+1 Thanks John.
Phil > On Jun 13, 2014, at 12:11, John Bradley <ve7...@ve7jtb.com> wrote: > > Subsequent to this email Phil and I have talked. > > There are two things that are deltas to connect in the spec. > > One is the ability to issue only a id_token from the token endpoint. > > The code grant_type requires a access token in the response. If the WG > wants to define a new grant type that doesn't return a access or refresh > token that would be fine and it could be used with Connect as other grant > types are. The current use of a response_type in a4c to signal only > returning a id_token and reusing the "code" grant type is a problem. > I think Mike J. will be able to do an update with that shortly. > > Phil is correct that Connect doesn't currently support that OAuth grant type > because it has not been defined yet. Not because you must provide claims at > the token endpoint. > > Connect supports the "id_token" and "none" response types nether of which > provide access tokens. > > For example a authn request with a scope of "openid" and a response_type of > code will return a id_token and a access token for a user_info endpoint. > However the user_info endpoint will only only contain a claim for the "sub" > that matches the "sub" in the id_token and not any photos of relatives, > unless the IdP is horribly broken. > > We need to balance returning a access token that may be discarded by the > client that gives access to no PII vs adding a new grant_type. > I think that would be a useful discussion that could feed back to Connect or > a4c. > > The other difference has to do with the use of authentication context and > wanting to send a single value on a predefined scale vs an ordered list by > preference. > This has been debated many times and many places. The Connect approach > recognizes that authentication contexts are not necessarily scalar. > In SAML we do have the constructs of better than etc. I think these are > implemented and used almost nowhere. > The Liberty/Kantara conformance testing only ever tested exact match. So > Connect did something similar to the option that is used in SAML. > I don't know that adding another way to ask for authentication context is > helping the world. > > This is perhaps a useful discussion, also independent of the specs though it > may want informing from people at OASIS/Kantara who are not normally part of > OAuth discussions. > > I remain concerned that if we do a small core authentication spec in the > OAuth WG that may start being compatible with Connect that opens the door to > extensions down the road that may not be as people inevitably discover that > there is more to life than the code flow. > > I prefer to profile down Connect and support a new response type if that is > desired rather than adding eventual confusion and incompatibility. > > The main question for the work group at this point is if we want to change > our charter to include authentication. > If we do then a4c and other authentication related drafts can come into the > WG. > > At this point a4c is a independent draft. > > I am in favour of having a concise draft for basic identity providers, doing > simple SSO. > Connect has a Basic Client profile for people developing clients/RP/SP as > there tend to be more of them than IdP. > The same thing can be done in the Connect WG as a Basic IdP profile. > > Going to far into debating the finer points of a4c is probably premature, > until after a charter decision is reached. > > Regards > John B. > >> On Jun 13, 2014, at 1:10 PM, Phil Hunt <phil.h...@oracle.com> wrote: >> >> I am going to address a few comments all together here: >> >> 1. John Bradley confirmed again yesterday, OIDC does not allow for >> authentication only as part of the normal code flow and decided >> intentionally not to address it. So to say OIDC has a solution is confusing. >> >> OIDC has the solution if you want to propagate profile information and >> authen information. This means service providers have to implement much >> more code, and clients have to as well. For many there are customer >> abandonment and legal issues around sharing of too much PII information. >> They DO NOT want to have to ask for this information. >> >> 2. Regarding speculative future size: I point out that the A4C draft is >> modelled exactly on the authorizaiton flow and has exactly the same security >> model. Therefore I would not expect any large increase in size, but rather >> the opposite. The number 1 challenge with this spec is not figuring out how >> to do this, but how to avoid scope creep into OIDC’s coverage. I do NOT >> support scope creep into OIDC. >> >> We need a specific draft that addresses the issues of developers thinking >> 6749 is sufficient on its own. I do NOT want to see stuff like browser >> based apps and node.js as in scope. OIDC has this covered. >> >> 3. My point with the 18 wheeler analogy is that yes, it is a vehicle that >> can take passengers, but it’s role is much more multi-purpose and heavy >> duty. For the developer that wants to securely take the kids to school, >> maybe just a Tesla Model S will do? This is less of a technical issue and >> more of a “market” issue. I know that’s hard for people like us to address, >> but it is a comment I keep hearing over and over (and not interestingly from >> Oracle itself). >> >> 4. As for confusion between OAuth’s intended authorization and a so called >> new authen function. This is the issue I’m trying to get on our agenda. This >> isn’t my idea, I am only the messenger. The fact is, developers and service >> providers who are not OAuth experts assume OAuth is about authentication and >> implement as such. To some extent, this is a market problem. Still, OIDC >> has not addressed the scenario. As John stated, OIDC choose not to do authen >> only. >> >> 5. As for whether we “tack-on” authen to OAuth as OIDC does or whether we >> create a brand new endpoint or flow. I think that is open for discussion >> once the charter is adopted. A4C is just an input draft - not the way the >> group needs to solve it. A4C is intended to show the problem is solvable in >> a reasonably implementable manner. >> >> Phil >> >> @independentid >> www.independentid.com >> phil.h...@oracle.com >> >> >> >>> On Jun 13, 2014, at 9:03 AM, Bill Burke <bbu...@redhat.com> wrote: >>> >>> >>> >>>> On 6/12/2014 4:18 PM, Phil Hunt wrote: >>>> >>>> >>>> Phil >>>> >>>>> On Jun 12, 2014, at 12:50, Bill Burke <bbu...@redhat.com> wrote: >>>>> >>>>> >>>>> >>>>>> On 6/12/2014 12:49 PM, Prateek Mishra wrote: >>>>>> The OpenID Connect 2.0 COre specification alone is 86 pages. It has >>>>>> received review from maybe a dozen engineers within the OpenID community. >>>>> >>>>> The OpenID Connect spec is 86 pages because it pretty much rehashes the >>>>> OAuth2 spec walking through each flow and how Open ID Connect expands on >>>>> that flow. A4c looks like a subset of this work minus some additional >>>>> claims and, IMO, is incomplete compared to OIDC. >>>> In what regards? >>>> >>>> Much of oidc is out of scope for this requirement. >>> >>> What is in a4c that isn't already in OIDC? >>> >>>> It is a bit like saying an 18 wheeler is suitable for driving the kids to >>>> school. :-) >>> >>> I don't think this is true. Most oidc oauth extensions are optional with >>> the sole requirement that providers don't barf if you send them. >>> >>> -- >>> Bill Burke >>> JBoss, a division of Red Hat >>> http://bill.burkecentral.com >> >> _______________________________________________ >> OAuth mailing list >> OAuth@ietf.org >> https://www.ietf.org/mailman/listinfo/oauth > _______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth