Phil - I want to hear who are those developers supporting a4c. You keep saying developers developers. I am not one of them.

This mailing list has clearly shown total disregard for the a4c proposal. Please try to accept the community sentiment and unnecessarily don't extend this discussion into a lengthy email discussion when there is no clear acceptance for a4c.

On 06/13/2014 12:10 PM, Phil Hunt wrote:
I am going to address a few comments all together here:

1. John Bradley confirmed again yesterday, OIDC does not allow for 
authentication only as part of the normal code flow and decided intentionally 
not to address it.  So to say OIDC has a solution is confusing.

OIDC has the solution if you want to propagate profile information and authen 
information.  This means service providers have to implement much more code, 
and clients have to as well. For many there are customer abandonment and legal 
issues around sharing of too much PII information. They DO NOT want to have to 
ask for this information.

2. Regarding speculative future size: I  point out that the A4C draft is 
modelled exactly on the authorizaiton flow and has exactly the same security 
model. Therefore I would not expect any large increase in size, but rather the 
opposite. The number 1 challenge with this spec is not figuring out how to do 
this, but how to avoid scope creep into OIDC’s coverage.  I do NOT support 
scope creep into OIDC.

We need a specific draft that addresses the issues of developers thinking 6749 
is sufficient on its own.  I do NOT want to see stuff like browser based apps 
and node.js as in scope. OIDC has this covered.

3. My point with the 18 wheeler analogy is that yes, it is a vehicle that can 
take passengers, but it’s role is much more multi-purpose and heavy duty. For 
the developer that wants to securely take the kids to school, maybe just a 
Tesla Model S will do? This is less of a technical issue and more of a “market” 
issue. I know that’s hard for people like us to address, but it is a comment I 
keep hearing over and over (and not interestingly from Oracle itself).

4. As for confusion between OAuth’s intended authorization and a so called new 
authen function. This is the issue I’m trying to get on our agenda. This isn’t 
my idea, I am only the messenger. The fact is, developers and service providers 
who are not OAuth experts assume OAuth is about authentication and implement as 
such.  To some extent, this is  a market problem. Still, OIDC has not addressed 
the scenario. As John stated, OIDC choose not to do authen only.

5. As for whether we “tack-on” authen to OAuth as OIDC does or whether we 
create a brand new endpoint or flow. I think that is open for discussion once 
the charter is adopted.  A4C is just an input draft - not the way the group 
needs to solve it.  A4C is intended to show the problem is solvable in a 
reasonably implementable manner.

Phil

@independentid
www.independentid.com
phil.h...@oracle.com



On Jun 13, 2014, at 9:03 AM, Bill Burke <bbu...@redhat.com> wrote:


On 6/12/2014 4:18 PM, Phil Hunt wrote:

Phil

On Jun 12, 2014, at 12:50, Bill Burke <bbu...@redhat.com> wrote:



On 6/12/2014 12:49 PM, Prateek Mishra wrote:
The OpenID Connect 2.0 COre specification alone is 86 pages. It has
received review from maybe a dozen engineers within the OpenID community.
The OpenID Connect spec is 86 pages because it pretty much rehashes the OAuth2 
spec walking through each flow and how Open ID Connect expands on that flow.  
A4c looks like a subset of this work minus some additional claims and, IMO, is 
incomplete compared to OIDC.
In what regards?

Much of oidc is out of scope for this requirement.

What is in a4c that isn't already in OIDC?

It is a bit like saying an 18 wheeler is suitable for driving the kids to 
school. :-)
I don't think this is true.  Most oidc oauth extensions are optional with the 
sole requirement that providers don't barf if you send them.


_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to