Phil, I'm not objecting to it! I never have been! I've been saying all along it's a proper extension to the base dynamic registration spec because it defines optional functionality in addition to said base spec. Why do you object to it being an extension?
-- Justin On Aug 22, 2013, at 4:43 PM, Phil Hunt <phil.h...@oracle.com<mailto:phil.h...@oracle.com>> wrote: TLS doesn't define how servers obtain certificates. It just assumes they are installed. The same thing is happening here. I'm not sure why this is objectionable. It is simply a broader model of your proprietary (meaning specific) solution for BB+. Phil @independentid www.independentid.com<http://www.independentid.com/> phil.h...@oracle.com<mailto:phil.h...@oracle.com> On 2013-08-22, at 1:18 PM, Justin Richer <jric...@mitre.org<mailto:jric...@mitre.org>> wrote: But it also assumes, in many cases, a pre-registration step. I think you might be simplifying for the case of one piece of software with the same parameters talking to the same server many times. In some sense, it doesn't matter to a client developer whether they have to send their display name as part of a JSON object or as part of a signed JWT (though the former's simpler, the results are the same), they still have to send it to the server. You kick the can down the road and set up something where there's a pre-registration step where common elements of the client's registration are fixed -- but then the server's going to have to be able to get those common elements at registration time and (later) at authorization time. Unless you're building inside of a single security domain, this becomes tricky, with all kinds of trust and policy issues. But it's useful and it can be done -- that's what we did with the "trusted registration" extension that BB+ uses, with registries and discovery using the initial access token. The server effectively parses the initial access token and looks up information about the client at the registry. We also toyed with the idea of packing the registration information into the token itself. Either way, the server has to decide that it trusts whoever issued that token, and it has to be able to verify the token's veracity. In BB+, we're using discovery to find the JWK that was used to sign the token and (optionally) token introspection to verify that the initial access token hasn't been decomissioned by the registry server. In this case, it's the registry that holds the fixed information about the client -- not the auth server -- and so the trust model is different. I think we're better off starting with the fully open case, where neither the app nor the server really know anything about each other, and build from there. We know that that's a case that people want to solve. Note that BB+ builds directly on what's already there -- you don't have to burn down the house in order to hang a painting. I think that there are so many similarities between the two that the software statement work can do the same. I'd also like to point out something about passing client information around: in the "fully stateless assertion" world that's being proposed (where there *is* no registration step), the client ends up passing its full registration information (as a software statement) with *every* call to the authorization endpoint. The fact that the registration is encoded in an assertion is immaterial. Having the server be truly stateless dramatically increases the amount of information sent over the wire at runtime -- that's a pretty universal tradeoff, and that's not a cost that everyone wants to pay. -- Justin On 08/22/2013 03:57 PM, Phil Hunt wrote: Agreed. The problem for dyn reg is most params are optional and passed at reg time. I think this also represents huge complexity to client app developers since each sp may be different. Move bulk of info to statement simplifies the registration and encourages uniformity. Phil On 2013-08-22, at 12:53, Justin Richer <jric...@mitre.org<mailto:jric...