That's what I'm trying to do. All I have been asking for is time to explore the 
spec and to see how it can impact and simplify dyn reg -- which I believe is a 
significant amount.  It would be pre-mature at this point to move Dyn Reg 
forward without exploring this.

I still believe dyn reg is over-specified because it assumes *every* cllient 
registration is different when in fact 99.9% of registrations are going to fall 
in clusters of client applications.  Much of the paramaters can be moved to 
step 1 of registration or at the least be bundled into the software assertion. 
Thus the reg endpoint only has to deal with truly instance specific details 
(e.g. like credential management).

I don't pre-clude that most of dyn reg may remain intact, but it seems clear 
there will be substantive breaking changes that simplify registration.

Phil

@independentid
www.independentid.com
phil.h...@oracle.com







On 2013-08-28, at 9:47 AM, George Fletcher <gffle...@aol.com> wrote:

> So Phil... given that you can do all this today with the existing set of 
> specifications... why not write the software statements/client assertion 
> registration spec so that it meets your use case and deployment needs. I'd 
> much rather have two straight forward ways to do something when the core use 
> cases are so different than to try and munge everything into one and end up 
> with unnecessary complexity in one or both of the solutions.
> 
> I see the use case you are trying to solve for as significantly different 
> than the one I'm trying to solve for. Now maybe your way is the better way 
> but why not let the market make that decision? We will not confuse developers 
> by having two ways to do things as it will be very clear at the beginning of 
> development which way is needed for their use case:)
> 
> Thanks,
> George
> 
> On 8/28/13 12:41 PM, Phil Hunt wrote:
>> Yes. A client could pass the software statement *directly* as its client 
>> credential.  Which is one of the *simple* solutions. 8-)
>> 
>> The other case is where the client instance needs its own credential as 
>> George indicates.  In that case it could swap the statement for a unique 
>> client assertion.
>> 
>> Phil
>> 
>> @independentid
>> www.independentid.com
>> phil.h...@oracle.com
>> 
>> 
>> 
>> 
>> 
>> 
>> 
>> On 2013-08-28, at 9:38 AM, Sergey Beryozkin <sberyoz...@gmail.com> wrote:
>> 
>>> On 28/08/13 17:33, George Fletcher wrote:
>>>> So I understand that you'd rather that OAuth doesn't require a
>>>> client_secret and that's fine. However, I don't think we should impose
>>>> that thinking on the rest of the world who have already implemented it
>>>> and have it working and scaling without issues. If the core of this
>>>> discussion is around replacing client_id and client_secret with a
>>>> client_assertion then lets have that discussion separately and not bury
>>>> it in the dynamic registration discussion.
>>>> 
>>>> Could you not profile OAuth2 to support a flow that allows for retrieval
>>>> of access and refresh tokens using code + client_assertion? Doesn't seem
>>>> like that hard a profile and then the rest of this could fall out pretty
>>>> easily.
>>>> 
>>> That is already supported AFAIK, something like
>>> 
>>> grant_type=authorization_code
>>> &code=12345678
>>> &client_assertion_type=urn%3Aietf%3Aparams%3Aoauth%3Aclient-assertion-type%3Asaml2-bearer
>>> &client_assertion=Base64UrlEncoded-SAML2-Bearer-Assertion
>>> 
>>> probably the same works with JWT
>>> 
>>> Sergey
>>> 
>>> 
>>>> Thanks,
>>>> George
>>>> 
>>>> On 8/28/13 12:28 PM, Anthony Nadalin wrote:
>>>>> I do think that this is the rare-edge use case, we would not want
>>>>> require client-secret, we already have that mess today with OAuth and
>>>>> trying not to continue the proliferation, we solve this today with our
>>>>> STS and assertion swaps/transformations, it scales, performs and we
>>>>> don’t have the management debacle this specification creates
>>>>> 
>>>>> *From:*oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] *On
>>>>> Behalf Of *George Fletcher
>>>>> *Sent:* Wednesday, August 28, 2013 9:21 AM
>>>>> *To:* Phil Hunt
>>>>> *Cc:* oauth mailing list
>>>>> *Subject:* Re: [OAUTH-WG] Dynamic Client Registration Conference Call:
>>>>> Wed 28 Aug, 2pm PDT: Conference Bridge Details
>>>>> 
>>>>> On 8/28/13 12:02 PM, Phil Hunt wrote:
>>>>> 
>>>>>    Please define the all in one case. I think this is the edge case and 
>>>>> is in fact rare.
>>>>> 
>>>>> 
>>>>> 
>>>>>    I agree, in many cases step 1 can be made by simply approving a class 
>>>>> of software. But then step 2 is simplified.
>>>>> 
>>>>> 
>>>>> 
>>>>>    Dyn reg assumes every registration of an instance is unique which too 
>>>>> me is a very extreme
>>>>> 
>>>>> If you have a mobile app that needs to do the code flow... which
>>>>> requires a client_secret in order to retrieve the access token and
>>>>> refresh token, how does the app do this without per app instance
>>>>> registration?
>>>>> 
>>>>> I'd argue that almost all user facing mobile apps will want the above
>>>>> flow and that's not a small, rare edge case.
>>>>> 
>>>>> Thanks,
>>>>> George
>>>>> 
>>>>>    position.
>>>>> 
>>>>> 
>>>>> 
>>>>>    Phil
>>>>> 
>>>>> 
>>>>> 
>>>>>    On 2013-08-28, at 8:41, Justin Richer<jric...@mitre.org>  
>>>>> <mailto:jric...@mitre.org>  wrote:
>>>>> 
>>>>> 
>>>>> 
>>>>>        Except for the cases where you want step 1 to happen in band. To 
>>>>> me, that is a vitally and fundamentally important use case that we can't 
>>>>> disregard, and we must have a solution that can accommodate that. The 
>>>>> notions of "publisher" and "product" fade very quickly once you get 
>>>>> outside of the software vendor world.
>>>>> 
>>>>> 
>>>>> 
>>>>>        This is, of course, not to stand in the way of other solutions or 
>>>>> approaches (such as something assertion based like you're after). It's 
>>>>> not a one-or-the-other proposition, especially when there are mutually 
>>>>> exclusive aspects of each.
>>>>> 
>>>>> 
>>>>> 
>>>>>        Therefore I once again call for the WG to finish the current 
>>>>> dynamic registration spec *AND* pursue the assertion based process that 
>>>>> Phil's talking about. They're not mutually exclusive, let's please stop 
>>>>> talking about them like they are.
>>>>> 
>>>>> 
>>>>> 
>>>>>        -- Justin
>>>>> 
>>>>> 
>>>>> 
>>>>>        On 08/28/2013 11:17 AM, Phil Hunt wrote:
>>>>> 
>>>>>            Sorry. I meant also to say i think there are 2 registration 
>>>>> steps
>>>>> 
>>>>>            1. Software registration/approval. This often happens out of 
>>>>> band. But in this step policy is defined that approves software for use. 
>>>>> Many of the reg params are known here.
>>>>> 
>>>>> 
>>>>> 
>>>>>            Federation techniques come into play as trust approvals can be 
>>>>> based on developer, product or even publisher.
>>>>> 
>>>>> 
>>>>> 
>>>>>            2. Each instance associates in a stateless way. Only clients 
>>>>> that need credential rotation need more.
>>>>> 
>>>>> 
>>>>> 
>>>>>            Phil
>>>>> 
>>>>> 
>>>>> 
>>>>>            On 2013-08-28, at 8:04, Phil Hunt<phil.h...@oracle.com>  
>>>>> <mailto:phil.h...@oracle.com>  wrote:
>>>>> 
>>>>> 
>>>>> 
>>>>>                I have a conflict I cannot get out of for 2pacific.
>>>>> 
>>>>> 
>>>>> 
>>>>>                I think a certificate based approach is going to simplify 
>>>>> exchanges in all cases. I encourage the group to explore the concept on 
>>>>> the call.
>>>>> 
>>>>> 
>>>>> 
>>>>>                I am not sure breaking dyn reg up helps. It creates yet 
>>>>> another option. I would like to explore how federation concept in 
>>>>> software statements can help with facilitating association and making 
>>>>> many reg stateless.
>>>>> 
>>>>> 
>>>>> 
>>>>>                Phil
>>>>> 
>>>>> 
>>>>> 
>>>>>                On 2013-08-28, at 5:43, "Tschofenig, Hannes (NSN - 
>>>>> FI/Espoo)"<hannes.tschofe...@nsn.com>  <mailto:hannes.tschofe...@nsn.com> 
>>>>>  wrote:
>>>>> 
>>>>> 
>>>>> 
>>>>>                    Here are the conference bridge / Webex details for the 
>>>>> call today.
>>>>> 
>>>>>                    We are going to complete the use case discussions from 
>>>>> last time (Phil wasn't able to walk through all slides). Justin was also 
>>>>> able to work out a strawman proposal based on the discussions last week 
>>>>> and we will have a look at it to see whether this is a suitable 
>>>>> compromise. Here is Justin's mail, in case you have missed 
>>>>> it:http://www.ietf.org/mail-archive/web/oauth/current/msg12036.html
>>>>> 
>>>>> 
>>>>> 
>>>>>                    Phil, please feel free to make adjustments to your 
>>>>> slides given the Justin's recent proposal.
>>>>> 
>>>>> 
>>>>> 
>>>>>                    Topic: OAuth Dynamic Client Registration
>>>>> 
>>>>>                    Date: Wednesday, August 28, 2013
>>>>> 
>>>>>                    Time: 2:00 pm, Pacific Daylight Time (San Francisco, 
>>>>> GMT-07:00)
>>>>> 
>>>>>                    Meeting Number: 703 230 586
>>>>> 
>>>>>                    Meeting Password: oauth
>>>>> 
>>>>> 
>>>>> 
>>>>>                    -------------------------------------------------------
>>>>> 
>>>>>                    To join the online meeting
>>>>> 
>>>>>                    -------------------------------------------------------
>>>>> 
>>>>>                    1. Go 
>>>>> tohttps://nsn.webex.com/nsn/j.php?ED=269567657&UID=0&PW=NNTI1ZWQzMDJk&RT=MiM0
>>>>> 
>>>>>                    2. Enter your name and email address.
>>>>> 
>>>>>                    3. Enter the meeting password: oauth
>>>>> 
>>>>>                    4. Click "Join Now".
>>>>> 
>>>>> 
>>>>> 
>>>>>                    To view in other time zones or languages, please click 
>>>>> the link:
>>>>> 
>>>>>                    
>>>>> https://nsn.webex.com/nsn/j.php?ED=269567657&UID=0&PW=NNTI1ZWQzMDJk&ORT=MiM0
>>>>> 
>>>>> 
>>>>> 
>>>>>                    To add this meeting to your calendar program (for 
>>>>> example Microsoft Outlook), click this link:
>>>>> 
>>>>>                    
>>>>> https://nsn.webex.com/nsn/j.php?ED=269567657&UID=0&ICS=MI&LD=1&RD=2&ST=1&SHA2=C6-AjLGvhdYjmpVdx75M6UsAwrNLMsequ5n95Gyv1R8=&RT=MiM0
>>>>> 
>>>>> 
>>>>> 
>>>>>                    -------------------------------------------------------
>>>>> 
>>>>>                    To join the teleconference only
>>>>> 
>>>>>                    -------------------------------------------------------
>>>>> 
>>>>>                    Global dial-in 
>>>>> Numbers:http://www.nokiasiemensnetworks.com/nvc
>>>>> 
>>>>>                    Conference Code: 944 910 5485
>>>>> 
>>>>> 
>>>>> 
>>>>> 
>>>>> 
>>>>>                    _______________________________________________
>>>>> 
>>>>>                    OAuth mailing list
>>>>> 
>>>>>                    OAuth@ietf.org  <mailto:OAuth@ietf.org>
>>>>> 
>>>>>                    https://www.ietf.org/mailman/listinfo/oauth
>>>>> 
>>>>>                _______________________________________________
>>>>> 
>>>>>                OAuth mailing list
>>>>> 
>>>>>                OAuth@ietf.org  <mailto:OAuth@ietf.org>
>>>>> 
>>>>>                https://www.ietf.org/mailman/listinfo/oauth
>>>>> 
>>>>>            _______________________________________________
>>>>> 
>>>>>            OAuth mailing list
>>>>> 
>>>>>            OAuth@ietf.org  <mailto:OAuth@ietf.org>
>>>>> 
>>>>>            https://www.ietf.org/mailman/listinfo/oauth
>>>>> 
>>>>> 
>>>>> 
>>>>>    _______________________________________________
>>>>> 
>>>>>    OAuth mailing list
>>>>> 
>>>>>    OAuth@ietf.org  <mailto:OAuth@ietf.org>
>>>>> 
>>>>>    https://www.ietf.org/mailman/listinfo/oauth
>>>>> 
>>>>> 
>>>>> 
>>>>> 
>>>>> 
>>>>> --
>>>>> George Fletcher <http://connect.me/gffletch>
>>>>> 
>>>> --
>>>> George Fletcher <http://connect.me/gffletch>
>>>> 
>>>> 
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>> 
>>> 
>>> -- 
>>> Sergey Beryozkin
>>> 
>>> Talend Community Coders
>>> http://coders.talend.com/
>>> 
>>> Blog: http://sberyozkin.blogspot.com
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>> 
>> 
> 
> -- 
> <XeC.png>

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to