So why are you fighting so hard against standardizing software assertions? You're affectively already using the solution for BB+.
The fact that a standardized initial_access_token eliminates most of the registration endpoint seems to be your primary objection. Phil @independentid www.independentid.com phil.h...@oracle.com On 2013-08-28, at 9:41 AM, Justin Richer <jric...@mitre.org> wrote: > Yes, that already works. And you could accomplish that with the current > dynamic registration spec, too -- it's just that client assertions were > deemed too-underspecified to include in the base draft, and nobody's stepped > up to offer a full writeup and extension of using other auth mechanisms > (outside of OpenID Connect). > > -- Justin > > On 08/28/2013 12:38 PM, Sergey Beryozkin wrote: >> On 28/08/13 17:33, George Fletcher wrote: >>> So I understand that you'd rather that OAuth doesn't require a >>> client_secret and that's fine. However, I don't think we should impose >>> that thinking on the rest of the world who have already implemented it >>> and have it working and scaling without issues. If the core of this >>> discussion is around replacing client_id and client_secret with a >>> client_assertion then lets have that discussion separately and not bury >>> it in the dynamic registration discussion. >>> >>> Could you not profile OAuth2 to support a flow that allows for retrieval >>> of access and refresh tokens using code + client_assertion? Doesn't seem >>> like that hard a profile and then the rest of this could fall out pretty >>> easily. >>> >> That is already supported AFAIK, something like >> >> grant_type=authorization_code >> &code=12345678 >> &client_assertion_type=urn%3Aietf%3Aparams%3Aoauth%3Aclient-assertion-type%3Asaml2-bearer >> >> &client_assertion=Base64UrlEncoded-SAML2-Bearer-Assertion >> >> probably the same works with JWT >> >> Sergey >> >> >>> Thanks, >>> George >>> >>> On 8/28/13 12:28 PM, Anthony Nadalin wrote: >>>> >>>> I do think that this is the rare-edge use case, we would not want >>>> require client-secret, we already have that mess today with OAuth and >>>> trying not to continue the proliferation, we solve this today with our >>>> STS and assertion swaps/transformations, it scales, performs and we >>>> don’t have the management debacle this specification creates >>>> >>>> *From:*oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] *On >>>> Behalf Of *George Fletcher >>>> *Sent:* Wednesday, August 28, 2013 9:21 AM >>>> *To:* Phil Hunt >>>> *Cc:* oauth mailing list >>>> *Subject:* Re: [OAUTH-WG] Dynamic Client Registration Conference Call: >>>> Wed 28 Aug, 2pm PDT: Conference Bridge Details >>>> >>>> On 8/28/13 12:02 PM, Phil Hunt wrote: >>>> >>>> Please define the all in one case. I think this is the edge case and is >>>> in fact rare. >>>> >>>> >>>> >>>> I agree, in many cases step 1 can be made by simply approving a class >>>> of software. But then step 2 is simplified. >>>> >>>> >>>> >>>> Dyn reg assumes every registration of an instance is unique which too >>>> me is a very extreme >>>> >>>> If you have a mobile app that needs to do the code flow... which >>>> requires a client_secret in order to retrieve the access token and >>>> refresh token, how does the app do this without per app instance >>>> registration? >>>> >>>> I'd argue that almost all user facing mobile apps will want the above >>>> flow and that's not a small, rare edge case. >>>> >>>> Thanks, >>>> George >>>> >>>> position. >>>> >>>> >>>> >>>> Phil >>>> >>>> >>>> >>>> On 2013-08-28, at 8:41, Justin Richer<jric...@mitre.org> >>>> <mailto:jric...@mitre.org> wrote: >>>> >>>> >>>> >>>> Except for the cases where you want step 1 to happen in band. To >>>> me, that is a vitally and fundamentally important use case that we can't >>>> disregard, and we must have a solution that can accommodate that. The >>>> notions of "publisher" and "product" fade very quickly once you get >>>> outside of the software vendor world. >>>> >>>> >>>> >>>> This is, of course, not to stand in the way of other solutions or >>>> approaches (such as something assertion based like you're after). It's not >>>> a one-or-the-other proposition, especially when there are mutually >>>> exclusive aspects of each. >>>> >>>> >>>> >>>> Therefore I once again call for the WG to finish the current >>>> dynamic registration spec *AND* pursue the assertion based process that >>>> Phil's talking about. They're not mutually exclusive, let's please stop >>>> talking about them like they are. >>>> >>>> >>>> >>>> -- Justin >>>> >>>> >>>> >>>> On 08/28/2013 11:17 AM, Phil Hunt wrote: >>>> >>>> Sorry. I meant also to say i think there are 2 registration >>>> steps >>>> >>>> 1. Software registration/approval. This often happens out of >>>> band. But in this step policy is defined that approves software for use. >>>> Many of the reg params are known here. >>>> >>>> >>>> >>>> Federation techniques come into play as trust approvals can be >>>> based on developer, product or even publisher. >>>> >>>> >>>> >>>> 2. Each instance associates in a stateless way. Only clients >>>> that need credential rotation need more. >>>> >>>> >>>> >>>> Phil >>>> >>>> >>>> >>>> On 2013-08-28, at 8:04, Phil Hunt<phil.h...