I am not advocating anything, only sting what people are doing now. How authorization is communicated between the AS and RS via a token that is opaque to the client is out of scope fro OAuth core, it might be magic pixy dust.
This has lead to a number of ways people are doing it. JWT along with JOSE provide a container to get some claims from the AS to the RS though the JWT is not specific to this and is used in the assertions profile and other specs for many things other than access tokens. Yes a profile of JWT for an access token as an access token is needed, Yes further profiling is required for a JWT access token using MAC. The format of the authorization claims is not tightly bound to MAC and might be used with other bearer JWT tokens. I don't know that there will be only one way to communicate those claims because different sorts of implementations need different information for the RS to act on. Recommendations are fine but defining a field called scope and passing on exactly the scopes the client was granted is not going to work for everyone for lots of good reasons. John B. On 2013-02-28, at 8:24 AM, Phil Hunt <phil.h...@oracle.com> wrote: > Are you advocating TWO systems? That seems like a bad choice. > > I would rather fix scope than go to a two system approach. > > Phil > > Sent from my phone. > > On 2013-02-28, at 8:17, John Bradley <ve7...@ve7jtb.com> wrote: > >> While scope is one method that a AS could communicate authorization to a RS, >> it is not the only or perhaps even the most likely one. >> Using scope requires a relatively tight binding between the RS and AS, UMA >> uses a different mechanism that describes finer grained operations. >> The AS may include roles, user, or other more abstract claims that the the >> client may (god help them) pass on to EXCML for processing. >> >> While having a scopes claim is possible, like any other claim it is not part >> of the JWT core security processing claims, and needs to be defined by >> extension. >> >> John B. >> On 2013-02-28, at 2:29 AM, Hannes Tschofenig <hannes.tschofe...@gmx.net> >> wrote: >> >>> Hi Mike, >>> >>> when I worked on the MAC specification I noticed that the JWT does not have >>> a claim for the scope. I believe that this would be needed to allow the >>> resource server to verify whether the scope the authorization server >>> authorized is indeed what the client is asking for. >>> >>> Ciao >>> Hannes >>> >>> _______________________________________________ >>> OAuth mailing list >>> OAuth@ietf.org >>> https://www.ietf.org/mailman/listinfo/oauth >> >> _______________________________________________ >> OAuth mailing list >> OAuth@ietf.org >> https://www.ietf.org/mailman/listinfo/oauth
smime.p7s
Description: S/MIME cryptographic signature
_______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth