On Thu, Oct 24, 2013 at 7:50 AM, Torsten Lodderstedt <
tors...@lodderstedt.net> wrote:

> Hi Thomas,
>
> we generate access tokens per resource server in order to mitigate this
> and other risks. You must issue those tokens to different audiences
> (resource server id) and the resource servers must validate if the token is
> issued for its particular audience. Otherwise a compromised resource server
> can still abuse the tokens.
>
> Talking about burden: You need to compare the effort needed to obtain
> different access tokens to the effort needed to implement proof of
> possession.
>

On our backlog is also support for "service accounts" (to use Google's
terminology), so clients will likely need to do some crypto-related work.
Asking them to do it for each and every request to sign the access token
might not be that much of a problem (if they have the right tools;
google-oauth-java-client for instance does a great job making all of this
easier, and google-api-java-client adds service accounts support with a
just-as-easy-to-use API:
https://code.google.com/p/google-api-java-client/wiki/OAuth2#Service_Accounts;
same for PHP, Python, etc.)
That said, I'm rather new to crypto too, so I might be oversimplifying
things…
I'll check with the project manager and project owner which approach we'd
use (we could also support both…)

I recommend you to take a look into the OAuth threat model for a discussion
> of this threat ( http://tools.ietf.org/html/rfc6819#section-4.6.4).
>

Thanks for the pointer. I had already read that RFC but somehow forgot
about some details, and failed to check it back for that particular problem.


-- 
Thomas Broyer
/tɔ.ma.bʁwa.je/ <http://xn--nna.ma.xn--bwa-xxb.je/>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to