@mitre.org>> wrote: Phil, thanks for writing this down. I think that part of the confusion in this conversation may come from the nature of items such as the client id, client secret, and even the registration access token. In many instances, these are simply random values that the server generates and stores for later use. However, as you point out, OAuth doesn't state that that has to be the case any more than it states that a server must store access tokens. The important thing is that the auth server be able to recognize and verify each of these values. As such, nothing is stopping the server from staying stateless and sending signed values to the client for each or all of these fields, much in same way that a server can issue signed access tokens that carry all their rights and state within. As long as all of these values remain opaque to the client, everything in OAuth still works. It also works fine within the current DynReg framework, as John has just pointed out under a separate thread. -- Justin On 08/22/2013 03:22 PM, Phil Hunt wrote: I have attached a PDF including some of my thoughts, concerns, and suggestions for the upcoming meeting. Phil @independentid www.independentid.com<http://www.independentid.com/> phil.h...@oracle.com<mailto:phil.h...@oracle.com> On 2013-08-22, at 4:06 AM, "Tschofenig, Hannes (NSN - FI/Espoo)" <hannes.tschofe...@nsn.com><mailto:hannes.tschofe...@nsn.com> wrote: > I messed up the conference bridge time; here is the corrected version but the > details are actually the same. > > Meeting Number: 702 442 101 > Meeting Password: oauth > > ------------------------------------------------------- > To join the online meeting > ------------------------------------------------------- > 1. Go to > https://nsn.webex.com/nsn/j.php?ED=268691357&UID=0&PW=NOTlkZjIwNTEy&RT=MiMyNQ%3D%3D > 2. Enter your name and email address. > 3. Enter the meeting password: oauth > 4. Click "Join Now". > > To view in other time zones or languages, please click the link: > https://nsn.webex.com/nsn/j.php?ED=268691357&UID=0&PW=NOTlkZjIwNTEy&ORT=MiMyNQ%3D%3D > > ------------------------------------------------------- > To join the Teleconference > ------------------------------------------------------- > Global dial-in numbers: http://www.nokiasiemensnetworks.com/nvc > Conference Code: 944 910 5485 > > To update this meeting to your calendar program (for example Microsoft > Outlook), click this link: > https://nsn.webex.com/nsn/j.php?ED=268691357&UID=0&ICS=MRS3&LD=1&RD=2&ST=1&SHA2=KseMD/IKx0YGjSRaNyDJbqnmJ2i-xirziLGyc2bHNI8=&RT=MiMyNQ%3D%3D > >> -----Original Message----- >> From: oauth-boun...@ietf.org<mailto:oauth-boun...@ietf.org> >> [mailto:oauth-boun...@ietf.org] On Behalf >> Of ext Tschofenig, Hannes (NSN - FI/Espoo) >> Sent: Wednesday, August 21, 2013 6:35 PM >> To: oauth mailing list >> Subject: [OAUTH-WG] Dynamic Client Registration Conference Call: Thu 22 >> Aug, 2pm PDT: Conference Bridge Details >> >> Here is the conference bridge and Webex information. >> >> From an agenda point of view I guess we should start at a basic level, >> namely with what we have already in the dynamic client registration >> document (and folks may have actually missed it). There are two use >> cases described in the WG document, namely >> - Use Case #1: Open Registration (Appendix B.1) >> - Use Case #2: Protected Registration (Appendix B.2) >> >> Then, we could talk about some more sophisticated use cases where >> information for protected registration is provided by a third party. >> >> -------------------- >> >> Meeting Number: 702 442 101 >> Meeting Password: oauth >> >> ------------------------------------------------------- >> To join the online meeting >> ------------------------------------------------------- >> 1. Go to >> https://nsn.webex.com/nsn/j.php?ED=268691357&UID=0&PW=NOTlkZjIwNTEy&RT= >> MiMzMA%3D%3D >> 2. Enter your name and email address. >> 3. Enter the meeting password: oauth >> 4. Click "Join Now". >> >> To view in other time zones or languages, please click the link: >> https://nsn.webex.com/nsn/j.php?ED=268691357&UID=0&PW=NOTlkZjIwNTEy&ORT >> =MiMzMA%3D%3D >> >> ------------------------------------------------------- >> To join the teleconference only >> ------------------------------------------------------- >> Global Dial-In Numbers: http://www.nokiasiemensnetworks.com/nvc >> Conference Code: 944 910 5485 >> _______________________________________________ >> OAuth mailing list >> OAuth@ietf.org<mailto:OAuth@ietf.org> >> https://www.ietf.org/mailman/listinfo/oauth > _______________________________________________ > OAuth mailing list > OAuth@ietf.org<mailto:OAuth@ietf.org> > https://www.ietf.org/mailman/listinfo/oauth _______________________________________________ OAuth mailing list OAuth@ietf.org<mailto:OAuth@ietf.org> https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth