The draft is very clear. 

Phil

> On Jul 23, 2014, at 0:46, Nat Sakimura <sakim...@gmail.com> wrote:
> 
> The new grant type that I was talking about was 
> "authorization_code_but_do_not_return_access_nor_refresh_token", so to speak. 
> It does not return anything per se, but an extension can define something on 
> top of it. 
> 
> Then, OIDC can define a binding to it so that the binding only returns ID 
> Token. 
> This binding work should be done in OIDF. Should there be such a grant type, 
> it will be an extremely short spec. 
> 
> At the same time, if any other specification wanted to define 
> other type of tokens and have it returned from the token endpoint, 
> it can also use this grant type. 
> 
> If what you want is to define a new grant type that returns ID Token only, 
> then, I am with Justin. Since "other response than ID Token" is only 
> theoretical, this is a more plausible way forward, I suppose. 
> 
> Nat
> 
> 
> 2014-07-22 14:30 GMT-04:00 Justin Richer <jric...@mit.edu>:
>> So the draft would literally turn into:
>> 
>> "The a4c response type and grant type return an id_token from the token 
>> endpoint with no access token. All parameters and values are defined in 
>> OIDC."
>> 
>> Seems like the perfect mini extension draft for OIDF to do.
>> 
>> --Justin
>> 
>> /sent from my phone/
>> 
>> On Jul 22, 2014 10:29 AM, Nat Sakimura <sakim...@gmail.com> wrote:
>> >
>> > What about just defining a new grant type in this WG?
>> >
>> >
>> > 2014-07-22 12:56 GMT-04:00 Phil Hunt <phil.h...@oracle.com>:
>> >>
>> >> That would be nice. However oidc still needs the new grant type in order 
>> >> to implement the same flow. 
>> >>
>> >> Phil
>> >>
>> >> On Jul 22, 2014, at 11:35, Nat Sakimura <sakim...@gmail.com> wrote:
>> >>
>> >>> +1 to Justin. 
>> >>>
>> >>>
>> >>> 2014-07-22 9:54 GMT-04:00 Richer, Justin P. <jric...@mitre.org>:
>> >>>>
>> >>>> Errors like these make it clear to me that it would make much more 
>> >>>> sense to develop this document in the OpenID Foundation. It should be 
>> >>>> something that directly references OpenID Connect Core for all of these 
>> >>>> terms instead of redefining them. It's doing authentication, which is 
>> >>>> fundamentally what OpenID Connect does on top of OAuth, and I don't see 
>> >>>> a good argument for doing this work in this working group.
>> >>>>
>> >>>>  -- Justin
>> >>>>
>> >>>> On Jul 22, 2014, at 4:30 AM, Thomas Broyer <t.bro...@gmail.com> wrote:
>> >>>>
>> >>>>>
>> >>>>>
>> >>>>>
>> >>>>> On Mon, Jul 21, 2014 at 11:52 PM, Mike Jones 
>> >>>>> <michael.jo...@microsoft.com> wrote:
>> >>>>>>
>> >>>>>> Thanks for your review, Thomas.  The “prompt=consent” definition 
>> >>>>>> being missing is an editorial error.  It should be:
>> >>>>>>
>> >>>>>>  
>> >>>>>>
>> >>>>>> consent
>> >>>>>>
>> >>>>>> The Authorization Server SHOULD prompt the End-User for consent 
>> >>>>>> before returning information to the Client. If it cannot obtain 
>> >>>>>> consent, it MUST return an error, typically consent_required.
>> >>>>>>
>> >>>>>>  
>> >>>>>>
>> >>>>>> I’ll plan to add it in the next draft.
>> >>>>>
>> >>>>>
>> >>>>> It looks like the consent_required error needs to be defined too, and 
>> >>>>> you might have forgotten to also import account_selection_required 
>> >>>>> from OpenID Connect.
>> >>>>>  
>> >>>>>>
>> >>>>>>  
>> >>>>>>
>> >>>>>> I agree that there’s no difference between a response with multiple 
>> >>>>>> “amr” values that includes “mfa” and one that doesn’t.  Unless a 
>> >>>>>> clear use case for why “mfa” is needed can be identified, we can 
>> >>>>>> delete it in the next draft.
>> >>>>>
>> >>>>>
>> >>>>> Thanks.
>> >>>>>
>> >>>>> How about "pwd" then? I fully understand that I should return "pwd" if 
>> >>>>> the user authenticated using a password, but what "the service if a 
>> >>>>> client secret is used" means in the definition for the "pwd" value?
>> >>>>>
>> >>>>> (Nota: I know you're at IETF-90, I'm ready to wait 'til you come back 
>> >>>>> ;-) )
>> >>>>>
>> >>>>> --
>> >>>>> Thomas Broyer
>> >>>>> /tɔ.ma.bʁwa.je/
>> >>>>> _______________________________________________
>> >>>>> OAuth mailing list
>> >>>>> OAuth@ietf.org
>> >>>>> https://www.ietf.org/mailman/listinfo/oauth
>> >>>>
>> >>>>
>> >>>>
>> >>>> _______________________________________________
>> >>>> OAuth mailing list
>> >>>> OAuth@ietf.org
>> >>>> https://www.ietf.org/mailman/listinfo/oauth
>> >>>>
>> >>>
>> >>>
>> >>>
>> >>> --
>> >>> Nat Sakimura (=nat)
>> >>> Chairman, OpenID Foundation
>> >>> http://nat.sakimura.org/
>> >>> @_nat_en
>> >>>
>> >>> _______________________________________________
>> >>> OAuth mailing list
>> >>> OAuth@ietf.org
>> >>> https://www.ietf.org/mailman/listinfo/oauth
>> >
>> >
>> >
>> >
>> > --
>> > Nat Sakimura (=nat)
>> > Chairman, OpenID Foundation
>> > http://nat.sakimura.org/
>> > @_nat_en
> 
> 
> 
> -- 
> Nat Sakimura (=nat)
> Chairman, OpenID Foundation
> http://nat.sakimura.org/
> @_nat_en
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to