That is incorrect. A client grant request still results in a separate access 
token issued. 

Phil

On 2013-05-17, at 11:53, Donald F Coffin <donald.cof...@reminetworks.com> wrote:

> The statement "Keep in mind that client credential is only used with the
> token endpoint over TLS connection. It is NOT used to access resources
> directly." is incorrect.  Section 4.4 of RFC 6749 states:
> 
>    The client can request an access token using only its client
> credentials (or other supported means of authentication) when the client is
> requesting access to the protected
>    resources under its control, or those of another resource owner that
> have been previously arranged with the authorization server (the method of
> which is beyond the scope
>    of this specification).
> 
> I have interpreted section 4.4 to imply that a client who has been granted
> access to resources via an authorization code, for example, may use their
> client credentials to access either a single
> resource or multiple resources for which they have been granted access.
> Although it is possible to never expire an access token obtained using
> client credentials, I believe not expiring the
> token, since it allows access to resources, is not desirable from a security
> stand point.
> 
> On the other hand, the registration_access_token clearly will not allow a
> client to access any resources and can only be used with client application
> information.
> 
> Best regards,
> Don
> Donald F. Coffin
> Founder/CTO
> 
> REMI Networks
> 22751 El Prado Suite 6216
> Rancho Santa Margarita, CA  92688-3836
> 
> Phone:      (949) 636-8571
> Email:       donald.cof...@reminetworks.com
> 
> -----Original Message-----
> From: Mike Jones [mailto:michael.jo...@microsoft.com] 
> Sent: Thursday, May 16, 2013 3:27 PM
> To: Phil Hunt; oauth@ietf.org WG
> Subject: Re: [OAUTH-WG] Client Credential Expiry and new Registration Access
> Token - draft-ietf-oauth-dyn-reg-10
> 
> This is nothing more than an RFC 6750 bearer token.  These can expire, as
> explained in that draft.  (The can also be issued an a manner that they
> don't expire.)  Nothing new is being invented in this regard.
> 
>                -- Mike
> 
> -----Original Message-----
> From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of
> Phil Hunt
> Sent: Thursday, May 16, 2013 2:35 PM
> To: oauth@ietf.org WG
> Subject: [OAUTH-WG] Client Credential Expiry and new Registration Access
> Token - draft-ietf-oauth-dyn-reg-10
> 
> All,
> 
> In the dynamic registration draft, a new token type is defined called the
> "registration access token". Its use is intended to facilitate clients being
> able to update their registration and obtain new client credentials over
> time.  The client credential is issued on completion of the initial
> registration request by a particular client instance.
> 
> It appears the need for the registration access token arises from the
> implied assertion that client credentials should expire. 
> --> Is anyone expiring client credentials?
> 
> To date, we haven't had much discussion about client credential expiry. It
> leads me to the following questions:
> 
> 1.  Is there technical value with client credential/token expiry?  Keep in
> mind that client credential is only used with the token endpoint over TLS
> connection. It is NOT used to access resources directly.
> 
> 2.  If yes, on what basis should client credential/token expire?
>  a.  Time?
>  b.  A change to the client software (e.g. version update)?
>  c.  Some other reason?
> 
> 3. Is it worth the complication to create a new token type (registration
> access token) just to allow clients to obtain new client tokens?  Keep in
> mind that client tokens are only usable with the AS token endpoint.  Why not
> instead use a client token for dyn reg and token endpoint with the rule that
> once a client token has expired (if they expire), an expired token may still
> be used at the registration end-point.
> 
> 4. Are there other reasons for the registration token?
> 
> Thanks,
> 
> Phil
> 
> @independentid
> www.independentid.com
> phil.h...@oracle.com
> 
> 
> 
> 
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
> 
> 
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to