Just wanted to respond to one point:

> SHOULD around open registration

The reason behind that was to encourage wider adoption. If you don't have to do any out of band or manual steps to get your client registered, you're more likely as a developer to use it (in my view at least), so I'd like to see more service providers work in that mode. Of course, it's not a MUST and really shouldn't be a MUST, because as you correctly point out there are many valid mechanisms for getting access to the registration API. Some are more automated and robust than others. What we've tried to do with BlueButton+ is require open registration but set policy (which we can specify in our use case) around the difference between openly registered clients and registry-backed clients (which requires a manual pre-registration step to get a software assertion that's presented as an access token). I forsee that when we start to build UMA's mechanisms into BB+, we'll have another class of clients that have different policies as well, and while we're not quite there yet I think it's important to keep the user-introduction flow like this in mind and possible, too.

 -- Justin

On 08/27/2013 05:12 PM, Eve Maler wrote:
Unfortunately I haven't been able to attend the design meetings, but I've 
continued to follow along here with interest.

I confess that the core/management split seems a little artificial to me. I can imagine a 
potential use case for splitting things this way -- even a client that was *statically* 
provisioned its credentials might still want to manage its representation at the 
authorization server over time. But even so, I would normally expect to see all of this 
considered part of the "management" bucket, with the first step allowed to 
happen either on-stage or off-stage. In any case, if the split satisfies some other need 
I'm missing, I don't want to stand in the way.

Also, I'm still a little stumped at the reluctance to allow a full set of management operations. Is 
this still a concern over similarity to SCIM, which also has a full set of CRUD-type operations? If 
so, perhaps it's worth pointing out that many (millions?) of APIs leverage the HTTP verbs in nearly 
identical ways to "provision" web resources. In fact, my SCIM-related slideware even says 
"If you've seen one RESTful CRUD API, you've seen 'em all" :), and points out that its 
unique value is in the *nature* of the resources being provisioned (scoped to user identity data, 
as noted in the SCIM API spec itself). Similarity like this is a feature of REST, not a bug.

As an aside, I'm surprised the core spec has a SHOULD around open registration. Different 
APIs have different business models, and the range of possibilities legitimately includes 
APIs that require approval workflows etc. for onboarding devs and their client apps. In 
fact, that's one of the exciting things about defining dynamic (machine-to-machine) 
client registration that can nonetheless put gates in front of client provisioning: it 
makes OAuth protection more easily achievable even in "circle of trust" 
scenarios.

Net on the important bits:
- I'm weakly in favor of a recombined core+management spec but I'm fine with 
the split if others find it valuable.
- I'm in favor of keeping the management functions in scope.

        Eve

On 27 Aug 2013, at 11:52 AM, John Bradley <ve7...@ve7jtb.com> wrote:

I appreciate that is your opinion.   Lets finish splitting the document and 
agree on what we agree on, then the chairs and others can render a opinion on 
if http://tools.ietf.org/html/draft-richer-oauth-dyn-reg-management-00 is in 
scope for this WG.    I happen to think it is in scope, and I suspect I am not 
alone in that.

Right now lets focus on the core of the spec we agree on and leave the scope 
issue to a later knife fight.

John B.

On 2013-08-27, at 2:41 PM, Anthony Nadalin <tony...@microsoft.com> wrote:

I believe the 
http://tools.ietf.org/html/draft-richer-oauth-dyn-reg-management-00 is out of 
scope for this WG and needs to go to the APPS area since we don't deal with 
other OAuth management issues

-----Original Message-----
From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of 
Richer, Justin P.
Sent: Tuesday, August 27, 2013 7:06 AM
To: oauth mailing list
Subject: [OAUTH-WG] Refactoring Dynamic Registration

After last week's design team call, at Derek's suggestion, I took time today to refactor the Dynamic 
Registration draft into two pieces: "core" and "management". The former contains the 
definition of the Registration Endpoint and the semantics surrounding that, the latter contains the Client 
Configuration Endpoint as well as the "non-essential" client metadata parameters.

I did this refactoring with an axe, so there are almost certainly bits and pieces that are in the wrong document. In 
particular, I've kept the use cases in the "core" document even though they reference concepts and constructs 
defined in the "management" spec. This way people that don't want to deal with a configuration management API 
can implement just the "core" registration spec and call it a day, while people who want to have full 
lifecycle control can do the "management" spec on top of it. This does increase the optionality by making the 
client configuration endpoint parameters optional, but that's the tradeoff for having things cut this way.

You can read both the specs here:

http://tools.ietf.org/html/draft-richer-oauth-dyn-reg-core-00

http://tools.ietf.org/html/draft-richer-oauth-dyn-reg-management-00

I've uploaded these as individual submissions for now. If the working group 
decides to move forward with this refactoring, I expect both documents to move 
in tandem through the RFC approval process.

-- Justin

Eve Maler                                  http://www.xmlgrrl.com/blog
+1 425 345 6756                         http://www.twitter.com/xmlgrrl

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to