-1 Phil
On 2013-05-31, at 13:58, Justin Richer <jric...@mitre.org> wrote: > I'm not willing to write out an entire class of clients from this spec, > especially when we have stated use cases for them doing dynamic registration. > > I'm sorry, but your proposed solution will simply not work. > > -- Justin > > On 05/31/2013 01:56 PM, Phil Hunt wrote: >> Well the only client that wouldn't have a credential is an implicit client. >> An implicit client is transient and so would never update. >> >> Besides, as i have stated, implicit clients should not use dyn reg. >> >> Phil >> >> On 2013-05-31, at 13:41, Justin Richer <jric...@mitre.org> wrote: >> >>> But the outstanding question is: how do you get the access token to access >>> the created resource (IE: the Registration Access Token)? You can't use the >>> client_credentials flow for a client with no credentials! >>> >>> -- Justin >>> >>> >>> On 05/31/2013 12:58 PM, Phil Hunt wrote: >>>> Yes. I specified the trivial solution to anonymous clients earlier. >>>> >>>> Even simpler. You don't need an access token to create a new resource. You >>>> just need one to access one. That is just basic security config. >>>> >>>> Phil >>>> >>>> On 2013-05-31, at 12:34, Justin Richer <jric...@mitre.org> wrote: >>>> >>>>> I agree that we are going in circles, since I just was going to bring up >>>>> my counter argument of "what about clients with no credentials?" again, >>>>> which *still* isn't addressed by what you suggest doing, below. I also >>>>> believe that getting rid of the Registration Access Token but using some >>>>> other token method would actually make the spec larger, though I'd be >>>>> glad to review a concrete counter-proposal if you'd like to write one. >>>>> And the fact that OIDC is doing it this way, and considered but rejected >>>>> the way that you're describing, should say something to the WG here about >>>>> whether or not this is the right choice. Rough consensus and running >>>>> code, after all. >>>>> >>>>> Regardless, I agree to park this issue and leave the text as is. We'll >>>>> move to the next draft in the last call process shortly, as I have a >>>>> handful of non-normative editorial changes that I need to make, thanks to >>>>> feedback from a few folks. >>>>> >>>>> Again, thanks for your thorough review, Phil, and I look forward to >>>>> future feedback. >>>>> >>>>> -- Justin >>>>> >>>>> On 05/31/2013 12:28 PM, Phil Hunt wrote: >>>>>> I disagree. >>>>>> >>>>>> There is absolutely no need for a registration access token. >>>>>> >>>>>> Get rid of it and just use access tokens as per 6749. If you can't >>>>>> follow 6749 and need new issuing methods, what are others to say >>>>>> regarding inventing new methods? >>>>>> >>>>>> I have not heard a good reason for the special process or one good >>>>>> enough to warrant a new method for issuing an access token. Does the >>>>>> broader group realize this is what the spec says? >>>>>> >>>>>> Yes, i heard a lot saying OIDC does it this way. But that is a political >>>>>> reason, not a technical reason. Still, compatibility >>>>>> is always a strong objective. Even so, oidc could keep using their >>>>>> method just fine. There is no obligation here to do the same. >>>>>> >>>>>> The only reason so far was expiry of client creds. Well, why not require >>>>>> the client to update prior to expiry? It makes no sense to have another >>>>>> token with longer expiry. B'sides, even expired the client can >>>>>> re-register from scratch. >>>>>> >>>>>> Why force the client to persist multiple tokens and creds? That is far >>>>>> far too complex. >>>>>> >>>>>> Finally if you get rid of registration access token the spec size will >>>>>> drop roughly in half IMO. This suggests simplicity to me. >>>>>> >>>>>> Apologies for my rant. Maybe we should park this for now. We are going >>>>>> in circles. >>>>>> >>>>>> Phil >>>>>> >>>>>> On 2013-05-31, at 11:25, Justin Richer <jric...@mitre.org> wrote: >>>>>> >>>>>>> Phil, >>>>>>> >>>>>>> We *can* keep it straight just fine, but I just need you to be clear >>>>>>> about which part you're objecting to because the answers are different. >>>>>>> Please use the terms as defined in the document so that we all know >>>>>>> which component we're talking about. I'm sure you'd agree than in >>>>>>> specification work such as this, precision of language and labels is >>>>>>> key for communication between parties. This is precisely why there's a >>>>>>> Terminology section right up front, so that when I say "Registration >>>>>>> Access Token" you can know that I mean a very specific thing, and when >>>>>>> I say "Initial Registration Token" I mean a very different specific >>>>>>> thing. So I'm asking you, please, use the defined terms so that we can >>>>>>> avoid this unnecessary confusion. >>>>>>> >>>>>>> But anyway, what you're talking about below, "the token the client uses >>>>>>> to update is profile" *IS* the Registration Access Token. That's all >>>>>>> that that token is used for. You're not asking for it to go away, >>>>>>> you're asking for it to come from the Token Endpoint instead of the >>>>>>> response from the Registration Endpoint. I don't see how the client >>>>>>> *can* get it from the normal token process without jumping through >>>>>>> specialized hoops to make that happen. I've implemented the draft the >>>>>>> way that it is right now, both client and server side, and it works. >>>>>>> Others have implemented it, too. We've done interop testing, and it >>>>>>> works. This is a proven pattern and from where I sit there is both >>>>>>> rough consensus and running code. >>>>>>> >>>>>>> I believe that I've already pointed out how the solutions you've >>>>>>> proposed so far won't work in practice, for various reasons, many of >>>>>>> which have already been brought up and discussed previously. If you >>>>>>> have another way for the client to get its Registration Access Token, >>>>>>> please propose it; but I haven't seen anything yet that will fly. >>>>>>> >>>>>>> -- Justin >>>>>>> >>>>>>> On 05/31/2013 11:10 AM, Phil Hunt wrote: >>>>>>>> Justin, >>>>>>>> >>>>>>>> This is my primary objection! We can't keep it straight. Their should >>>>>>>> be no such thing as a registrstion access token! Just the token the >>>>>>>> client obtains to update its profile through the normal token request >>>>>>>> process. >>>>>>>> >>>>>>>> Phil >>>>>>>> >>>>>>>> On 2013-05-31, at 10:55, Justin Richer <jric...@mitre.org> wrote: >>>>>>>> >>>>>>>>> Which token are you referring to here? >>>>>>>>> >>>>>>>>> If it's the Initial Registration Token, then you could get that >>>>>>>>> through the normal token server no problem. (The lifecycle writeups >>>>>>>>> don't call this out explicitly but I would be willing to do so.) Or >>>>>>>>> you could get it elsewhere. Doesn't matter, just like it doesn't >>>>>>>>> matter with any other OAuth2 protected resource. >>>>>>>>> >>>>>>>>> If it's the Registration Access Token, then having the token come >>>>>>>>> from the token endpoint would require a lot more work and >>>>>>>>> complexity on behalf of both of the client and >>>>>>>>> server. Either you end up with public clients getting secrets they >>>>>>>>> shouldn't need or with granting clients >>>>>>>>> access to the client_credentials flow when they shouldn't actually >>>>>>>>> have it. Plus it adds extra round trips which don't buy you anything. >>>>>>>>> >>>>>>>>> -- Justin >>>>>>>>> >>>>>>>>> On 05/31/2013 10:15 AM, Phil Hunt wrote: >>>>>>>>>> The preference is to have the access token for registration issued >>>>>>>>>> by the normal token server rather then by the registration endpoint. >>>>>>>>>> >>>>>>>>>> In the current draft it is obtained through a unique process and >>>>>>>>>> must outlive the client. >>>>>>>>>> >>>>>>>>>> Phil >>>>>>>>>> >>>>>>>>>> On 2013-05-30, at 19:47, "Richer, Justin P." <jric...@mitre.org> >>>>>>>>>> wrote: >>>>>>>>>> >>>>>>>>>>> I don't understand any of the comments below -- it already *is* an >>>>>>>>>>> OAuth2 protected resource without any special handling. Your access >>>>>>>>>>> tokens can be short-lived, long-lived, federated, structured, >>>>>>>>>>> random blobs ... totally doesn't matter. They are access tokens >>>>>>>>>>> being used to access a normal protected resource. Full stop. >>>>>>>>>>> >>>>>>>>>>> Anything else is out of scope. The lifecycle discussions at the >>>>>>>>>>> beginning are merely examples of some ways you *could* use it and >>>>>>>>>>> are non-normative and non-exhaustive. >>>>>>>>>>> >>>>>>>>>>> You seem to be asking for something that's already in the draft. >>>>>>>>>>> >>>>>>>>>>> -- Justin >>>>>>>>>>> >>>>>>>>>>> From: Phil Hunt [phil.h...@oracle.com] >>>>>>>>>>> Sent: Thursday, May 30, 2013 7:31 PM >>>>>>>>>>> To: Richer, Justin P. >>>>>>>>>>> Cc: John Bradley; oauth@ietf.org WG >>>>>>>>>>> Subject: Re: [OAUTH-WG] >>>>>>>>>>> review comments on draft-ietf-oauth-dyn-reg-11.txt >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> Phil >>>>>>>>>>> >>>>>>>>>>> On 2013-05-30, at 16:11, "Richer, Justin P." <jric...@mitre.org> >>>>>>>>>>> wrote: >>>>>>>>>>> >>>>>>>>>>>> Comments inline, marked by [JR]. >>>>>>>>>>>> >>>>>>>>>>>> From: Phil Hunt [phil.h...@oracle.com] >>>>>>>>>>>> Sent: Thursday, May 30, 2013 5:25 PM >>>>>>>>>>>> To: Richer, Justin P. >>>>>>>>>>>> Cc: John Bradley; oauth@ietf.org WG >>>>>>>>>>>> Subject: Re: [OAUTH-WG] review comments on >>>>>>>>>>>> draft-ietf-oauth-dyn-reg-11.txt >>>>>>>>>>>> >>>>>>>>>>>> See below. >>>>>>>>>>>> Phil >>>>>>>>>>>> >>>>>>>>>>>> @independentid >>>>>>>>>>>> www.independentid.com >>>>>>>>>>>> phil.h...@oracle.com >>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> On 2013-05-30, at 2:09 PM, Justin Richer wrote: >>>>>>>>>>>> >>>>>>>>>>>>> OK, I think see part of the hang up. I have not seen the scenario >>>>>>>>>>>>> that you describe, where you trade a 3rd party token for a >>>>>>>>>>>>> "local" token. I have seen >>>>>>>>>>>>> where access tokens are federated directly at >>>>>>>>>>>>> the PR. (Introspection lets you do some good things with that >>>>>>>>>>>>> pattern.) >
_______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth