Yes. I specified the trivial solution to anonymous clients earlier.

Even simpler. You don't need an access token to create a new resource. You just 
need one to access one. That is just basic security config. 

Phil

On 2013-05-31, at 12:34, Justin Richer <jric...@mitre.org> wrote:

> I agree that we are going in circles, since I just was going to bring up my 
> counter argument of "what about clients with no credentials?" again, which 
> *still* isn't addressed by what you suggest doing, below. I also believe that 
> getting rid of the Registration Access Token but using some other token 
> method would actually make the spec larger, though I'd be glad to review a 
> concrete counter-proposal if you'd like to write one. And the fact that OIDC 
> is doing it this way, and considered but rejected the way that you're 
> describing, should say something to the WG here about whether or not this is 
> the right choice. Rough consensus and running code, after all.
> 
> Regardless, I agree to park this issue and leave the text as is. We'll move 
> to the next draft in the last call process shortly, as I have a handful of 
> non-normative editorial changes that I need to make, thanks to feedback from 
> a few folks.
> 
> Again, thanks for your thorough review, Phil, and I look forward to future 
> feedback.
> 
>  -- Justin
> 
> On 05/31/2013 12:28 PM, Phil Hunt wrote:
>> I disagree. 
>> 
>> There is absolutely no need for a registration access token. 
>> 
>> Get rid of it and just use access tokens as per 6749. If you can't follow 
>> 6749 and need new issuing methods, what are others to say regarding 
>> inventing new methods?
>> 
>> I have not heard a good reason for the special process or one good enough to 
>> warrant a new method for issuing an access token. Does the broader group 
>> realize this is what the spec says?
>> 
>> Yes, i heard a lot saying OIDC does it this way. But that is a political 
>> reason, not a technical reason. Still, compatibility is always a strong 
>> objective.  Even so, oidc could keep using their method just fine. There is 
>> no obligation here to do the same. 
>> 
>> The only reason so far was expiry of client creds. Well, why not require the 
>> client to update prior to expiry? It makes no sense to have another token 
>> with longer expiry. B'sides, even expired the client can re-register from 
>> scratch. 
>> 
>> Why force the client to persist multiple tokens and creds? That is far far 
>> too complex. 
>> 
>> Finally if you get rid of registration access token the spec size will drop 
>> roughly in half IMO. This suggests simplicity to me. 
>> 
>> Apologies for my rant. Maybe we should park this for now. We are going in 
>> circles. 
>> 
>> Phil
>> 
>> On 2013-05-31, at 11:25, Justin Richer <jric...@mitre.org> wrote:
>> 
>>> Phil,
>>> 
>>> We *can* keep it straight just fine, but I just need you to be clear about 
>>> which part you're objecting to because the answers are different. Please 
>>> use the terms as defined in the document so that we all know which 
>>> component we're talking about. I'm sure you'd agree than in specification 
>>> work such as this, precision of language and labels is key for 
>>> communication between parties. This is precisely why there's a Terminology 
>>> section right up front, so that when I say "Registration Access Token" you 
>>> can know that I mean a very specific thing, and when I say "Initial 
>>> Registration Token" I mean a very different specific thing. So I'm asking 
>>> you, please, use the defined terms so that we can avoid this unnecessary 
>>> confusion.
>>> 
>>> But anyway, what you're talking about below, "the token the client uses to 
>>> update is profile" *IS* the Registration Access Token. That's all that that 
>>> token is used for. You're not asking for it to go away, you're asking for 
>>> it to come from the Token Endpoint instead of the response from the 
>>> Registration Endpoint. I don't see how the client *can* get it from the 
>>> normal token process without jumping through specialized hoops to make that 
>>> happen. I've implemented the draft the way that it is right now, both 
>>> client and server side, and it works. Others have implemented it, too. 
>>> We've done interop testing, and it works. This is a proven pattern and from 
>>> where I sit there is both rough consensus and running code.
>>> 
>>> I believe that I've already pointed out how the solutions you've proposed 
>>> so far won't work in practice, for various reasons, many of which have 
>>> already been brought up and discussed previously. If you have another way 
>>> for the client to get its Registration Access Token, please propose it; but 
>>> I haven't seen anything yet that will fly.
>>> 
>>>  -- Justin
>>> 
>>> On 05/31/2013 11:10 AM, Phil Hunt             wrote:
>>>> Justin,
>>>> 
>>>> This is my primary objection! We can't keep it straight. Their should be 
>>>> no such thing as a registrstion access token!  Just the token the client 
>>>> obtains to update its profile through the normal token request process. 
>>>> 
>>>> Phil
>>>> 
>>>> On 2013-05-31, at 10:55, Justin Richer <jric...@mitre.org> wrote:
>>>> 
>>>>> Which token are you referring to here?
>>>>> 
>>>>> If it's the Initial Registration Token, then you could get that through 
>>>>> the normal token server no problem. (The lifecycle writeups don't call 
>>>>> this out explicitly but I would be willing to do so.) Or you could get it 
>>>>> elsewhere. Doesn't matter, just like it doesn't matter with any other 
>>>>> OAuth2 protected resource.
>>>>> 
>>>>> If it's the Registration Access Token, then having the token come from 
>>>>> the token endpoint would require a lot more work and complexity on behalf 
>>>>> of both of the client and server. Either you end up with public clients 
>>>>> getting secrets they shouldn't need or with granting clients access to 
>>>>> the client_credentials flow when they shouldn't actually have it. Plus it 
>>>>> adds extra round trips which don't buy you anything.
>>>>> 
>>>>>  -- Justin
>>>>> 
>>>>> On 05/31/2013 10:15 AM, Phil Hunt wrote:
>>>>>> The preference is to have the access token for registration issued by 
>>>>>> the normal token server rather then by the registration endpoint. 
>>>>>> 
>>>>>> In the current draft it is obtained through a unique process and must 
>>>>>> outlive the client. 
>>>>>> 
>>>>>> Phil
>>>>>> 
>>>>>> On 2013-05-30, at 19:47, "Richer, Justin P." <jric...@mitre.org> wrote:
>>>>>> 
>>>>>>> I don't understand any of the comments below -- it already *is* an 
>>>>>>> OAuth2 protected resource without any special handling. Your access 
>>>>>>> tokens can be short-lived, long-lived, federated, structured, random 
>>>>>>> blobs ... totally doesn't matter. They are access tokens being used to 
>>>>>>> access a normal protected resource. Full stop.
>>>>>>> 
>>>>>>> Anything else is out of scope. The lifecycle discussions at the 
>>>>>>> beginning are merely examples of some ways you *could* use it and are 
>>>>>>> non-normative and non-exhaustive.
>>>>>>> 
>>>>>>> You seem to be asking for something that's already in the draft.
>>>>>>> 
>>>>>>>  -- Justin
>>>>>>> 
>>>>>>> From: Phil Hunt [phil.h...@oracle.com]
>>>>>>> Sent: Thursday, May 30, 2013 7:31 PM
>>>>>>> To: Richer, Justin P.
>>>>>>> Cc: John Bradley; oauth@ietf.org                               WG
>>>>>>> Subject: Re: [OAUTH-WG] review comments on 
>>>>>>> draft-ietf-oauth-dyn-reg-11.txt
>>>>>>> 
>>>>>>> 
>>>>>>> 
>>>>>>> Phil
>>>>>>> 
>>>>>>> On 2013-05-30, at 16:11, "Richer, Justin P." <jric...@mitre.org> wrote:
>>>>>>> 
>>>>>>>> Comments inline, marked by [JR].
>>>>>>>> 
>>>>>>>> From: Phil Hunt [phil.h...@oracle.com]
>>>>>>>> Sent: Thursday, May 30, 2013 5:25 PM
>>>>>>>> To: Richer, Justin P.
>>>>>>>> Cc: John Bradley; oauth@ietf.org WG
>>>>>>>> Subject: Re: [OAUTH-WG] review comments on 
>>>>>>>> draft-ietf-oauth-dyn-reg-11.txt
>>>>>>>> 
>>>>>>>> See below.
>>>>>>>> Phil
>>>>>>>> 
>>>>>>>> @independentid
>>>>>>>> www.independentid.com
>>>>>>>> phil.h...@oracle.com
>>>>>>>> 
>>>>>>>> 
>>>>>>>> 
>>>>>>>> 
>>>>>>>> 
>>>>>>>> On 2013-05-30, at 2:09 PM, Justin Richer wrote:
>>>>>>>> 
>>>>>>>>> OK, I think see part of the hang                                      
>>>>>>>>>        up. I have not seen the scenario that you describe, where you 
>>>>>>>>> trade a 3rd party token for a "local" token. I have seen where access 
>>>>>>>>> tokens are federated directly at the PR. (Introspection lets you do 
>>>>>>>>> some good things with that pattern.)
> 
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to