@oracle.com> >>>> <mailto:phil.h...@oracle.com> wrote: >>>> >>>> >>>> >>>> I have a conflict I cannot get out of for 2pacific. >>>> >>>> >>>> >>>> I think a certificate based approach is going to simplify >>>> exchanges in all cases. I encourage the group to explore the concept on >>>> the call. >>>> >>>> >>>> >>>> I am not sure breaking dyn reg up helps. It creates yet >>>> another option. I would like to explore how federation concept in software >>>> statements can help with facilitating association and making many reg >>>> stateless. >>>> >>>> >>>> >>>> Phil >>>> >>>> >>>> >>>> On 2013-08-28, at 5:43, "Tschofenig, Hannes (NSN - >>>> FI/Espoo)"<hannes.tschofe...@nsn.com> <mailto:hannes.tschofe...@nsn.com> >>>> wrote: >>>> >>>> >>>> >>>> Here are the conference bridge / Webex details for the >>>> call today. >>>> >>>> We are going to complete the use case discussions from >>>> last time (Phil wasn't able to walk through all slides). Justin was also >>>> able to work out a strawman proposal based on the discussions last week >>>> and we will have a look at it to see whether this is a suitable >>>> compromise. Here is Justin's mail, in case you have missed >>>> it:http://www.ietf.org/mail-archive/web/oauth/current/msg12036.html >>>> >>>> >>>> >>>> Phil, please feel free to make adjustments to your >>>> slides given the Justin's recent proposal. >>>> >>>> >>>> >>>> Topic: OAuth Dynamic Client Registration >>>> >>>> Date: Wednesday, August 28, 2013 >>>> >>>> Time: 2:00 pm, Pacific Daylight Time (San Francisco, >>>> GMT-07:00) >>>> >>>> Meeting Number: 703 230 586 >>>> >>>> Meeting Password: oauth >>>> >>>> >>>> >>>> ------------------------------------------------------- >>>> >>>> To join the online meeting >>>> >>>> ------------------------------------------------------- >>>> >>>> 1. Go >>>> tohttps://nsn.webex.com/nsn/j.php?ED=269567657&UID=0&PW=NNTI1ZWQzMDJk&RT=MiM0 >>>> >>>> 2. Enter your name and email address. >>>> >>>> 3. Enter the meeting password: oauth >>>> >>>> 4. Click "Join Now". >>>> >>>> >>>> >>>> To view in other time zones or languages, please click >>>> the link: >>>> >>>> https://nsn.webex.com/nsn/j.php?ED=269567657&UID=0&PW=NNTI1ZWQzMDJk&ORT=MiM0 >>>> >>>> >>>> >>>> To add this meeting to your calendar program (for >>>> example Microsoft Outlook), click this link: >>>> >>>> https://nsn.webex.com/nsn/j.php?ED=269567657&UID=0&ICS=MI&LD=1&RD=2&ST=1&SHA2=C6-AjLGvhdYjmpVdx75M6UsAwrNLMsequ5n95Gyv1R8=&RT=MiM0 >>>> >>>> >>>> >>>> ------------------------------------------------------- >>>> >>>> To join the teleconference only >>>> >>>> ------------------------------------------------------- >>>> >>>> Global dial-in >>>> Numbers:http://www.nokiasiemensnetworks.com/nvc >>>> >>>> Conference Code: 944 910 5485 >>>> >>>> >>>> >>>> >>>> >>>> _______________________________________________ >>>> >>>> OAuth mailing list >>>> >>>> OAuth@ietf.org <mailto:OAuth@ietf.org> >>>> >>>> https://www.ietf.org/mailman/listinfo/oauth >>>> >>>> _______________________________________________ >>>> >>>> OAuth mailing list >>>> >>>> OAuth@ietf.org <mailto:OAuth@ietf.org> >>>> >>>> https://www.ietf.org/mailman/listinfo/oauth >>>> >>>> _______________________________________________ >>>> >>>> OAuth mailing list >>>> >>>> OAuth@ietf.org <mailto:OAuth@ietf.org> >>>> >>>> https://www.ietf.org/mailman/listinfo/oauth >>>> >>>> >>>> >>>> _______________________________________________ >>>> >>>> OAuth mailing list >>>> >>>> OAuth@ietf.org <mailto:OAuth@ietf.org> >>>> >>>> https://www.ietf.org/mailman/listinfo/oauth >>>> >>>> >>>> >>>> >>>> >>>> -- >>>> George Fletcher <http://connect.me/gffletch> >>>> >>> >>> -- >>> George Fletcher <http://connect.me/gffletch> >>> >>> >>> _______________________________________________ >>> OAuth mailing list >>> OAuth@ietf.org >>> https://www.ietf.org/mailman/listinfo/oauth >>> >> >> > > _______________________________________________ > OAuth mailing list > OAuth@ietf.org > https://www.ietf.org/mailman/listinfo/oauth _______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth