I can’t give names or numbers but yeah, it’s happening. Especially for
Android apps, it’s easy & straightforward to get an ID token, and cheap to
validate on the server side.  Obviously, it only works for Google accounts.


On Thu, Mar 27, 2014 at 2:40 PM, John Bradley <ve7...@ve7jtb.com> wrote:

> I don't know what clients are using the play API to get 3rd party tokens.
>
> Perhaps Tim Bray can comment on scale of use if not specific clients.
>
> John B.
>
> On Mar 27, 2014, at 3:36 PM, Lewis Adam-CAL022 <
> adam.le...@motorolasolutions.com> wrote:
>
> I get the idea, but I’m trying to get a feel for whether or not this model
> is being built upon and to what extent.
>
> So if I rephrase … are there known 3rd party AS’s out there in the wild
> that are consuming the Google id_token?
>
> Or any examples of a 3rd-party RS that is directly consuming it?
>
> Looking for actual examples in the wild to point to.
>
> adam
>
> *From:* John Bradley [mailto:ve7...@ve7jtb.com <ve7...@ve7jtb.com>]
> *Sent:* Thursday, March 27, 2014 1:07 PM
> *To:* Lewis Adam-CAL022
> *Cc:* oauth@ietf.org
> *Subject:* Re: [OAUTH-WG] OAuth & Enteprise federation ... 5 years from
> now
>
> Handing out a id_token with a 3rd party AS or RS as the audience is the
> standard way that Android apps that rely on Google as the source of
> identity work on Android using the Google Play Services.
>
> This describes the API
> http://android-developers.blogspot.ca/2013/01/verifying-back-end-calls-from-android.html
>
> On Mar 27, 2014, at 2:46 PM, Lewis Adam-CAL022 <
> adam.le...@motorolasolutions.com> wrote:
>
>
>  Hi John,
>
> With respect to Google Play handing out id_tokens, are any there any known
> instances of that being used?  Either to kick of an assertion flow with
> another (non-Google) AS, or to present directly to a non-Google RS?
>
> adam
>
> *From:* John Bradley [mailto:ve7...@ve7jtb.com <ve7...@ve7jtb.com>]
> *Sent:* Thursday, March 27, 2014 9:07 AM
> *To:* Lewis Adam-CAL022
> *Cc:* oauth@ietf.org
> *Subject:* Re: [OAUTH-WG] OAuth & Enteprise federation ... 5 years from
> now
>
> Hi Adam,
>
> 3 is the most common today.  In the Salesforce case it has the additional
> benefit that when Domain 1 is federating to SalesForce via OpenID Connect
> it can provide access tokens for it's API to sales force scoped for that
> user for use in the SalesForce custom logic.
>
> 1 and 2 are similar and likely it is more of a deployment choice between
> them.
> We do see examples of this currently with the Android play store providing
> third-party id_tokens/JWT assertions to OAuth clients.
>
> The reason for doing 1 or 2 vs 3 probably comes down to connivence and
> security if  there is an agent for the user's  IdP on the device that can
> act as a confidential client to the IdP for security and provide a more
> consistent UI for the user.   That is what we are working on in the NAPPS
> WG at OIDF.
>
> We have examples of 1/2 now, the problem is that they are not as
> universally applicable as 3 but hopefully with standardization for
> developers we will se more in the next year or so.
>
> John B.
>
> On Mar 27, 2014, at 10:06 AM, Lewis Adam-CAL022 <
> adam.le...@motorolasolutions.com> wrote:
>
>
>
>  I am curious it ping the thoughts of others on the list of how OAuth is
> going to continue to mature, especially with respect to enterprise
> federation scenarios.  This is something that I spend a whole lot of time
> thinking about.  Specifically, consider the following use case:
>
> An end user in domain 1 downloads a native application to access an API
> exposed by domain 2, to access a protected resource in domain 2, under the
> administrative control of the domain 2 enterprise.
>
>
> There are in my mind three basic means by which OAuth can federate, which
> I know I have discussed with some of you in the past:
>
>
>
> 1.       First option … End user in domain 1 requests a JWT-structured
> access_token from the OAuth provider in domain 1, and sends it in the HTTP
> header directly to the RS in domain 2.   The JWT access_token looks a whole
> lot like a OIDC id_token (maybe it even is one?).  The RS in domain 2 is
> able to make attributed-based access control decisions based on the
> contents of the JWT.  This is architecturally the simplest approach, but
> enterprises aren’t exactly setting up OAuth providers these days for the
> intent of accessing protected resources in foreign domains.  Anybody think
> this might be the case 5 years from now?
>
>
>
> 2.       Second option … similar to the first, but the JWT-structured
> access_token from domain 1 is sent to the OAuth provider in domain 2, ala
> the JWT assertion profile.  Domain 1 access token is exchanged for a domain
> 2 access token, and the native client uses the domain 2 access token to
> send to the protected resource in domain 2.  I like this slightly more than
> the first option, because the resources servers in domain 2 only need to
> understand the token format of their own AS.  But it still suffers from the
> same basic challenge of option 1, that enterprises don’t’ setup OAuth
> providers today for the purpose of federating, the way that setup SAML
> providers for WebSSO.
>
>
>
> 3.       Third option.  Native client contacts the OAuth provider in
> domain 2 directly.  The authorization endpoint is federation enabled
> (NASCAR or other) and the user in domain 1 selects their home IdP (SAML or
> OIDC) and does WebSSO to federated into the domain 2 OAuth provider.  I
> believe this is the model that Salesforce supports today, and it the most
> tactical, since enterprise that want to federate today run out and buy a
> SAML provider.
>
> So option 3 is the most obvious approach today.  Does anybody foresee
> enterprises setting up an STS in the future to federate to foreign RS’s
> (the way they setup SAML providers today)?  Anybody think we will see
> options 1 or 2 in the future?
>
>
> adam
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>
>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to