Well the only client that wouldn't have a credential is an implicit client. An 
implicit client is transient and so would never update. 

Besides, as i have stated, implicit clients should not use dyn reg. 

Phil

On 2013-05-31, at 13:41, Justin Richer <jric...@mitre.org> wrote:

> But the outstanding question is: how do you get the access token to access 
> the created resource (IE: the Registration Access Token)? You can't use the 
> client_credentials flow for a client with no credentials!
> 
>  -- Justin
> 
> 
> On 05/31/2013 12:58 PM, Phil Hunt wrote:
>> Yes. I specified the trivial solution to anonymous clients earlier.
>> 
>> Even simpler. You don't need an access token to create a new resource. You 
>> just need one to access one. That is just basic security config. 
>> 
>> Phil
>> 
>> On 2013-05-31, at 12:34, Justin Richer <jric...@mitre.org> wrote:
>> 
>>> I agree that we are going in circles, since I just was going to bring up my 
>>> counter argument of "what about clients with no credentials?" again, which 
>>> *still* isn't addressed by what you suggest doing, below. I also believe 
>>> that getting rid of the Registration Access Token but using some other 
>>> token method would actually make the spec larger, though I'd be glad to 
>>> review a concrete counter-proposal if you'd like to write one. And the fact 
>>> that OIDC is doing it this way, and considered but rejected the way that 
>>> you're describing, should say something to the WG here about whether or not 
>>> this is the right choice. Rough consensus and running code, after all.
>>> 
>>> Regardless, I agree to park this issue and leave the text as is. We'll move 
>>> to the next draft in the last call process shortly, as I have a handful of 
>>> non-normative editorial changes that I need to make, thanks to feedback 
>>> from a few folks.
>>> 
>>> Again, thanks for your thorough review, Phil, and I look forward to future 
>>> feedback.
>>> 
>>>  -- Justin
>>> 
>>> On 05/31/2013 12:28 PM, Phil Hunt             wrote:
>>>> I disagree. 
>>>> 
>>>> There is absolutely no need for a registration access token. 
>>>> 
>>>> Get rid of it and just use access tokens as per 6749. If you can't follow 
>>>> 6749 and need new issuing methods, what are others to say regarding 
>>>> inventing new methods?
>>>> 
>>>> I have not heard a good reason for the special process or one good enough 
>>>> to warrant a new method for issuing an access token. Does the broader 
>>>> group realize this is what the spec says?
>>>> 
>>>> Yes, i heard a lot saying OIDC does it this way. But that is a political 
>>>> reason, not a technical reason. Still, compatibility is always a strong 
>>>> objective.  Even so, oidc could keep using their method just fine. There 
>>>> is no obligation here to do the same. 
>>>> 
>>>> The only reason so far was expiry of client creds. Well, why not require 
>>>> the client to update prior to               expiry? It makes no sense to 
>>>> have another token with longer expiry. B'sides, even expired the client 
>>>> can re-register from scratch. 
>>>> 
>>>> Why force the client to persist multiple tokens and creds? That is far far 
>>>> too complex. 
>>>> 
>>>> Finally if you get rid of registration access token the spec size will 
>>>> drop roughly in half IMO. This suggests simplicity to me. 
>>>> 
>>>> Apologies for my rant. Maybe we should park this for now. We are going in 
>>>> circles. 
>>>> 
>>>> Phil
>>>> 
>>>> On 2013-05-31, at 11:25, Justin Richer <jric...@mitre.org> wrote:
>>>> 
>>>>> Phil,
>>>>> 
>>>>> We *can* keep it straight just fine, but I just need you to be clear 
>>>>> about which part you're objecting to because the answers are different. 
>>>>> Please use the terms as defined in the document so that we all know which 
>>>>> component we're talking about. I'm sure you'd agree than                 
>>>>> in specification work such as this, precision of language and labels is 
>>>>> key for communication between parties. This is precisely why there's a 
>>>>> Terminology section right up front, so that when I say "Registration 
>>>>> Access Token" you can know that I mean a very specific thing, and when I 
>>>>> say "Initial Registration Token" I mean a very different specific thing. 
>>>>> So I'm asking you, please, use the defined terms so that we can avoid 
>>>>> this unnecessary confusion.
>>>>> 
>>>>> But anyway, what you're talking about below, "the token the client uses 
>>>>> to update is profile" *IS* the                 Registration Access Token. 
>>>>> That's all that that token is used for. You're not asking for it to go 
>>>>> away, you're asking for it to come from the Token Endpoint instead of the 
>>>>> response from the Registration Endpoint. I don't see                 how 
>>>>> the client *can* get it from the normal token process without jumping 
