Josh,

I think BlueButton is an important example of use.

Tell us more about registration_jwt (which is not part of dyn reg).

Phil

@independentid
www.independentid.com
phil.h...@oracle.com







On 2013-08-20, at 8:30 AM, Josh Mandel <jman...@gmail.com> wrote:

> The group may be interested in bits of the following classification that we 
> put together for BlueButton+:
> http://blue-button.github.io/blue-button-plus-pull/#client-types
> 
> Here, we classified apps according to
> 1.  whether they can protect a `client_secret` and 
> 2.  whether they can protect a `registration_jwt` (issued by a third party 
> and presented by the client to the registration endpoint at registration time)
> 
> We used this classification with the current dyn-reg draft, in order to give 
> implementers a concrete idea about how policy might vary according to client 
> type. Part of why this works nicely for BB+ is that we actually get to 
> control (well, specify!) policy within the BB+ network.
> 
>   -Josh
> 
> 
> On Tue, Aug 20, 2013 at 8:12 AM, Phil Hunt <phil.h...@oracle.com> wrote:
> By taxonomy i mean the distinct types of clients and associations.
> 
> Eg
> - javascript
> - native app
> - web app
> - apps that associate to one endpoint vs those the register with multiple 
> based on events
> - perm vs temporary associations
> 
> There are probably more.
> 
> As Torsten mentions one of the most important factors is first how the server 
> recognizes the client that is registering. It needs to do this to set or 
> associate policy.
> 
> What does a service provider gain if it has no information about clients? The 
> downside of issuing random client_ids is little or no policy based access 
> control and resource depletion.
> 
> So we have to ask ourselves in each case why register? What is achieved for 
> each side? Client id is a major factor but it is not THE factor.
> 
> Phil
> 
> On 2013-08-20, at 7:51, ", Hannes (NSN - FI/Espoo)" 
> <hannes.tschofe...@nsn.com> wrote:
> 
> > Hi Phil,
> >
> >
> >> I think we should start by reviewing use cases taxonomy.
> >
> >
> > What do you mean by "use cases taxonomy"? What exactly would we discuss 
> > under that item?
> >
> >>
> >> Then a discussion on any client_id assumptions and actual requirements
> >> for each client case. Why is registration needed for each case?
> >
> > I guess you are bringing the use case to the table where there is no client 
> > id needed (?) or where the client id is provided by yet another party 
> > (other than the one running the AS).
> >
> >>
> >> The statement can solve some complication but should be put in context
> >> of use cases.
> >
> > Ciao
> > Hannes
> >
> >> Phil
> >>
> >> On 2013-08-18, at 15:01, Hannes Tschofenig <hannes.tschofe...@gmx.net>
> >> wrote:
> >>
> >>> -----BEGIN PGP SIGNED MESSAGE-----
> >>> Hash: SHA512
> >>>
> >>> - -----BEGIN PGP SIGNED MESSAGE-----
> >>> Hash: SHA512
> >>>
> >>> Based on your feedback via the poll let us start with August 22nd
> >> with the first conference call. I will distribute the conference call
> >> details on Tuesday.
> >>>
> >>> Let us talk about the agenda. There were several items brought up in
> >> discussions, namely
> >>>
> >>> * Software assertions / software statements
> >>>
> >>> We briefly discussed this topic at the IETF OAuth session but we may
> >> need more time to understand the implications for the current dynamic
> >> client registration document:
> >>> http://www.ietf.org/proceedings/87/slides/slides-87-oauth-2.pptx
> >>>
> >>> * SCIM vs. current dynamic client registration approach for
> >> interacting with the client configuration endpoint
> >>>
> >>> In the past we said that it would be fine to have a profile defined
> >> in SCIM to provide the dynamic client registration for those who
> >> implement SCIM and want to manage clients also using SCIM. It might,
> >> however, be useful to compare the two approaches in detail to see what
> >> the differences are.
> >>>
> >>> * Interactions with the client registration endpoint
> >>>
> >>> Justin added some "life cycle" description to the document to
> >> motivate some of the design decisions. Maybe we need to discuss those
> >> in more detail and add further text.
> >>> Additional text could come from the NIST Blue Button / Green Button
> >> usage.
> >>>
> >>> * Aspects that allow servers to store less / no state
> >>>
> >>> - - From the discussions on the list it was not clear whether this is
> >> actually accomplishable with the current version of OAuth. We could
> >> explore this new requirement and try to get a better understanding how
> >> much this relates to dynamic client registration and to what extend it
> >> requires changes to the core spec.
> >>>
> >>>
> >>> What would you like to start with? Other topics you would like to
> >> bring up?
> >>> - -----BEGIN PGP SIGNATURE-----
> >>> Version: GnuPG/MacGPG2 v2.0.19 (Darwin)
> >>> Comment: GPGTools - http://gpgtools.org
> >>>
> >>> iQEcBAEBCgAGBQJSEULvAAoJEGhJURNOOiAtttEH/Aogg8Q/R/L9/mzU05IQbnze
> >>> AdXB1ZvySkV3jZT4I5shmP7hQr6mc6P6UdvyOrSjrvPlBHen55/oa5z7Cwchd1dk
> >>> dcDUEavbodjnm9SrOs0nKaTvdeZimFSBkGMrfhoTYLXpymP24F9PZgwUXdOcFocF
> >>> OiCs3qDajYaA395DCg5+4mOLQQgDnmy4drlgj2NPv1nMBRDBubzgAhJccwF2BLN9
> >>> IW7MAwTEu7vYT/gwIFzriPkui7gYpf8sAqsnzf/z7FtXbsP8imgOKUlQxzZzeSSP
> >>> QEb6+syyMD9Gt6wxQfWzyl5T0bYLP6DQ+ldZR8yGKCwb+2k3LN6Q8bIpj4mIERI=
> >>> =tkGT
> >>> - -----END PGP SIGNATURE-----
> >>> -----BEGIN PGP SIGNATURE-----
> >>> Version: GnuPG/MacGPG2 v2.0.19 (Darwin)
> >>> Comment: GPGTools - http://gpgtools.org
> >>>
> >>> iQEcBAEBCgAGBQJSEUQfAAoJEGhJURNOOiAt8wkIAI3xgdsWuOB36KLiMLRUG+Zb
> >>> RvYqV+rOH80m7YVJcdOLjQJcpPqOIBdzq/yuNiAaF1uFJCqBn97ZQ/NLXLNGcg8x
> >>> wI/Laz7kP2U4B2trBTMtAf2wsY9uYw4Eh+eOEDKGF6cmkEzrzrlw4q/Sfu6vy181
> >>> VI+kqwzZ+iYX4iL3NYPlkg3rwF4OZ1v3T08Erg2SPrbmNd1TRfJJU8HrYFEJQo1q
> >>> p0RiLjcFFDCEZs0gDr9zliCXllV7J9h2ttqLq8+xwPATDuO6buQdFS9vZQ8t1u36
> >>> a0FIuy3NM8PQbblC3B5WumUjW4kntLV09ytYV8h6S8C/dgFwMqzAwEAeNx1exyE=
> >>> =3qNI
> >>> -----END PGP SIGNATURE-----
> >>> _______________________________________________
> >>> OAuth mailing list
> >>> OAuth@ietf.org
> >>> https://www.ietf.org/mailman/listinfo/oauth
> >> _______________________________________________
> >> OAuth mailing list
> >> OAuth@ietf.org
> >> https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
> 

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to