As John points out, that could be either resource owner or client credentials 
flow, depending on the use case.

 -- Justin

On Sep 4, 2014, at 11:43 AM, Sergey Beryozkin <sberyoz...@gmail.com> wrote:

> Hi Justin
> 
> 
> On 04/09/14 13:15, Richer, Justin P. wrote:
>> Neither of these are authentication (they don't tell the client or business 
>> logic server who the user is or if they're still there), they're 
>> authorization and they're both well within the scope  of OAuth.
>> 
>> The first one is a redirect flow, that actually works (in OAuth) like this:
>> 
>> 1) Clients calls business logic server (in OAuth, the Protected Resource)
>> 2) Server detects no access token, sends an error response to the client
>> 3) Client needs to send the user in a browser to the Authorization Server
>> 4) Authorization server prompts the user (not the client) to authenticate 
>> and authorize the client
>> 5) Authorization server redirects back to the client with either the token 
>> (if you're doing implicit flow, inside of a browser) or something the client 
>> can use to get a token (authorization code flow)
>> 6) Client gets the token and calls the business logic server with said token
>> 
>> In your second scenario, you're really doing the Resource Owner Password 
>> flow defined in OAuth. This is generally a bad idea because it exposes the 
>> client to the user's credentials and limits you to username/password. The 
>> flow is defined mostly as a way to help bridge legacy applications into the 
>> OAuth world.
> 
> That was a client credentials, right ? And in the client credentials case a 
> (legacy) client can effectively authenticate using whatever credentials it has
> 
> Thanks, Sergey
> 
>> 
>> 
>> If you actually do want authentication (i.e., the client knowing who the 
>> user is) on top of this authorized call to the business logic service, then 
>> you'll need an identity API, which is what OpenID Connect provides in a 
>> well-defined well-used standard.
>> 
>>  -- Justin
>> 
>> 
>> On Sep 4, 2014, at 5:30 AM, Frizz <frizzthe...@googlemail.com> wrote:
>> 
>>> Hello there,
>>> 
>>> I have a question regarding Authentication:
>>> 
>>> The following two scenarios, are they typical use cases for OAuth? Or 
>>> OpenId-Connect? Or something completely different?
>>> 
>>> Flow (A) would be like this:
>>> (1) Client calls Business Logic Server
>>> (2) Server detects there’s no Access Token in HTTP headers
>>> (3) Server redirects to *some* Authentication Server
>>> (4) Authentication Server challenges Client for Username/Password
>>> (5) Client (now with valid Access Token) is redirected to Business Logic 
>>> Server and completes operation
>>> 
>>> Flow (B) would look like this:
>>> (1) Client directly calls Authentication Server (kinda explicit Login call) 
>>> with Username/Password and gets an Access Token in return
>>> (2) Client uses this Access Token for all calls to the Business Logic Server
>>> 
>>> cheers,
>>> Frizz
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>> 
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>> 
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to