>>>>> through specialized hoops to make that happen. I've implemented the draft 
>>>>> the way that it is right now, both client and server side, and it works. 
>>>>> Others have implemented it, too. We've done interop testing, and it 
>>>>> works. This is a proven pattern                 and from where I sit 
>>>>> there is both rough consensus and running code.
>>>>> 
>>>>> I believe that I've already pointed out how the solutions you've proposed 
>>>>> so far won't work in practice, for various reasons, many of which have 
>>>>> already been brought up and discussed previously. If you have another way 
>>>>> for the client to get its Registration Access Token, please propose it; 
>>>>> but I haven't seen anything yet that will fly.
>>>>> 
>>>>>  -- Justin
>>>>> 
>>>>> On 05/31/2013 11:10 AM, Phil Hunt wrote:
>>>>>> Justin,
>>>>>> 
>>>>>> This is my primary objection! We can't keep it straight. Their should be 
>>>>>> no such thing as a registrstion access token!  Just the token the client 
>>>>>> obtains to update its profile through the normal token request process. 
>>>>>> 
>>>>>> Phil
>>>>>> 
>>>>>> On 2013-05-31, at 10:55, Justin Richer <jric...@mitre.org> wrote:
>>>>>> 
>>>>>>> Which token are you referring to here?
>>>>>>> 
>>>>>>> If it's the Initial Registration Token, then you could get that through 
>>>>>>> the normal token server no problem. (The lifecycle writeups don't call 
>>>>>>> this out explicitly but I would be willing to do so.) Or you could get 
>>>>>>> it elsewhere. Doesn't matter, just like it doesn't matter with any 
>>>>>>> other OAuth2 protected resource.
>>>>>>> 
>>>>>>> If it's the Registration Access Token, then having the token come from 
>>>>>>> the token endpoint would require a lot more work and complexity on 
>>>>>>> behalf of both of the client and server. Either you end up with public 
>>>>>>> clients getting secrets they shouldn't need or with granting clients 
>>>>>>> access to the client_credentials flow when they shouldn't actually have 
>>>>>>> it. Plus it adds extra round trips which don't buy you anything.
>>>>>>> 
>>>>>>>  -- Justin
>>>>>>> 
>>>>>>> On 05/31/2013 10:15 AM, Phil Hunt wrote:
>>>>>>>> The preference is to have the access token for registration issued by 
>>>>>>>> the normal token server rather then by the registration endpoint. 
>>>>>>>> 
>>>>>>>> In the current draft it is obtained through a unique process and must 
>>>>>>>> outlive the client. 
>>>>>>>> 
>>>>>>>> Phil
>>>>>>>> 
>>>>>>>> On 2013-05-30, at 19:47, "Richer, Justin P." <jric...@mitre.org> wrote:
>>>>>>>> 
>>>>>>>>> I don't understand any of the comments below -- it already *is* an 
>>>>>>>>> OAuth2 protected resource without any special handling. Your access 
>>>>>>>>> tokens can be short-lived, long-lived, federated, structured, random 
>>>>>>>>> blobs ... totally doesn't matter. They are access tokens being used 
>>>>>>>>> to access a normal protected resource. Full stop.
>>>>>>>>> 
>>>>>>>>> Anything else is out of scope. The lifecycle discussions at the 
>>>>>>>>> beginning are merely examples of some ways you *could* use it and are 
>>>>>>>>> non-normative and non-exhaustive.
>>>>>>>>> 
>>>>>>>>> You seem to be asking for something that's already in the draft.
>>>>>>>>> 
>>>>>>>>>  -- Justin
>>>>>>>>> 
>>>>>>>>> From: Phil Hunt [phil.h...@oracle.com]
>>>>>>>>> Sent: Thursday, May 30, 2013                                     7:31 
>>>>>>>>> PM
>>>>>>>>> To: Richer, Justin P.
>>>>>>>>> Cc: John Bradley; oauth@ietf.org WG
>>>>>>>>> Subject: Re: [OAUTH-WG] review comments on 
>>>>>>>>> draft-ietf-oauth-dyn-reg-11.txt
>>>>>>>>> 
>>>>>>>>> 
>>>>>>>>> 
>>>>>>>>> Phil
>>>>>>>>> 
>>>>>>>>> On 2013-05-30, at 16:11, "Richer, Justin P." <jric...@mitre.org> 
>>>>>>>>> wrote:
>>>>>>>>> 
>>>>>>>>>> Comments inline, marked by [JR].
>>>>>>>>>> 
>>>>>>>>>> From: Phil Hunt [phil.h...@oracle.com]
>>>>>>>>>> Sent: Thursday, May 30, 2013 5:25 PM
>>>>>>>>>> To: Richer, Justin P.
>>>>>>>>>> Cc: John Bradley; oauth@ietf.org WG
>>>>>>>>>> Subject: Re: [OAUTH-WG] review comments on 
>>>>>>>>>> draft-ietf-oauth-dyn-reg-11.txt
>>>>>>>>>> 
>>>>>>>>>> See below.
>>>>>>>>>> Phil
>>>>>>>>>> 
>>>>>>>>>> @independentid
>>>>>>>>>> www.independentid.com
>>>>>>>>>> phil.h...@oracle.com
>>>>>>>>>> 
>>>>>>>>>> 
>>>>>>>>>> 
>>>>>>>>>> 
>>>>>>>>>> 
>>>>>>>>>> On 2013-05-30, at 2:09 PM, Justin Richer wrote:
>>>>>>>>>> 
>>>>>>>>>>> OK, I think see part of the hang up. I have not seen the scenario 
>>>>>>>>>>> that you describe, where you trade a 3rd party token for a "local" 
>>>>>>>>>>> token. I have seen where access tokens are federated directly at 
>>>>>>>>>>> the PR. (Introspection lets                                         
>>>>>>>>>>>           you do some good things with that pattern.)
> 
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to