+1, I believe that was the intent of the edit.
-- Justin
On 08/22/2013 01:33 PM, Brian Campbell wrote:
I so believe that was the intent and what it probably should have
said. So maybe errata makes sense?
On Aug 17, 2013 12:15 PM, "Torsten Lodderstedt"
<tors...@lodderstedt.net <mailto:tors...@lodderstedt.net>> wrote:
Hi all,
would it make sense to issue an errata and add a "public" to the
sentence as follows?
"A _public_ client MAY use the "client_id" request parameter to
identify itself
when sending requests to the token endpoint."
regards,
Torsten.
Am 01.08.2013 15:57, schrieb Brian Campbell:
I thought I remembered that text from RFC 6749, section 3.1 as
saying that a *public* client MAY use the "client_id" request
parameter to identify itself...
Apparently that's not what it says. But I believe that was the
intent - hat a client with no means of authentication could
identify itself by sending only the "client_id" request parameter
to the token endpoint.
Sec 2.3 (http://tools.ietf.org/html/rfc6749#section-2.3) says,
"The client MUST NOT use more than one authentication method in
each request."
And 5.2 (http://tools.ietf.org/html/rfc6749#section-5.2) has
"invalid_request
The request is missing a required parameter,
includes an
unsupported parameter value (other than grant type),
repeats a parameter,*includes multiple credentials,*
utilizes more than one mechanism for
authenticating the
client, or is otherwise malformed."
There is some room for ambiguity in all that but, based on the
above, I'd say that the way your server is behaving is correct
Torsten.
On Thu, Aug 1, 2013 at 2:13 PM, John Bradley <ve7...@ve7jtb.com
<mailto:ve7...@ve7jtb.com>> wrote:
Hmm allowing sending the client_id even if there is no
authentication was intended to mitigate cases where the
client presenting the code or refresh_token was not the one
that requested it, and for logging.
I don't think the intention was to allow the client_id to be
sent twice.
If it were my Token endpoint I would ignore the extra one and
only processes the one sent as part of the authentication,
if there is no authentication then the value of the
"client_id" parameter MUST match the client_id that was used
to request the token.
It is probably a open question if the request should be
considered malformed if it contains both.
Personally I would recommend that the client not do that.
Others may remember it differently.
John B.
On 2013-08-01, at 11:34 AM, Torsten Lodderstedt
<tors...@lodderstedt.net <mailto:tors...@lodderstedt.net>> wrote:
> Hi,
>
> while setting up our OIDC interop tests, we run into the
following problem:
>
> The test client sends a request to the token endpoint,
which contains the client credentials in an authorization
header. Additionally, it adds the client_id to the message
body. Our server treats this as an invalid request and
responds with HTTP status code 400.
>
> Now my question: The last paragraph of RFC 6749, section
3.1 (http://tools.ietf.org/html/rfc6749#section-3.2.1) states
>
> "A client MAY use the "client_id" request parameter to
identify itself
> when sending requests to the token endpoint."
>
> This seems to allow the client to send the client_id in
addition to any other credential used to authenticate it.
>
> I'm not sure what the intension is/was. How is the server
supposed to handle such cases? Shall it compare both ids
(from the header and the body)? Must they match exactly?
>
> Any feedback is appreciated.
>
> regards,
> Torsten.
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org <mailto:OAuth@ietf.org>
> https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org <mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth