Justin,

Your reason was you copied connect. Ok. I was looking for a technical reason.  
A security reason.

BTW.  Mike Jones says expiry wasn't the reason.  

Phil

@independentid
www.independentid.com
phil.h...@oracle.com





On 2013-05-17, at 9:01 AM, Justin Richer wrote:

> The separation between these two is necessary: Not all clients have 
> client_secret, and you want the lifecycle/management of the registration to 
> be protected. This is what the registration access token was made for. In 
> older versions of Connect's registration, the client_secret was forced on all 
> clients in order to provide this, but then you had public clients with a 
> client_secret that they couldn't use to get tokens, and it was a bad 
> disconnect.
> 
> The requirement for client secrets to expire or otherwise be rotated by the 
> server came from several implementors in the Connect WG. There's an easy way 
> to indicate that they don't expire, and a fairly straightforward way for them 
> to be rotated (client does a GET on its client configuration endpoint url, 
> with its registration access token as auth).
> 
> -- Justin
> 
> On 05/16/2013 05:35 PM, Phil Hunt wrote:
>> All,
>> 
>> In the dynamic registration draft, a new token type is defined called the 
>> "registration access token". Its use is intended to facilitate clients being 
>> able to update their registration and obtain new client credentials over 
>> time.  The client credential is issued on completion of the initial 
>> registration request by a particular client instance.
>> 
>> It appears the need for the registration access token arises from the 
>> implied assertion that client credentials should expire.
>> --> Is anyone expiring client credentials?
>> 
>> To date, we haven't had much discussion about client credential expiry. It 
>> leads me to the following questions:
>> 
>> 1.  Is there technical value with client credential/token expiry?  Keep in 
>> mind that client credential is only used with the token endpoint over TLS 
>> connection. It is NOT used to access resources directly.
>> 
>> 2.  If yes, on what basis should client credential/token expire?
>>   a.  Time?
>>   b.  A change to the client software (e.g. version update)?
>>   c.  Some other reason?
>> 
>> 3. Is it worth the complication to create a new token type (registration 
>> access token) just to allow clients to obtain new client tokens?  Keep in 
>> mind that client tokens are only usable with the AS token endpoint.  Why not 
>> instead use a client token for dyn reg and token endpoint with the rule that 
>> once a client token has expired (if they expire), an expired token may still 
>> be used at the registration end-point.
>> 
>> 4. Are there other reasons for the registration token?
>> 
>> Thanks,
>> 
>> Phil
>> 
>> @independentid
>> www.independentid.com
>> phil.h...@oracle.com
>> 
>> 
>> 
>> 
>> 
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
> 

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to