Before everyone gets excited, all John and was referring to was providing 
further definition on client_id that allows scenarios where the id isn't issued 
by the AS but rather a federated entity. 

This in no way changes how 6749 works. 

In particular for javascript clients it would avoid the incredible cost of 
registration for EVERY execution of a script. 

Dyn Reg currently has to assume a client_id must be issued by the as the 
controls access to the resource endpoint. 

The change here is on the level of errata. Never-the-less we are permitted to 
change as the standard is technically not final. (Yet as pointed out in 
practice it is)

Phil

On 2013-08-15, at 22:32, Torsten Lodderstedt <tors...@lodderstedt.net> wrote:

> +1 
> 
> Dyn reg should fit into the OAuth system as it is now, which uses client ids 
> and secrets. A (probably) improved OAuth is a completely different topic. 
> Let's handle it separately. 
> 
> 
> 
> John Bradley <ve7...@ve7jtb.com> schrieb:
>> 
>> Yes a bearer token that is signed and or encrypted by the AS reduces the 
>> amount of state required for the AS to maintain. 
>> 
>> In RFC 6749 there is information about the client that is tied to the 
>> client_id, and is required at the authorization endpoint. (eg redirect_uri)
>> 
>> I understand the goal of reducing state in the IdP.   Some of us have looked 
>> at storing information in a signed client_id that would work in the existing 
>> RFC 6749 flows.
>> 
>> It seems that some people are dissatisfied with RFC 6749 and would like to 
>> see changes like removing implicit flows.
>> 
>> The current Dynamic registration spec deals with the current state of OAuth. 
>>   If the WG decides to do a OAuth 3 that fully supports assertions and 
>> ditches secrets I would be OK with that. 
>> However lets not cripple what we have as a standard now by crating dynamic 
>> registration that can only be fully implemented  in a future version of 
>> OAuth.
>> 
>> Some peop!
>>  le
>> want/need a client registration API now.  It is clearly a missing part of an 
>> entire OAuth system.   
>> Supporting existing OAuth while minimizing state at the AS is something I 
>> support, waiting for a OAuth redesign is not in my opinion a reasonable 
>> medium term goal.
>> 
>> John B.
>> 
>> 
>> On 2013-08-14, at 11:47 PM, Phil Hunt <phil.h...@oracle.com> wrote:
>> 
>>> I am saying a bearer token is better than a password for the service 
>>> provider as Hannes explains. 
>>> 
>>> Phil
>>> 
>>> On 2013-08-14, at 19:42, Nat Sakimura <sakim...@gmail.com> wrote:
>>> 
>>>> Right. A Bearer Token does not have to be a shared secret. It may have 
>>>> some structure that allows the server to validate it statelessly, e.g. 
>>>> JWS-JWT. 
>>>> =nat via iPhone
>>>> 
>>>> Aug 14, 2013 15:32、Hannes Tschofenig <hannes.tschofe...@gmx.net> のメッセージ:
>>>> 
>>>>> George is correct with his statements. There is, however, a difference 
>>>>> between a shared secret and an assertion as Phil pointed out. For the 
>>>>> assertion the server does not need to maintain state on a per-client 
>>>>> basis. On the other hand since the client secret isn't really used in the 
>>>>> classical sense of a password either but rather as a "cookie" (if used in 
>>>>> the style of Section 2.3.1 of RFC6749) one could easy apply the concept 
>>>>> of stateless tokens to them:
>>>>> http://tools.ietf.org/html/draft-rescorla-stateless-tokens-01
>>>>> 
>>>>> 
>>>>> On 08/13/2013 07:21 PM, George Fletcher wrote:
>>>>>> Hi Phil,
>>>>>> 
>>>>>> I'm sorry for not following completely. Some questions inline...
>>>>>> 
>>>>>> On 8/13/13 11:00 AM, Phil Hunt wrote:
>>>>>>> Dyn reg and the scim reg variant depend too much/biased towards
>>>>>>> passwords expressed as client secrets.
>>>>>> I'm not sure what you mean in regards to "client secrets". There are
>>>>>> OAuth2 bearer tokens that need to be protected because they are bearer
>>>>>> tokens. That said, there is nothing in the spec that requires these to
>>>>>> be opaque blobs vs signed tokens. So both the "Initial Access Token" and
>>>>>> the "Registration Access Token" can be signed tokens. However, the
>>>>>> client still has to protect them as if they were a "secret" because they
>>>>>> are a bearer token and can be replayed. So it's the same amount of work
>>>>>> on the client either wa!
>>>>>>  y.
>>>>>> 
>>>>>> 
>>>>>>> A signed token approach has many advantages for service providers like
>>>>>>> not having to maintain a secure database of secrets/passwords.
>>>>>> If the concern here is the amount of data the Authorization Server has
>>>>>> to store to manage these clients, then the current spec doesn't preclude
>>>>>> using a "signed token". Both OAuth2 bearer tokens identified in the
>>>>>> current spec can be signed tokens.
>>>>>> 
>>>>>>> Finally issuing both a client secret and registration token is costly
>>>>>>> and confusing to client developers.  I relented somewhat when I
>>>>>>> realized kerberos does this--but i still feel it is a bad design at
>>>>>>> cloud scale.
>>>>>> Given that client_secrets are OPTIONAL in OAuth2 for some use!
>>>>>>   cases,
>>>>>> I'm
>>>>>> not sure how you abstract the client developer from having to deal with
>>>>>> them. The client developer is going to be dealing with multiple OAuth2
>>>>>> tokens to multiple endpoints regardless so I don't see another token as
>>>>>> costly or complex. At a minimum there is the refresh_token and
>>>>>> access_token. Where is the added client developer complexity?
>>>>>> 
>>>>>> Thanks,
>>>>>> George
>>>>>> 
>>>>>> 
>>>>>>> Phil
>>>>>>> 
>>>>>>> On 2013-08-13, at 7:48, Justin Richer <jric...@mitre.org
>>>>>>> <mailto:jric...@mitre.org>> wrote:
>>>>>>> 
>>>>>>>> The spec doesn't care where you deploy at -- if URL space is at a
>>>>>>>> premium for you, then switch based on input parameters and other
>>>>>>>> things. And you're still not clear on which "secrets" you're t!
>>>>>>>>  aking
>>>>>>>> issue with.
>>>>>>>> 
>>>>>>>> -- Justin
>>>>>>>> 
>>>>>>>> On 08/13/2013 10:46 AM, Anthony Nadalin wrote:
>>>>>>>> 
>>>>>>>>> #1, its yet another endpoint to have to manage secrets at, yes this
>>>>>>>>> is an OAuth item but it’s growing out of control, we are trying to
>>>>>>>>> move away from secrets and management of these endpoints as this
>>>>>>>>> would be just another one we have to support, monitor and report on
>>>>>>>>> 
>>>>>>>>> #2 yes, 1 physical endpoint acting as multiple authorization servers
>>>>>>>>> 
>>>>>>>>> *From:*George Fletcher [mailto:gffle...@aol.com]
>>>>>>>>> *Sent:* Tuesday, August 13, 2013 7:40 AM
>>>>>>>>> *To:* Anthony Nadalin
>>>>>>>>> *Cc:* m...@gluu.org; Justin Richer; oauth@ietf.org
>>>>>>>>> *Subject:* Re: [OAUTH-WG] OX needs Dynamic Registration: please
>>>>>>>>> don't remove!
>>>>>>>>> 
>>>>>>>>> Hi Tony,
>>>>>>>>> 
>>>>>>>>> Could you please explain a little more?
>>>>>>>>> 
>>>>>>>>> For issue 1:
>>>>>>>>> * Which "secret" are you ref!
>>>>>>>>>  erring
>>>>>>>>> to? OAuth2 by default allows for
>>>>>>>>> an optional client_secret. I'm not sure why this would cause
>>>>>>>>> management issues? Or are you referring to the "Registration Access
>>>>>>>>> Token"?
>>>>>>>>> * Why is a separate endpoint an issue? Any client is going to be
>>>>>>>>> talking to more than just the /authorize and /token endpoints anyway
>>>>>>>>> so I'm confused regarding the extra complexity?
>>>>>>>>> 
>>>>>>>>> For issue 2:
>>>>>>>>> * What specifically do you mean by "multi-tenant"? Is this one
>>>>>>>>> server acting on behalf of multiple tenants and so appearing as
>>>>>>>>> multiple Authorization Servers?
>>>>>>>>> 
>>>>>>>>> Thanks,
>>>>>>>>> George
>>>>>>>>> 
>>>>>>>>> [snip...]
>>>>>>> 
>>>>>>> OAuth mailing list
>>>>>>> OAuth@ietf.org
>>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>> 
>>>>>> --
>>>>>> 
>>>>>> 
>>>>>> 
>>>>>> OAuth mailing list
>>>>>> OAuth@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>> 
>>>>> 
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>> 
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>> 
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>> 
>> 
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to