworks.com>
*From:*Justin Richer [mailto:jric...@mitre.org]
*Sent:* Thursday, February 21, 2013 8:02 AM
*To:* Donald F Coffin
*Cc:* 'Torsten Lodderstedt'; 'John Adkins'; 'Marty Burns'; 'Scott
Crowder'; 'Dave Robin'; 'John Teeter'; pmad...@pingidentity.com;
'Edward Denson'; 'Jay Mitra'; 'Uday Verma'; 'Ray Perlner'; 'Anne
Hendry'; 'Lynne Rodoni'; oauth@ietf.org
*Subject:* Re: [OAUTH-WG] draft-ietf-oauth-revocation-05 Questions
OAuth doesn't get into the business of what the UI for managing grants
is like. Having the user, admin, or resource owner revoke, downscope,
or otherwise alter a grant needs to happen with user interactions that
are going to be different depending on the provider and use case.
-- Justin
On 02/21/2013 10:42 AM, Donald F Coffin wrote:
Torsten,
Thanks for the response. What is the "respective portal belonging
to the AS"? I haven't seen anything in the OAuth 2.0
Authorization Framework that describes a "portal" on the AS a
Resource Owner can log into to view a valid list of authorization
grants. Is this an out-of-band implementation suggestion?
Best regards,
Don
Donald F. Coffin
Founder/CTO
REMI Networks
22751 El Prado Suite 6216
Rancho Santa Margarita, CA 92688-3836
Phone: (949) 636-8571
Email: donald.cof...@reminetworks.com
<mailto:donald.cof...@reminetworks.com>
*From:*Torsten Lodderstedt [mailto:tors...@lodderstedt.net]
*Sent:* Thursday, February 21, 2013 12:13 AM
*To:* Donald F Coffin
*Cc:* <oauth@ietf.org> <mailto:oauth@ietf.org>; Anne Hendry; Dave
Robin; Edward Denson; Jay Mitra; John Adkins; John Teeter; Lynne
Rodoni; Marty Burns; <pmad...@pingidentity.com>
<mailto:pmad...@pingidentity.com>; Ray Perlner; Scott Crowder;
Uday Verma
*Subject:* Re: draft-ietf-oauth-revocation-05 Questions
Hi Donald,
thank you for sharing your thoughts with us. I've never seen
revocation as change of scope of the authorization, but it sounds
reasonable. The current design handles the issues you raised
differently.
The AS is involved in the revocation process as it exposes the
revocation endpoint. So if the token is revoked (from a technical
perspective), it knows it. If the user wants to check whether the
application really sent the request, she is supposed to visit the
respective portal belonging to the AS. There the AS provides a
list of all valid authorization grants in its database.
Does this address your issues?
regards,
Torsten.
Am 21.02.2013 um 01:09 schrieb "Donald F Coffin"
<donald.cof...@reminetworks.com
<mailto:donald.cof...@reminetworks.com>>:
Torsten,
A colleague of mine and I were discussing what should occur
when a Retail Customer desires to change the existing
authorized access of a Third Party. During our discussion
they asked "How does the Retail Customer know the Third Party
actually issued a Token revocation request? Isn't there a
potential trust issue with the current design"?
The current draft provides a Third Party mechanism that
"allows a client to invalidate its tokens if the end-user logs
out, changes identity, or uninstalls the respective
application (sic)." While none of these fit the situation we
were discussing they do seem to be based on the assumption a
Third Party application will be a good citizen and stop using
access tokens. Unfortunately, none of the addressed situations
require the participation of a AS for completion, therefore
the risk exists that a Retail Customer may believe they have
removed a Third Party application from accessing their
protected data, but in reality there does not seem to be a
mechanism to either force or verify the Third Party can no
longer have access to the protected data.
A possible modification to the current draft that would
correct this potential security risk, is to treat a Token
revocation using a message flow similar to the existing
authorization_code response type. A Retail Customer
requesting a change to the Third Party authorized access would
be redirected to an AS endpoint that would allow the Retail
Customer to either terminate a relationship completely or
modify the existing Third Party access authorization. The
successful response from the AS would indicate the Third Party
needs to remove the current Token from its Token store. In
the event the Retail Customer has changed the Third Party
access authorization, the AS response could include an
optional "scope" element, which the Third Party would then use
to obtain a new access token utilizing an Authorization Code
request.
There are several other potential implementations that could
be developed to protect a Retail Customer from a "rogue" Third
Party application that does not inform the AS their
authorization to access a Retail Customer's protected data has
been revoked, but the above suggestion meets the current
draft's view that Third Parties should be able to request
Tokens be revoked.
I look forward to your comments on the above topic.
Best regards,
Don
Donald F. Coffin
Founder/CTO
REMI Networks
22751 El Prado Suite 6216
Rancho Santa Margarita, CA 92688-3836
Phone: (949) 636-8571
Email: donald.cof...@reminetworks.com
<mailto:donald.cof...@reminetworks.com>
_______________________________________________
OAuth mailing list
OAuth@ietf.org <mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth