But... this proposal issues id_tokens. Is this proposal stupid for doing so, or 
does Microsoft not actually implement it as written?

Also, I can't find any mention of this in your docs. Can you point us to it?

And doesn't Microsoft implement OpenID Connect already? You guys joined the 
OIDC interop with your implementation after all. If you're doing both, great, 
all the more reason to do this work in OIDF.

--Justin

/sent from my phone/

On Jul 23, 2014 9:55 PM, Anthony Nadalin <tony...@microsoft.com> wrote:
>
> I already indicated that Microsoft has implemented this and is in production, 
> as id_tokens are stupid on intersystem and partner collaboration sites 
>
> -----Original Message----- 
> From: Justin Richer [mailto:jric...@mit.edu] 
> Sent: Wednesday, July 23, 2014 6:52 PM 
> To: Anthony Nadalin 
> Subject: Re: [OAUTH-WG] New Version Notification for 
> draft-hunt-oauth-v2-user-a4c-05.txt 
>
> And which IdP is that? Can you point us to the implementation? 
>
> --Justin 
>
> /sent from my phone/ 
>
> On Jul 23, 2014 9:43 PM, Anthony Nadalin <tony...@microsoft.com> wrote: 
> > 
> > >Something really useful to do would be sorting out channel_id so we 
> > >can do PoP for id tokens to make them and other cookies secure in the 
> > >front channel.   I think that is a better use of time 
> > 
> >   
> > 
> > Folks are already working on this and it does not take a anything from 
> > OAuth to make it work, OAuth Tokens can be used and there is not a 
> > need for OAuth POP Tokens. A4C is already in use on one of the largest 
> > IdPs, but I don’t think you would understand how useful it is 
> > 
> >   
> > 
> > From: OAuth [mailto:oauth-boun...@ietf.org] On Behalf Of John Bradley 
> > Sent: Wednesday, July 23, 2014 1:54 PM 
> > To: tors...@lodderstedt.net 
> > Cc: oauth@ietf.org list 
> > Subject: Re: [OAUTH-WG] New Version Notification for 
> > draft-hunt-oauth-v2-user-a4c-05.txt 
> > 
> >   
> > 
> > I thought I did post this to the list. 
> > 
> >   
> > 
> > I guess I hit the wrong reply on my phone. 
> >   
> > 
> > John B. 
> > Sent from my iPhone 
> > 
> > 
> > On Jul 23, 2014, at 4:50 PM, tors...@lodderstedt.net wrote: 
> >> 
> >> we are two, at least :-) 
> >> 
> >> Why didn't you post this on the list? 
> >> 
> >> When will be be arriving? 
> >> 
> >> Am 23.07.2014 16:39, schrieb John Bradley: 
> >>> 
> >>> Ian Glazer mentioned this in his keynote at CIS yesterday. 
> >>> 
> >>>   
> >>> 
> >>> His advice was please stop,  we are creating confusion and 
> >>> uncertainty. 
> >>> 
> >>>   
> >>> 
> >>> We are becoming our own wort enemy. ( my view though Ian may share 
> >>> it) 
> >>> 
> >>>   
> >>> 
> >>> Returning just an id_ token from the token endpoint has little real 
> >>> value. 
> >>> 
> >>>   
> >>> 
> >>> Something really useful to do would be sorting out channel_id so we 
> >>> can do PoP for id tokens to make them and other cookies secure in the 
> >>> front channel.   I think that is a better use of time. 
> >>> 
> >>>   
> >>> 
> >>> I may be in the minority opinion on that,  it won't be the first 
> >>> time. 
> >>> 
> >>> John B. 
> >>> Sent from my iPhone 
> >>> 
> >>> 
> >>> On Jul 23, 2014, at 4:04 PM, Torsten Lodderstedt 
> >>> <tors...@lodderstedt.net> wrote: 
> >>>> 
> >>>> You are right from a theoretical perspective. Practically this was 
> >>>> caused by editorial decisions during the creation of the RFC. As far as 
> >>>> I remember, there was a definition of the (one) token endpoint response 
> >>>> in early versions. No one every considered to NOT respond with an access 
> >>>> token from the token endpoint. So one might call it an implicit 
> >>>> assumption. 
> >>>> 
> >>>>   
> >>>> 
> >>>> I'm worried that people get totally confused if an exception is 
> >>>> introduced now given the broad adoption of OAuth based on this 
> >>>> assumption. 
> >>>> 
> >>>>   
> >>>> 
> >>>> regards, 
> >>>> 
> >>>> Torsten. 
> >>>> 
> >>>> 
> >>>> Am 23.07.2014 um 15:41 schrieb Thomas Broyer <t.bro...@gmail.com>: 
> >>>>> 
> >>>>> Is it said anywhere that ALL grant types MUST use Section 5.1 
> >>>>> responses? Each grant type references Section 5.1, and "access token 
> >>>>> request" is only defined in the context of the defined grant types. 
> >>>>> Section 2.2 doesn't talk about the request or response format. 
> >>>>> 
> >>>>> Le 23 juil. 2014 21:32, "Nat Sakimura" <sakim...@gmail.com> a écrit : 
> >>>>>> 
> >>>>>> Is it? Apart from the implicit grant that does not use token 
> >>>>>> endpoint, all other grant references section 5.1 for the response, 
> >>>>>> i.e., all shares the same response. 
> >>>>>> 
> >>>>>>   
> >>>>>> 
> >>>>>> 2014-07-23 15:18 GMT-04:00 Thomas Broyer <t.bro...@gmail.com>: 
> >>>>>>> 
> >>>>>>> I hadn't realized the JSON response that requires the access_token 
> >>>>>>> field is defined per grant_type, so I'd be OK to "extend the 
> >>>>>>> semantics" as in the current draft. 
> >>>>>>> That was actually my main concern: that the token endpoint mandates 
> >>>>>>> access_token; but its actually not the case. 
> >>>>>>> 
> >>>>>>> Le 23 juil. 2014 20:46, "Nat Sakimura" <sakim...@gmail.com> a écrit : 
> >>>>>>> 
> >>>>>>>   
> >>>>>>>> 
> >>>>>>>> I agree with John that overloading response_type @ authz 
> >>>>>>>> endpoint is a bad idea. It completely changes the semantics of this 
> >>>>>>>> parameter. NOTE: what I was proposing was not this parameter, but a 
> >>>>>>>> new parameter response_type @ token endpoint. 
> >>>>>>>> 
> >>>>>>>>   
> >>>>>>>> 
> >>>>>>>> I also think overloading grant_type is a bad idea since it 
> >>>>>>>> changes its semantics. I quote the definition here again: 
> >>>>>>>> 
> >>>>>>>>   
> >>>>>>>> 
> >>>>>>>> grant 
> >>>>>>>> 
> >>>>>>>>     credential representing the resource owner's authorization 
> >>>>>>>> 
> >>>>>>>>   
> >>>>>>>> 
> >>>>>>>> grant_type 
> >>>>>>>> 
> >>>>>>>> type of grant sent to the token endpoint to obtain the access 
> >>>>>>>> token 
> >>>>>>>> 
> >>>>>>>>   
> >>>>>>>> 
> >>>>>>>> It is not about controlling what is to be returned from the 
> >>>>>>>> token endpoint, but the hint to the token endpoint describing the 
> >>>>>>>> type of credential the endpoint has received. It seems the "control 
> >>>>>>>> of what is being returned from token endpoint"  is just a side 
> >>>>>>>> effect. 
> >>>>>>>> 
> >>>>>>>>   
> >>>>>>>> 
> >>>>>>>> I am somewhat ambivalent[1] in changing the semantics of token 
> >>>>>>>> endpoint, but in as much as "text is the king" for a spec., we 
> >>>>>>>> probably should not change the semantics of it as Torsten points 
> >>>>>>>> out. If it is ok to change this semantics, I believe defining a new 
> >>>>>>>> parameter to this endpoint to control the response would be the best 
> >>>>>>>> way to go. This is what I have described previously. 
> >>>>>>>> 
> >>>>>>>>   
> >>>>>>>> 
> >>>>>>>> Defining a new endpoint to send code to get ID Token and 
> >>>>>>>> forbidding the use of it against token endpoint would not change the 
> >>>>>>>> semantics of any existing parameter or endpoint, which is good. 
> >>>>>>>> However, I doubt if it is not worth doing. What's the point of 
> >>>>>>>> avoiding access token scoped to UserInfo endpoint after all? 
> >>>>>>>> Defining a new endpoint for just avoiding the access token for 
> >>>>>>>> userinfo endpoint seems way too much the heavy wait way and it 
> >>>>>>>> breaks interoperabiliy: it defeats the purpose of standardization. 
> >>>>>>>> 
> >>>>>>>>   
> >>>>>>>> 
> >>>>>>>> I have started feeling that no change is the best way out. 
> >>>>>>>> 
> >>>>>>>>   
> >>>>>>>> 
> >>>>>>>> Nat 
> >>>>>>>> 
> >>>>>>>>   
> >>>>>>>> 
> >>>>>>>> [1]  If instead of saying "Token endpoint - used by the client to 
> >>>>>>>> exchange an authorization grant for an access token, typically with 
> >>>>>>>> client authentication", it were saying "Token endpoint - used by the 
> >>>>>>>> client to exchange an authorization grant for tokens, typically with 
> >>>>>>>> client authentication", then it would have been OK. It is an 
> >>>>>>>> expansion of the capability rather than changing the semantics. 
> >>>>>>>> 
> >>>>>>>>   
> >>>>>>>> 
> >>>>>>>>   
> >>>>>>>> 
> >>>>>>>> 2014-07-23 13:39 GMT-04:00 Mike Jones <michael.jo...@microsoft.com>: 
> >>>>>>>>> 
> >>>>>>>>> You need the alternative response_type value ("code_for_id_token" 
> >>>>>>>>> in the A4C draft) to tell the Authorization Server to return a code 
> >>>>>>>>> to be used with the new grant type, rather than one to use with the 
> >>>>>>>>> "authorization_code" grant type (which is what response_type=code 
> >>>>>>>>> does). 
> >>>>>>>>> 
> >>>>>>>>>   
> >>>>>>>>> 
> >>>>>>>>> From: OAuth [mailto:oauth-boun...@ietf.org] On Behalf Of John 
> >>>>>>>>> Bradley 
> >>>>>>>>> Sent: Wednesday, July 23, 2014 10:33 AM 
> >>>>>>>>> To: tors...@lodderstedt.net 
> >>>>>>>>> 
> >>>>>>>>> 
> >>>>>>>>> Cc: oauth@ietf.org 
> >>>>>>>>> Subject: Re: [OAUTH-WG] New Version Notification for 
> >>>>>>>>> draft-hunt-oauth-v2-user-a4c-05.txt 
> >>>>>>>>> 
> >>>>>>>>>   
> >>>>>>>>> 
> >>>>>>>>>   
> >>>>>>>>> 
> >>>>>>>>> If we use the token endpoint then a new grant_type is the best 
> >>>>>>>>> way. 
> >>>>>>>>> 
> >>>>>>>>>   
> >>>>>>>>> 
> >>>>>>>>> It sort of overloads code, but that is better than messing 
> >>>>>>>>> with response_type for the authorization endpoint to change the 
> >>>>>>>>> response from the token_endpoint.  That is in my opinion a champion 
> >>>>>>>>> bad idea. 
> >>>>>>>>> 
> >>>>>>>>>   
> >>>>>>>>> 
> >>>>>>>>> In discussions developing Connect we decided not to open this 
> >>>>>>>>> can of worms because no good would come of it. 
> >>>>>>>>> 
> >>>>>>>>>   
> >>>>>>>>> 
> >>>>>>>>> The token_endpoint returns a access token.  Nothing requires 
> >>>>>>>>> scope to be associates with the token. 
> >>>>>>>>> 
> >>>>>>>>>   
> >>>>>>>>> 
> >>>>>>>>> That is the best solution.  No change required.  Better 
> >>>>>>>>> interoperability in my opinion. 
> >>>>>>>>> 
> >>>>>>>>>   
> >>>>>>>>> 
> >>>>>>>>> Still on my way to TO, getting in later today. 
> >>>>>>>>> 
> >>>>>>>>>   
> >>>>>>>>> 
> >>>>>>>>> John B. 
> >>>>>>>>> 
> >>>>>>>>>   
> >>>>>>>>> 
> >>>>>>>>> 
> >>>>>>>>> 
> >>>>>>>>> Sent from my iPhone 
> >>>>>>>>> 
> >>>>>>>>> 
> >>>>>>>>> On Jul 23, 2014, at 12:15 PM, tors...@lodderstedt.net wrote: 
> >>>>>>>>>> 
> >>>>>>>>>> The "response type" of the token endpoint is controlled by the 
> >>>>>>>>>> value of the parameter "grant_type". So there is no need to 
> >>>>>>>>>> introduce a new parameter. 
> >>>>>>>>>> 
> >>>>>>>>>> wrt to a potential "no_access_token" grant type. I do not consider 
> >>>>>>>>>> this a good idea as it changes the semantics of the token endpoint 
> >>>>>>>>>> (as already pointed out by Thomas). This endpoint ALWAYS responds 
> >>>>>>>>>> with an access token to any grant type. I therefore would prefer 
> >>>>>>>>>> to use another endpoint for the intended purpose. 
> >>>>>>>>>> 
> >>>>>>>>>> regards, 
> >>>>>>>>>> Torsten. 
> >>>>>>>>>> 
> >>>>>>>>>>   
> >>>>>>>>>> 
> >>>>>>>>>> Am 23.07.2014 13:04, schrieb Nat Sakimura: 
> >>>>>>>>>>> 
> >>>>>>>>>>> IMHO, changing the semantics of "response_type" @ authz 
> >>>>>>>>>>> endpoint this way is not a good thing. 
> >>>>>>>>>>> 
> >>>>>>>>>>>   
> >>>>>>>>>>> 
> >>>>>>>>>>> Instead, defining a new parameter "response_type" @ token 
> >>>>>>>>>>> endpoint, as I described in my previous message, 
> >>>>>>>>>>> 
> >>>>>>>>>>> probably is better. At least, it does not change the 
> >>>>>>>>>>> semantics of the parameters of RFC6749. 
> >>>>>>>>>>> 
> >>>>>>>>>>>   
> >>>>>>>>>>> 
> >>>>>>>>>>>  Nat 
> >>>>>>>>>>> 
> >>>>>>>>>>>   
> >>>>>>>>>>> 
> >>>>>>>>>>> 2014-07-23 12:48 GMT-04:00 Thomas Broyer <t.bro...@gmail.com>: 
> >>>>>>>>>>> 
> >>>>>>>>>>> No, I mean response_type=none and response_type=id_token don't 
> >>>>>>>>>>> generate a code or access token so you don't use the Token 
> >>>>>>>>>>> Endpoint (which is not the same as the Authentication Endpoint 
> >>>>>>>>>>> BTW). 
> >>>>>>>>>>> 
> >>>>>>>>>>> With response_type=code_for_id_token, you get a code and exchange 
> >>>>>>>>>>> it for an id_token only, rather than an access_token, so you're 
> >>>>>>>>>>> changing the semantics of the Token Endpoint. 
> >>>>>>>>>>> 
> >>>>>>>>>>>   
> >>>>>>>>>>> 
> >>>>>>>>>>> I'm not saying it's a bad thing, just that you can't really 
> >>>>>>>>>>> compare none and id_token with code_for_id_token. 
> >>>>>>>>>>> 
> >>>>>>>>>>>   
> >>>>>>>>>>> 
> >>>>>>>>>>> On Wed, Jul 23, 2014 at 6:45 PM, Richer, Justin P. 
> >>>>>>>>>>> <jric...@mitre.org> wrote: 
> >>>>>>>>>>> 
> >>>>>>>>>>> It's only "not using the token endpoint" because the token 
> >>>>>>>>>>> endpoint copy-pasted and renamed the authentication endpoint. 
> >>>>>>>>>>> 
> >>>>>>>>>>>   
> >>>>>>>>>>> 
> >>>>>>>>>>>  -- Justin 
> >>>>>>>>>>> 
> >>>>>>>>>>>   
> >>>>>>>>>>> 
> >>>>>>>>>>> On Jul 23, 2014, at 9:30 AM, Thomas Broyer <t.bro...@gmail.com> 
> >>>>>>>>>>> wrote: 
> >>>>>>>>>>> 
> >>>>>>>>>>>   
> >>>>>>>>>>> 
> >>>>>>>>>>> Except that these are about not using the Token Endpoint at all, 
> >>>>>>>>>>> whereas the current proposal is about the Token Endpoint not 
> >>>>>>>>>>> returning an access_token field in the JSON. 
> >>>>>>>>>>> 
> >>>>>>>>>>>   
> >>>>>>>>>>> 
> >>>>>>>>>>> On Wed, Jul 23, 2014 at 4:26 PM, Mike Jones 
> >>>>>>>>>>> <michael.jo...@microsoft.com> wrote: 
> >>>>>>>>>>> 
> >>>>>>>>>>> The response_type "none" is already used in practice, which 
> >>>>>>>>>>> returns no access token.  It was accepted by the designated 
> >>>>>>>>>>> experts and registered in the IANA OAuth Authorization Endpoint 
> >>>>>>>>>>> Response Types registry at 
> >>>>>>>>>>> http://www.iana.org/assignments/oauth-parameters/oauth-parameters.xml#endpoint.
> >>>>>>>>>>>   The registered "id_token" response type also returns no access 
> >>>>>>>>>>> token. 
> >>>>>>>>>>> 
> >>>>>>>>>>>   
> >>>>>>>>>>> 
> >>>>>>>>>>> So I think the question of whether response types that result in 
> >>>>>>>>>>> no access token being returned are acceptable within OAuth 2.0 is 
> >>>>>>>>>>> already settled, as a practical matter.  Lots of OAuth 
> >>>>>>>>>>> implementations are already using such response types. 
> >>>>>>>>>>> 
> >>>>>>>>>>>   
> >>>>>>>>>>> 
> >>>>>>>>>>>                                                             
> >>>>>>>>>>> -- Mike 
> >>>>>>>>>>> 
> >>>>>>>>>>>   
> >>>>>>>>>>> 
> >>>>>>>>>>> From: OAuth [mailto:oauth-boun...@ietf.org] On Behalf Of 
> >>>>>>>>>>> Phil Hunt 
> >>>>>>>>>>> Sent: Wednesday, July 23, 2014 7:09 AM 
> >>>>>>>>>>> To: Nat Sakimura 
> >>>>>>>>>>> Cc: <oauth@ietf.org> 
> >>>>>>>>>>> Subject: Re: [OAUTH-WG] New Version Notification for 
> >>>>>>>>>>> draft-hunt-oauth-v2-user-a4c-05.txt 
> >>>>>>>>>>> 
> >>>>>>>>>>>   
> >>>>>>>>>>> 
> >>>>>>>>>>> Yes. This is why it has to be discussed in the IETF. 
> >>>>>>>>>>> 
> >>>>>>>>>>>   
> >>>>>>>>>>> 
> >>>>>>>>>>> Phil 
> >>>>>>>>>>> 
> >>>>>>>>>>>   
> >>>>>>>>>>> 
> >>>>>>>>>>> @independentid 
> >>>>>>>>>>> 
> >>>>>>>>>>> www.independentid.com 
> >>>>>>>>>>> 
> >>>>>>>>>>> phil.h...@oracle.com 
> >>>>>>>>>>> 
> >>>>>>>>>>>   
> >>>>>>>>>>> 
> >>>>>>>>>>>   
> >>>>>>>>>>> 
> >>>>>>>>>>>   
> >>>>>>>>>>> 
> >>>>>>>>>>> On Jul 23, 2014, at 9:43 AM, Nat Sakimura <sakim...@gmail.com> 
> >>>>>>>>>>> wrote: 
> >>>>>>>>>>> 
> >>>>>>>>>>>   
> >>>>>>>>>>> 
> >>>>>>>>>>> Reading back the RFC6749, I am not sure if there is a good 
> >>>>>>>>>>> way of suppressing access token from the response and still be 
> >>>>>>>>>>> OAuth. It will break whole bunch of implicit definitions like: 
> >>>>>>>>>>> 
> >>>>>>>>>>>   
> >>>>>>>>>>> 
> >>>>>>>>>>> authorization server 
> >>>>>>>>>>>       The server issuing access tokens to the client after 
> >>>>>>>>>>> successfully 
> >>>>>>>>>>>       authenticating the resource owner and obtaining 
> >>>>>>>>>>> authorization. 
> >>>>>>>>>>> 
> >>>>>>>>>>>   
> >>>>>>>>>>> 
> >>>>>>>>>>> After all, OAuth is all about issuing access tokens. 
> >>>>>>>>>>> 
> >>>>>>>>>>>   
> >>>>>>>>>>> 
> >>>>>>>>>>> Also, I take back my statement on the grant type in my 
> >>>>>>>>>>> previous mail. 
> >>>>>>>>>>> 
> >>>>>>>>>>>   
> >>>>>>>>>>> 
> >>>>>>>>>>> The definition of grant and grant_type are respectively: 
> >>>>>>>>>>> 
> >>>>>>>>>>>   
> >>>>>>>>>>> 
> >>>>>>>>>>> grant 
> >>>>>>>>>>> 
> >>>>>>>>>>>     credential representing the resource owner's 
> >>>>>>>>>>> authorization 
> >>>>>>>>>>> 
> >>>>>>>>>>>             
> >>>>>>>>>>> 
> >>>>>>>>>>> grant_type 
> >>>>>>>>>>> 
> >>>>>>>>>>>     (string representing the) type of grant sent to the 
> >>>>>>>>>>> token endpoint to obtain the access token 
> >>>>>>>>>>> 
> >>>>>>>>>>>   
> >>>>>>>>>>> 
> >>>>>>>>>>> Thus, the grant sent to the token endpoint in this case is 
> >>>>>>>>>>> still 'code'. 
> >>>>>>>>>>> 
> >>>>>>>>>>>   
> >>>>>>>>>>> 
> >>>>>>>>>>> Response type on the other hand is not so well defined in 
> >>>>>>>>>>> RFC6749, but it seems it is representing what is to be returned 
> >>>>>>>>>>> from the authorization endpoint. To express what is to be 
> >>>>>>>>>>> returned from token endpoint, perhaps defining a new parameter to 
> >>>>>>>>>>> the token endpoint, which is a parallel to the response_type to 
> >>>>>>>>>>> the Authorization Endpoint seems to be a more symmetric way, 
> >>>>>>>>>>> though I am not sure at all if that is going to be OAuth any 
> >>>>>>>>>>> more. One straw-man is to define a new parameter called 
> >>>>>>>>>>> response_type to the token endpoint such as: 
> >>>>>>>>>>> 
> >>>>>>>>>>>   
> >>>>>>>>>>> 
> >>>>>>>>>>> response_type 
> >>>>>>>>>>> 
> >>>>>>>>>>>     OPTIONAL. A string representing what is to be returned 
> >>>>>>>>>>> from the token endpoint. 
> >>>>>>>>>>> 
> >>>>>>>>>>>      
> >>>>>>>>>>> 
> >>>>>>>>>>> Then define the behavior of the endpoint according to the 
> >>>>>>>>>>> values as the parallel to the multi-response type spec. 
> >>>>>>>>>>> 
> >>>>>>>>>>> http://openid.net/specs/oauth-v2-multiple-response-types-1_0 
> >>>>>>>>>>> .html 
> >>>>>>>>>>> 
> >>>>>>>>>>>   
> >>>>>>>>>>> 
> >>>>>>>>>>> Nat 
> >>>>>>>>>>> 
> >>>>>>>>>>>      
> >>>>>>>>>>> 
> >>>>>>>>>>>   
> >>>>>>>>>>> 
> >>>>>>>>>>>   
> >>>>>>>>>>> 
> >>>>>>>>>>>   
> >>>>>>>>>>> 
> >>>>>>>>>>> 2014-07-23 7:21 GMT-04:00 Phil Hunt <phil.h...@oracle.com>: 
> >>>>>>>>>>> 
> >>>>>>>>>>> The draft is very clear. 
> >>>>>>>>>>> 
> >>>>>>>>>>> Phil 
> >>>>>>>>>>> 
> >>>>>>>>>>> 
> >>>>>>>>>>> On Jul 23, 2014, at 0:46, Nat Sakimura <sakim...@gmail.com> 
> >>>>>>>>>>> wrote: 
> >>>>>>>>>>>> 
> >>>>>>>>>>>> The new grant type that I was talking about was 
> >>>>>>>>>>>> 
> >>>>>>>>>>>> "authorization_code_but_do_not_return_access_nor_refresh_to 
> >>>>>>>>>>>> ken", so to speak. 
> >>>>>>>>>>>> 
> >>>>>>>>>>>> It does not return anything per se, but an extension can 
> >>>>>>>>>>>> define something on top of it. 
> >>>>>>>>>>>> 
> >>>>>>>>>>>>   
> >>>>>>>>>>>> 
> >>>>>>>>>>>> Then, OIDC can define a binding to it so that the binding 
> >>>>>>>>>>>> only returns ID Token. 
> >>>>>>>>>>>> 
> >>>>>>>>>>>> This binding work should be done in OIDF. Should there be 
> >>>>>>>>>>>> such a grant type, 
> >>>>>>>>>>>> 
> >>>>>>>>>>>> it will be an extremely short spec. 
> >>>>>>>>>>>> 
> >>>>>>>>>>>>   
> >>>>>>>>>>>> 
> >>>>>>>>>>>> At the same time, if any other specification wanted to 
> >>>>>>>>>>>> define 
> >>>>>>>>>>>> 
> >>>>>>>>>>>> other type of tokens and have it returned from the token 
> >>>>>>>>>>>> endpoint, 
> >>>>>>>>>>>> 
> >>>>>>>>>>>> it can also use this grant type. 
> >>>>>>>>>>>> 
> >>>>>>>>>>>>   
> >>>>>>>>>>>> 
> >>>>>>>>>>>> If what you want is to define a new grant type that returns 
> >>>>>>>>>>>> ID Token only, 
> >>>>>>>>>>>> 
> >>>>>>>>>>>> then, I am with Justin. Since "other response than ID 
> >>>>>>>>>>>> Token" is only 
> >>>>>>>>>>>> 
> >>>>>>>>>>>> theoretical, this is a more plausible way forward, I 
> >>>>>>>>>>>> suppose. 
> >>>>>>>>>>>> 
> >>>>>>>>>>>>   
> >>>>>>>>>>>> 
> >>>>>>>>>>>> Nat 
> >>>>>>>>>>>> 
> >>>>>>>>>>>>   
> >>>>>>>>>>>> 
> >>>>>>>>>>>> 2014-07-22 14:30 GMT-04:00 Justin Richer <jric...@mit.edu>: 
> >>>>>>>>>>>> 
> >>>>>>>>>>>> So the draft would literally turn into: 
> >>>>>>>>>>>> 
> >>>>>>>>>>>> "The a4c response type and grant type return an id_token from 
> >>>>>>>>>>>> the token endpoint with no access token. All parameters and 
> >>>>>>>>>>>> values are defined in OIDC." 
> >>>>>>>>>>>> 
> >>>>>>>>>>>> Seems like the perfect mini extension draft for OIDF to do. 
> >>>>>>>>>>>> 
> >>>>>>>>>>>> --Justin 
> >>>>>>>>>>>> 
> >>>>>>>>>>>> /sent from my phone/ 
> >>>>>>>>>>>> 
> >>>>>>>>>>>> 
> >>>>>>>>>>>> On Jul 22, 2014 10:29 AM, Nat Sakimura <sakim...@gmail.com> 
> >>>>>>>>>>>> wrote: 
> >>>>>>>>>>>> > 
> >>>>>>>>>>>> > What about just defining a new grant type in this WG? 
> >>>>>>>>>>>> > 
> >>>>>>>>>>>> > 
> >>>>>>>>>>>> > 2014-07-22 12:56 GMT-04:00 Phil Hunt <phil.h...@oracle.com>: 
> >>>>>>>>>>>> >> 
> >>>>>>>>>>>> >> That would be nice. However oidc still needs the new 
> >>>>>>>>>>>> >> grant type in order to implement the same flow. 
> >>>>>>>>>>>> >> 
> >>>>>>>>>>>> >> Phil 
> >>>>>>>>>>>> >> 
> >>>>>>>>>>>> >> On Jul 22, 2014, at 11:35, Nat Sakimura <sakim...@gmail.com> 
> >>>>>>>>>>>> >> wrote: 
> >>>>>>>>>>>> >> 
> >>>>>>>>>>>> >>> +1 to Justin. 
> >>>>>>>>>>>> >>> 
> >>>>>>>>>>>> >>> 
> >>>>>>>>>>>> >>> 2014-07-22 9:54 GMT-04:00 Richer, Justin P. 
> >>>>>>>>>>>> >>> <jric...@mitre.org>: 
> >>>>>>>>>>>> >>>> 
> >>>>>>>>>>>> >>>> Errors like these make it clear to me that it would make 
> >>>>>>>>>>>> >>>> much more sense to develop this document in the OpenID 
> >>>>>>>>>>>> >>>> Foundation. It should be something that directly references 
> >>>>>>>>>>>> >>>> OpenID Connect Core for all of these terms instead of 
> >>>>>>>>>>>> >>>> redefining them. It's doing authentication, which is 
> >>>>>>>>>>>> >>>> fundamentally what OpenID Connect does on top of OAuth, and 
> >>>>>>>>>>>> >>>> I don't see a good argument for doing this work in this 
> >>>>>>>>>>>> >>>> working group. 
> >>>>>>>>>>>> >>>> 
> >>>>>>>>>>>> >>>>  -- Justin 
> >>>>>>>>>>>> >>>> 
> >>>>>>>>>>>> >>>> On Jul 22, 2014, at 4:30 AM, Thomas Broyer 
> >>>>>>>>>>>> >>>> <t.bro...@gmail.com> wrote: 
> >>>>>>>>>>>> >>>> 
> >>>>>>>>>>>> >>>>> 
> >>>>>>>>>>>> >>>>> 
> >>>>>>>>>>>> >>>>> 
> >>>>>>>>>>>> >>>>> On Mon, Jul 21, 2014 at 11:52 PM, Mike Jones 
> >>>>>>>>>>>> >>>>> <michael.jo...@microsoft.com> wrote: 
> >>>>>>>>>>>> >>>>>> 
> >>>>>>>>>>>> >>>>>> Thanks for your review, Thomas.  The "prompt=consent" 
> >>>>>>>>>>>> >>>>>> definition being missing is an editorial error.  It 
> >>>>>>>>>>>> >>>>>> should be: 
> >>>>>>>>>>>> >>>>>> 
> >>>>>>>>>>>> >>>>>>   
> >>>>>>>>>>>> >>>>>> 
> >>>>>>>>>>>> >>>>>> consent 
> >>>>>>>>>>>> >>>>>> 
> >>>>>>>>>>>> >>>>>> The Authorization Server SHOULD prompt the End-User for 
> >>>>>>>>>>>> >>>>>> consent before returning information to the Client. If it 
> >>>>>>>>>>>> >>>>>> cannot obtain consent, it MUST return an error, typically 
> >>>>>>>>>>>> >>>>>> consent_required. 
> >>>>>>>>>>>> >>>>>> 
> >>>>>>>>>>>> >>>>>>   
> >>>>>>>>>>>> >>>>>> 
> >>>>>>>>>>>> >>>>>> I'll plan to add it in the next draft. 
> >>>>>>>>>>>> >>>>> 
> >>>>>>>>>>>> >>>>> 
> >>>>>>>>>>>> >>>>> It looks like the consent_required error needs to be 
> >>>>>>>>>>>> >>>>> defined too, and you might have forgotten to also import 
> >>>>>>>>>>>> >>>>> account_selection_required from OpenID Connect. 
> >>>>>>>>>>>> >>>>>   
> >>>>>>>>>>>> >>>>>> 
> >>>>>>>>>>>> >>>>>>   
> >>>>>>>>>>>> >>>>>> 
> >>>>>>>>>>>> >>>>>> I agree that there's no difference between a response 
> >>>>>>>>>>>> >>>>>> with multiple "amr" values that includes "mfa" and one 
> >>>>>>>>>>>> >>>>>> that doesn't.  Unless a clear use case for why "mfa" is 
> >>>>>>>>>>>> >>>>>> needed can be identified, we can delete it in the next 
> >>>>>>>>>>>> >>>>>> draft. 
> >>>>>>>>>>>> >>>>> 
> >>>>>>>>>>>> >>>>> 
> >>>>>>>>>>>> >>>>> Thanks. 
> >>>>>>>>>>>> >>>>> 
> >>>>>>>>>>>> >>>>> How about "pwd" then? I fully understand that I should 
> >>>>>>>>>>>> >>>>> return "pwd" if the user authenticated using a password, 
> >>>>>>>>>>>> >>>>> but what "the service if a client secret is used" means in 
> >>>>>>>>>>>> >>>>> the definition for the "pwd" value? 
> >>>>>>>>>>>> >>>>> 
> >>>>>>>>>>>> >>>>> (Nota: I know you're at IETF-90, I'm ready to wait 
> >>>>>>>>>>>> >>>>> 'til you come back ;-) ) 
> >>>>>>>>>>>> >>>>> 
> >>>>>>>>>>>> >>>>> -- 
> >>>>>>>>>>>> >>>>> Thomas Broyer 
> >>>>>>>>>>>> >>>>> /tɔ.ma.bʁwa.je/ 
> >>>>>>>>>>>> >>>>> _______________________________________________ 
> >>>>>>>>>>>> >>>>> OAuth mailing list 
> >>>>>>>>>>>> >>>>> OAuth@ietf.org 
> >>>>>>>>>>>> >>>>> https://www.ietf.org/mailman/listinfo/oauth 
> >>>>>>>>>>>> >>>> 
> >>>>>>>>>>>> >>>> 
> >>>>>>>>>>>> >>>> 
> >>>>>>>>>>>> >>>> _______________________________________________ 
> >>>>>>>>>>>> >>>> OAuth mailing list 
> >>>>>>>>>>>> >>>> OAuth@ietf.org 
> >>>>>>>>>>>> >>>> https://www.ietf.org/mailman/listinfo/oauth 
> >>>>>>>>>>>> >>>> 
> >>>>>>>>>>>> >>> 
> >>>>>>>>>>>> >>> 
> >>>>>>>>>>>> >>> 
> >>>>>>>>>>>> >>> -- 
> >>>>>>>>>>>> >>> Nat Sakimura (=nat) 
> >>>>>>>>>>>> >>> Chairman, OpenID Foundation http://nat.sakimura.org/ 
> >>>>>>>>>>>> >>> @_nat_en 
> >>>>>>>>>>>> >>> 
> >>>>>>>>>>>> >>> _______________________________________________ 
> >>>>>>>>>>>> >>> OAuth mailing list 
> >>>>>>>>>>>> >>> OAuth@ietf.org 
> >>>>>>>>>>>> >>> https://www.ietf.org/mailman/listinfo/oauth 
> >>>>>>>>>>>> > 
> >>>>>>>>>>>> > 
> >>>>>>>>>>>> > 
> >>>>>>>>>>>> > 
> >>>>>>>>>>>> > -- 
> >>>>>>>>>>>> > Nat Sakimura (=nat) 
> >>>>>>>>>>>> > Chairman, OpenID Foundation http://nat.sakimura.org/ 
> >>>>>>>>>>>> > @_nat_en 
> >>>>>>>>>>>> 
> >>>>>>>>>>>> 
> >>>>>>>>>>>> 
> >>>>>>>>>>>>   
> >>>>>>>>>>>> 
> >>>>>>>>>>>> -- 
> >>>>>>>>>>>> Nat Sakimura (=nat) 
> >>>>>>>>>>>> 
> >>>>>>>>>>>> Chairman, OpenID Foundation http://nat.sakimura.org/ 
> >>>>>>>>>>>> @_nat_en 
> >>>>>>>>>>> 
> >>>>>>>>>>> 
> >>>>>>>>>>> 
> >>>>>>>>>>>   
> >>>>>>>>>>> 
> >>>>>>>>>>> -- 
> >>>>>>>>>>> Nat Sakimura (=nat) 
> >>>>>>>>>>> 
> >>>>>>>>>>> Chairman, OpenID Foundation 
> >>>>>>>>>>> http://nat.sakimura.org/ 
> >>>>>>>>>>> @_nat_en 
> >>>>>>>>>>> 
> >>>>>>>>>>>   
> >>>>>>>>>>> 
> >>>>>>>>>>> 
> >>>>>>>>>>> _______________________________________________ 
> >>>>>>>>>>> OAuth mailing list 
> >>>>>>>>>>> OAuth@ietf.org 
> >>>>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth 
> >>>>>>>>>>> 
> >>>>>>>>>>> 
> >>>>>>>>>>> 
> >>>>>>>>>>>   
> >>>>>>>>>>> 
> >>>>>>>>>>> -- 
> >>>>>>>>>>> Thomas Broyer 
> >>>>>>>>>>> /tɔ.ma.bʁwa.je/ 
> >>>>>>>>>>> 
> >>>>>>>>>>> _______________________________________________ 
> >>>>>>>>>>> OAuth mailing list 
> >>>>>>>>>>> OAuth@ietf.org 
> >>>>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth 
> >>>>>>>>>>> 
> >>>>>>>>>>> 
> >>>>>>>>>>> 
> >>>>>>>>>>>   
> >>>>>>>>>>> 
> >>>>>>>>>>> -- 
> >>>>>>>>>>> Thomas Broyer 
> >>>>>>>>>>> /tɔ.ma.bʁwa.je/ 
> >>>>>>>>>>> 
> >>>>>>>>>>> 
> >>>>>>>>>>> _______________________________________________ 
> >>>>>>>>>>> OAuth mailing list 
> >>>>>>>>>>> OAuth@ietf.org 
> >>>>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth 
> >>>>>>>>>>> 
> >>>>>>>>>>> 
> >>>>>>>>>>> 
> >>>>>>>>>>>   
> >>>>>>>>>>> 
> >>>>>>>>>>> -- 
> >>>>>>>>>>> Nat Sakimura (=nat) 
> >>>>>>>>>>> 
> >>>>>>>>>>> Chairman, OpenID Foundation 
> >>>>>>>>>>> http://nat.sakimura.org/ 
> >>>>>>>>>>> @_nat_en 
> >>>>>>>>>>> 
> >>>>>>>>>>>   
> >>>>>>>>>>> 
> >>>>>>>>>>> _______________________________________________ 
> >>>>>>>>>>> 
> >>>>>>>>>>> OAuth mailing list 
> >>>>>>>>>>> 
> >>>>>>>>>>> OAuth@ietf.org 
> >>>>>>>>>>> 
> >>>>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth 
> >>>>>>>>>> 
> >>>>>>>>>>   
> >>>>>>>>>> 
> >>>>>>>>>>   
> >>>>>>>>>> 
> >>>>>>>>>> _______________________________________________ 
> >>>>>>>>>> OAuth mailing list 
> >>>>>>>>>> OAuth@ietf.org 
> >>>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth 
> >>>>>>>>> 
> >>>>>>>>> 
> >>>>>>>>> _______________________________________________ 
> >>>>>>>>> OAuth mailing list 
> >>>>>>>>> OAuth@ietf.org 
> >>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth 
> >>>>>>>> 
> >>>>>>>> 
> >>>>>>>> 
> >>>>>>>>   
> >>>>>>>> 
> >>>>>>>> -- 
> >>>>>>>> Nat Sakimura (=nat) 
> >>>>>>>> 
> >>>>>>>> Chairman, OpenID Foundation 
> >>>>>>>> http://nat.sakimura.org/ 
> >>>>>>>> @_nat_en 
> >>>>>>>> 
> >>>>>>>> 
> >>>>>>>> _______________________________________________ 
> >>>>>>>> OAuth mailing list 
> >>>>>>>> OAuth@ietf.org 
> >>>>>>>> https://www.ietf.org/mailman/listinfo/oauth 
> >>>>>> 
> >>>>>> 
> >>>>>> 
> >>>>>>   
> >>>>>> 
> >>>>>> -- 
> >>>>>> Nat Sakimura (=nat) 
> >>>>>> 
> >>>>>> Chairman, OpenID Foundation 
> >>>>>> http://nat.sakimura.org/ 
> >>>>>> @_nat_en 
> >>>>> 
> >>>>> _______________________________________________ 
> >>>>> OAuth mailing list 
> >>>>> OAuth@ietf.org 
> >>>>> https://www.ietf.org/mailman/listinfo/oauth 
> >>>> 
> >>>> _______________________________________________ 
> >>>> OAuth mailing list 
> >>>> OAuth@ietf.org 
> >>>> https://www.ietf.org/mailman/listinfo/oauth 
> >> 
> >>   
> >> 
> >>   
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to