FYI, the individual submission draft 
http://tools.ietf.org/html/draft-jones-oauth-token-exchange describes adding 
something analogous to WS-Trust token exchange to OAuth 2.0.  That will be 
discussed at the OAuth working group meeting tomorrow.

                                                            -- Mike

From: OAuth [mailto:oauth-boun...@ietf.org] On Behalf Of Gil Kirkpatrick
Sent: Wednesday, July 23, 2014 10:29 AM
To: 'Richard Snowden'; oauth@ietf.org
Subject: Re: [OAUTH-WG] Please help me understand OAuth 2.0

The RFCs 6749 and 6750 are a good place to start. 
http://tools.ietf.org/html/rfc6749 and http://tools.ietf.org/html/rfc6750.

The first thing to understand is that OAuth2 targets a very specific use case 
of a user authorizing an application (like Twitter) access to resources they 
own (like photos) through a resource server (like Facebook). It’s more an 
authN/authZ framework than a complete system, and doesn’t directly address the 
traditional enterprise use cases. Once you get your head around that, the rest 
is pretty straightforward. Because it’s lightweight and thin, OAuth2 can be 
used in lots of authN/authZ scenarios, for instance  OpenID Connect 
http://openid.net/connect/ and UMA 
http://docs.kantarainitiative.org/uma/draft-uma-core.html.

You’d be best off clearing your mind of SAML concepts and reading the RFCs, but 
to answer your questions:

1.      Not really. Access tokens represent a user-granted authorization for a 
specific application to access a specific resource scope. The semantics of a 
scopes are left to the developer, but you can think of a scope as a 
representation of what access(es) are allowed to what resource(s). There is no 
user identity information necessarily conveyed in the access token… that is 
what OpenID Connect is for. OpenID Connect maps pretty closely to SAML.

2.      Sort of. When the resource owner grants access, the AS issues an 
authorization grant code. The client then presents the grant code to the AS for 
an access token. The client includes the access token with each resource 
request, and the resource server uses the scope in the token to determine if 
access should be granted or not.

3.      The role of the PDP is split between the AS and the RS. The AS provides 
a token representing the user’s consent to access of a particular scope, and 
the RS interprets the scope to grant access. The scope _could_ just be a 
Boolean value indicating that access is allowed or not, in which case the AS 
would be a PDP, but in practice the scope encodes a set of permissions that the 
RS interprets in the context of the specific resource request.

HTH,

-gil


From: OAuth [mailto:oauth-boun...@ietf.org] On Behalf Of Richard Snowden
Sent: Wednesday, 23 July 2014 2:57 AM
To: oauth@ietf.org<mailto:oauth@ietf.org>
Subject: [OAUTH-WG] Please help me understand OAuth 2.0

I am pretty familiar with the WS-* and SOAP Web Services world. At the moment 
I'm trying to understand which features are available in the OAuth 2.0 world.
1) SAML tokens: This access token in OAuth 2.0 - is it similar to what SAML 
tokens are for?
2) STS: Is an OAuth 2.0 Authorization Server the equivalent to a STS?
3) PDP (Policy Decision Point): Is this also handled by the OAuth 2.0 
Authorization Server? Or does the Resource Server, based on the access token, 
have to make the decision whether or not  grant access to a resource?
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to