If a server accepts a URL from a client to be used as a redirect that the 
server doesn’t recognize or is not registered, that is an open redirect.

The specification does no allow open-redirects, it considers this a 
mis-configuration.

Take a look at sections 3.1.2.2 and 10.15 of RFC6749.

Phil

@independentid
www.independentid.com
phil.h...@oracle.com



On Sep 15, 2014, at 1:00 PM, John Bradley <ve7...@ve7jtb.com> wrote:

> There may be a problem with semantics in this discussion. 
> 
> There is a redirect performed by athe authorization endpoint to a fixed uri 
> that is pre registered with the authorization server without user prompting. 
> 
> That probably doesn't fit the strict definition of a open redirector. 
> 
> It may however create similar security issues in situations with relatively 
> open registration of clients. 
> 
> The largest issues are that the browser might leak information across the 
> redirect in the fragment or referrer.  That has been used in attacks against 
> Facebook in the past. 
> 
> This is no where near the end of the world,  however we need to look at the 
> security considerations and see if we can provide better advice to 
> implementors.  In some cases returning a error to the browser may be best.  
> 
> I don't think we need to go so far as not returning any error to the client 
> under any circumstance. 
> 
> John B. 
> 
> Sent from my iPhone
> 
>> On Sep 15, 2014, at 4:41 PM, Phil Hunt <phil.h...@oracle.com> wrote:
>> 
>> Simply not true.
>> 
>> Phil
>> 
>> @independentid
>> www.independentid.com
>> phil.h...@oracle.com
>> 
>> 
>> 
>>> On Sep 15, 2014, at 12:10 PM, Antonio Sanso <asa...@adobe.com> wrote:
>>> 
>>> hi *,
>>> 
>>> my understanding is that there is a rough consensus that if an OAuth 
>>> Provider follows rfc6749 verbatim will end up having an open redirector.
>>> My next question would be now, is there anything we can do to raise some 
>>> awareness about this issue?
>>> 
>>> regards
>>> 
>>> antonio
>>> 
>>>> On Sep 4, 2014, at 3:15 PM, Hans Zandbelt <hzandb...@pingidentity.com> 
>>>> wrote:
>>>> 
>>>> I am convinced about the issue in the use case Antonio provided but I hope 
>>>> not to close the door on returning errors to known and trusted clients. 
>>>> Not sure anymore if that's possible though because the distinction can't 
>>>> be "registered"...
>>>> 
>>>> Hans.
>>>> 
>>>>> On 9/4/14, 3:01 PM, Antonio Sanso wrote:
>>>>> hi Bill
>>>>>> On Sep 4, 2014, at 2:52 PM, Bill Burke <bbu...@redhat.com> wrote:
>>>>>> 
>>>>>> FWIW, Antonio convinced me and I'm going to change this in our IDM 
>>>>>> project.  Thanks Antonio.  What convinced me was that the user is 
>>>>>> probably expecting a login screen.  Since there is this expectation, it 
>>>>>> might make it a little easier for the attacker to convince the user that 
>>>>>> a spoofed login screen is real.  I know this issue can only happen with 
>>>>>> unrestricted registration, but, IMO, this proposed change doesn't really 
>>>>>> have much of an effect on usability and is even backward compatible with 
>>>>>> the current RFC.
>>>>>> 
>>>>>> Wouldn't it better though to never do a redirect on an invalid request 
>>>>>> and just display an error page?
>>>>> 
>>>>> thanks for sharing your thoughts :). Display an error 400 is what Google 
>>>>> does :)
>>>>> 
>>>>> regards
>>>>> 
>>>>> antonio
>>>>> 
>>>>>> 
>>>>>>> On 9/4/2014 3:50 AM, Antonio Sanso wrote:
>>>>>>> Hi Hans,
>>>>>>> 
>>>>>>> I really fail to see how this can be addressed at registration time for 
>>>>>>> cases where registration is unrestricted (namely all the big Providers)
>>>>>>> 
>>>>>>> regards
>>>>>>> 
>>>>>>> antonio
>>>>>>> 
>>>>>>>> On Sep 4, 2014, at 9:47 AM, Hans Zandbelt <hzandb...@pingidentity.com> 
>>>>>>>> wrote:
>>>>>>>> 
>>>>>>>> Classifying like this must also mean that consent should not be stored 
>>>>>>>> until the client is considered (admin) trusted, and admin policy would 
>>>>>>>> interfere with user policy.
>>>>>>>> 
>>>>>>>> IMHO the security consideration would apply only to dynamically 
>>>>>>>> registered clients where registration is unrestricted; any other form 
>>>>>>>> would involve some form of admin/user approval at registration time, 
>>>>>>>> overcoming the concern at authorization time: there's no auto-redirect 
>>>>>>>> flow possible for unknown clients.
>>>>>>>> 
>>>>>>>> Hans.
>>>>>>>> 
>>>>>>>>> On 9/4/14, 9:04 AM, Richer, Justin P. wrote:
>>>>>>>>> I think this advice isn't a bad idea, though it's of course up to the 
>>>>>>>>> AS
>>>>>>>>> what an "untrusted" client really is. In practice, this is something
>>>>>>>>> that was registered by a non-sysadmin type person, either a 
>>>>>>>>> dynamically
>>>>>>>>> registered client or something available through self-service
>>>>>>>>> registration of some type. It's also reasonable that a client, even
>>>>>>>>> dynamically registered, would be considered "trusted" if enough time 
>>>>>>>>> has
>>>>>>>>> passed and enough users have used it without things blowing up.
>>>>>>>>> 
>>>>>>>>> -- Justin
>>>>>>>>> 
>>>>>>>>> On Sep 4, 2014, at 1:26 AM, Antonio Sanso <asa...@adobe.com
>>>>>>>>> <mailto:asa...@adobe.com>> wrote:
>>>>>>>>> 
>>>>>>>>>> hi again *,
>>>>>>>>>> 
>>>>>>>>>> after thinking a bit further IMHO an alternative for the untrusted
>>>>>>>>>> clients can also be to always present the consent screen (at least
>>>>>>>>>> once) before any redirect.
>>>>>>>>>> Namely all providers I have seen show the consent screen if all the
>>>>>>>>>> request parameters are correct and if the user accepts the redirect
>>>>>>>>>> happens.
>>>>>>>>>> If one of the parameter  (with the exclusion of the client id and
>>>>>>>>>> redirect uri that are handled differently as for spec) is wrong 
>>>>>>>>>> though
>>>>>>>>>> the redirect happens without the consent screen being shown..
>>>>>>>>>> 
>>>>>>>>>> WDYT?
>>>>>>>>>> 
>>>>>>>>>> regards
>>>>>>>>>> 
>>>>>>>>>> antonio
>>>>>>>>>> 
>>>>>>>>>> On Sep 3, 2014, at 7:54 PM, Antonio Sanso <asa...@adobe.com
>>>>>>>>>> <mailto:asa...@adobe.com>> wrote:
>>>>>>>>>> 
>>>>>>>>>>> Well,
>>>>>>>>>>> I do not know if this is only dynamic registration...
>>>>>>>>>>> let’s talk about real use cases, namely e.g. Google , Facebook ,
>>>>>>>>>>> etc.. is that dynamic client registration? I do not know… :)
>>>>>>>>>>> 
>>>>>>>>>>> Said that what the other guys think?  :)
>>>>>>>>>>> Would this deserve some “spec adjustment” ? I mean there is a reason
>>>>>>>>>>> if Google is by choice “violating” the spec right? (I assume to 
>>>>>>>>>>> avoid
>>>>>>>>>>> open redirect…)
>>>>>>>>>>> But other implementers do follow the spec hence they have this open
>>>>>>>>>>> redirector… and this is not nice IMHO...
>>>>>>>>>>> 
>>>>>>>>>>> 
>>>>>>>>>>> On Sep 3, 2014, at 7:40 PM, Hans Zandbelt 
>>>>>>>>>>> <hzandb...@pingidentity.com
>>>>>>>>>>> <mailto:hzandb...@pingidentity.com>> wrote:
>>>>>>>>>>> 
>>>>>>>>>>>>> On 9/3/14, 7:14 PM, Antonio Sanso wrote:
>>>>>>>>>>>>> 
>>>>>>>>>>>>> On Sep 3, 2014, at 7:10 PM, Hans Zandbelt
>>>>>>>>>>>>> <hzandb...@pingidentity.com <mailto:hzandb...@pingidentity.com>> 
>>>>>>>>>>>>> wrote:
>>>>>>>>>>>>> 
>>>>>>>>>>>>>> Is your concern clients that were registered using dynamic client
>>>>>>>>>>>>>> registration?
>>>>>>>>>>>>> 
>>>>>>>>>>>>> yes
>>>>>>>>>>>> 
>>>>>>>>>>>> I think your issue is then with the trust model of dynamic client
>>>>>>>>>>>> registration; that is left out of scope of the dynreg spec (and the
>>>>>>>>>>>> concept is not even part of the core spec), but unless you want
>>>>>>>>>>>> everything to be open (which typically would not be the case), then
>>>>>>>>>>>> it would involve approval somewhere in the process before the 
>>>>>>>>>>>> client
>>>>>>>>>>>> is registered. Without dynamic client registration that approval is
>>>>>>>>>>>> admin based or resource owner based, depending on use case.
>>>>>>>>>>>> 
>>>>>>>>>>>>>> Otherwise the positive case is returning a response to a valid 
>>>>>>>>>>>>>> URL
>>>>>>>>>>>>>> that belongs to a client that was registered explicitly by the
>>>>>>>>>>>>>> resource owner
>>>>>>>>>>>>> 
>>>>>>>>>>>>> well AFAIK the resource owner doesn’t register clients…
>>>>>>>>>>>> 
>>>>>>>>>>>> roles can collapse in use cases especially when using dynamic 
>>>>>>>>>>>> client
>>>>>>>>>>>> registration
>>>>>>>>>>>> 
>>>>>>>>>>>>>> and the negative case is returning an error to that same URL.
>>>>>>>>>>>>> 
>>>>>>>>>>>>> the difference is the consent screen… in the positive case you 
>>>>>>>>>>>>> need
>>>>>>>>>>>>> to approve an app.. for the error case no approval is needed,,,
>>>>>>>>>>>>> 
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> I fail to see the open redirect.
>>>>>>>>>>>>> 
>>>>>>>>>>>>> why?
>>>>>>>>>>>> 
>>>>>>>>>>>> because the client and thus the fixed URL are explicitly approved 
>>>>>>>>>>>> at
>>>>>>>>>>>> some point
>>>>>>>>>>>> 
>>>>>>>>>>>> Hans.
>>>>>>>>>>>> 
>>>>>>>>>>>>> 
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> Hans.
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>> On 9/3/14, 6:56 PM, Antonio Sanso wrote:
>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>> On Sep 3, 2014, at 6:51 PM, Hans Zandbelt
>>>>>>>>>>>>>>> <hzandb...@pingidentity.com <mailto:hzandb...@pingidentity.com>
>>>>>>>>>>>>>>> <mailto:hzandb...@pingidentity.com>> wrote:
>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>> Let me try and approach this from a different angle: why would 
>>>>>>>>>>>>>>>> you
>>>>>>>>>>>>>>>> call it an open redirect when an invalid scope is provided and
>>>>>>>>>>>>>>>> call it
>>>>>>>>>>>>>>>> correct protocol behavior (hopefully) when a valid scope is
>>>>>>>>>>>>>>>> provided?
>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>> as specified below in the positive case (namely when the correct
>>>>>>>>>>>>>>> scope
>>>>>>>>>>>>>>> is provided) the resource owner MUST approve the app via the 
>>>>>>>>>>>>>>> consent
>>>>>>>>>>>>>>> screen (at least once).
>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>> Hans.
>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> On 9/3/14, 6:46 PM, Antonio Sanso wrote:
>>>>>>>>>>>>>>>>> hi John,
>>>>>>>>>>>>>>>>> On Sep 3, 2014, at 6:14 PM, John Bradley <ve7...@ve7jtb.com
>>>>>>>>>>>>>>>>> <mailto:ve7...@ve7jtb.com>
>>>>>>>>>>>>>>>>> <mailto:ve7...@ve7jtb.com>
>>>>>>>>>>>>>>>>> <mailto:ve7...@ve7jtb.com>> wrote:
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>> In the example the redirect_uri is vlid for the attacker.
>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>> The issue is that the AS may be allowing client 
>>>>>>>>>>>>>>>>>> registrations with
>>>>>>>>>>>>>>>>>> arbitrary redirect_uri.
>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>> In the spec it is unspecified how a AS validates that a 
>>>>>>>>>>>>>>>>>> client
>>>>>>>>>>>>>>>>>> controls the redirect_uri it is registering.
>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>> I think that if anything it may be the registration step that
>>>>>>>>>>>>>>>>>> needs
>>>>>>>>>>>>>>>>>> the security consideration.
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> (this is the first time :p) but I do disagree with you. It 
>>>>>>>>>>>>>>>>> would be
>>>>>>>>>>>>>>>>> pretty unpractical to block this at registration time….
>>>>>>>>>>>>>>>>> IMHO the best approach is the one taken from Google, namely
>>>>>>>>>>>>>>>>> returning
>>>>>>>>>>>>>>>>> 400 with the cause of the error..
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> *400.* That’s an error.
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> *Error: invalid_scope*
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> Some requested scopes were invalid. {invalid=[l]}
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> said that I hope you all agree this is an issue in the spec so
>>>>>>>>>>>>>>>>> far….
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> regards
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> antonio
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>> John B.
>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>> On Sep 3, 2014, at 12:10 PM, Bill Burke <bbu...@redhat.com
>>>>>>>>>>>>>>>>>> <mailto:bbu...@redhat.com>
>>>>>>>>>>>>>>>>>> <mailto:bbu...@redhat.com>
>>>>>>>>>>>>>>>>>> <mailto:bbu...@redhat.com>> wrote:
>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>> I don't understand.  The redirect uri has to be valid in
>>>>>>>>>>>>>>>>>>> order for a
>>>>>>>>>>>>>>>>>>> redirect to happen.  The spec explicitly states this.
>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> On 9/3/2014 11:43 AM, Antonio Sanso wrote:
>>>>>>>>>>>>>>>>>>>> hi *,
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> IMHO providers that strictly follow rfc6749 are vulnerable
>>>>>>>>>>>>>>>>>>>> to open
>>>>>>>>>>>>>>>>>>>> redirect.
>>>>>>>>>>>>>>>>>>>> Let me explain, reading [0]
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> If the request fails due to a missing, invalid, or 
>>>>>>>>>>>>>>>>>>>> mismatching
>>>>>>>>>>>>>>>>>>>> redirection URI, or if the client identifier is missing or
>>>>>>>>>>>>>>>>>>>> invalid,
>>>>>>>>>>>>>>>>>>>> the authorization server SHOULD inform the resource owner 
>>>>>>>>>>>>>>>>>>>> of the
>>>>>>>>>>>>>>>>>>>> error and MUST NOT automatically redirect the user-agent 
>>>>>>>>>>>>>>>>>>>> to the
>>>>>>>>>>>>>>>>>>>> invalid redirection URI.
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> If the resource owner denies the access request or if the
>>>>>>>>>>>>>>>>>>>> request
>>>>>>>>>>>>>>>>>>>> fails for reasons other than a missing or invalid
>>>>>>>>>>>>>>>>>>>> redirection URI,
>>>>>>>>>>>>>>>>>>>> the authorization server informs the client by adding the
>>>>>>>>>>>>>>>>>>>> following
>>>>>>>>>>>>>>>>>>>> parameters to the query component of the redirection URI
>>>>>>>>>>>>>>>>>>>> using the
>>>>>>>>>>>>>>>>>>>> "application/x-www-form-urlencoded" format, perAppendix B
>>>>>>>>>>>>>>>>>>>> <https://tools.ietf.org/html/rfc6749#appendix-B>:
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> Now let’s assume this.
>>>>>>>>>>>>>>>>>>>> I am registering a new client to thevictim.com
>>>>>>>>>>>>>>>>>>>> <http://thevictim.com/>
>>>>>>>>>>>>>>>>>>>> <http://victim.com/><http://victim.com <http://victim.com/>
>>>>>>>>>>>>>>>>>>>> <http://victim.com/>>
>>>>>>>>>>>>>>>>>>>> <http://victim.com <http://victim.com/> 
>>>>>>>>>>>>>>>>>>>> <http://victim.com/>>
>>>>>>>>>>>>>>>>>>>> provider.
>>>>>>>>>>>>>>>>>>>> I register redirect uriattacker.com 
>>>>>>>>>>>>>>>>>>>> <http://uriattacker.com/>
>>>>>>>>>>>>>>>>>>>> <http://attacker.com/><http://attacker.com
>>>>>>>>>>>>>>>>>>>> <http://attacker.com/> <http://attacker.com/>>
>>>>>>>>>>>>>>>>>>>> <http://attacker.com <http://attacker.com/>
>>>>>>>>>>>>>>>>>>>> <http://attacker.com/>>.
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> According to [0] if I pass e.g. the wrong scope I am 
>>>>>>>>>>>>>>>>>>>> redirected
>>>>>>>>>>>>>>>>>>>> back to
>>>>>>>>>>>>>>>>>>>> attacker.com <http://attacker.com/>
>>>>>>>>>>>>>>>>>>>> <http://attacker.com/><http://attacker.com
>>>>>>>>>>>>>>>>>>>> <http://attacker.com/>
>>>>>>>>>>>>>>>>>>>> <http://attacker.com/>> <http://attacker.com
>>>>>>>>>>>>>>>>>>>> <http://attacker.com/> <http://attacker.com/>>.
>>>>>>>>>>>>>>>>>>>> Namely I prepare a url that is in this form:
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> http://victim.com/authorize?response_type=code&client_id=bc88FitX1298KPj2WS259BBMa9_KCfL3&scope=WRONG_SCOPE&redirect_uri=http://attacker.com
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> and this is works as an open redirector.
>>>>>>>>>>>>>>>>>>>> Of course in the positive case if all the parameters are
>>>>>>>>>>>>>>>>>>>> fine this
>>>>>>>>>>>>>>>>>>>> doesn’t apply since the resource owner MUST approve the app
>>>>>>>>>>>>>>>>>>>> via the
>>>>>>>>>>>>>>>>>>>> consent screen (at least once).
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> A solution would be to return error 400 rather than 
>>>>>>>>>>>>>>>>>>>> redirect
>>>>>>>>>>>>>>>>>>>> to the
>>>>>>>>>>>>>>>>>>>> redirect URI (as some provider e.g. Google do)
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> WDYT?
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> regards
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> antonio
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> [0] https://tools.ietf.org/html/rfc6749#section-4.1.2.1
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>>> _______________________________________________
>>>>>>>>>>>>>>>>>>>> OAuth mailing list
>>>>>>>>>>>>>>>>>>>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>>>>>>>>>>>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>> --
>>>>>>>>>>>>>>>>>>> Bill Burke
>>>>>>>>>>>>>>>>>>> JBoss, a division of Red Hat
>>>>>>>>>>>>>>>>>>> http://bill.burkecentral.com <http://bill.burkecentral.com/>
>>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>>> _______________________________________________
>>>>>>>>>>>>>>>>>>> OAuth mailing list
>>>>>>>>>>>>>>>>>>> OAuth@ietf.org <mailto:OAuth@ietf.org> 
>>>>>>>>>>>>>>>>>>> <mailto:OAuth@ietf.org>
>>>>>>>>>>>>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>>> _______________________________________________
>>>>>>>>>>>>>>>>>> OAuth mailing list
>>>>>>>>>>>>>>>>>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>>>>>>>>>>>>>>>> <mailto:OAuth@ietf.org><mailto:OAuth@ietf.org>
>>>>>>>>>>>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>>> _______________________________________________
>>>>>>>>>>>>>>>>> OAuth mailing list
>>>>>>>>>>>>>>>>> OAuth@ietf.org <mailto:OAuth@ietf.org> <mailto:OAuth@ietf.org>
>>>>>>>>>>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>>>>>>>>>>> 
>>>>>>>>>>>>>>>> --
>>>>>>>>>>>>>>>> Hans Zandbelt              | Sr. Technical Architect
>>>>>>>>>>>>>>>> hzandb...@pingidentity.com <mailto:hzandb...@pingidentity.com>
>>>>>>>>>>>>>>>> <mailto:hzandb...@pingidentity.com>| Ping
>>>>>>>>>>>>>>>> Identity
>>>>>>>>>>>>>> 
>>>>>>>>>>>>>> --
>>>>>>>>>>>>>> Hans Zandbelt              | Sr. Technical Architect
>>>>>>>>>>>>>> hzandb...@pingidentity.com <mailto:hzandb...@pingidentity.com> |
>>>>>>>>>>>>>> Ping Identity
>>>>>>>>>>>> 
>>>>>>>>>>>> --
>>>>>>>>>>>> Hans Zandbelt              | Sr. Technical Architect
>>>>>>>>>>>> hzandb...@pingidentity.com <mailto:hzandb...@pingidentity.com>| 
>>>>>>>>>>>> Ping
>>>>>>>>>>>> Identity
>>>>>>>>>> 
>>>>>>>>>> _______________________________________________
>>>>>>>>>> OAuth mailing list
>>>>>>>>>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>>> 
>>>>>>>> --
>>>>>>>> Hans Zandbelt              | Sr. Technical Architect
>>>>>>>> hzandb...@pingidentity.com | Ping Identity
>>>>>>> 
>>>>>>> _______________________________________________
>>>>>>> OAuth mailing list
>>>>>>> OAuth@ietf.org
>>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>> 
>>>>>> --
>>>>>> Bill Burke
>>>>>> JBoss, a division of Red Hat
>>>>>> http://bill.burkecentral.com
>>>>>> 
>>>>>> _______________________________________________
>>>>>> OAuth mailing list
>>>>>> OAuth@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>> 
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>> 
>>>> -- 
>>>> Hans Zandbelt              | Sr. Technical Architect
>>>> hzandb...@pingidentity.com | Ping Identity
>>> 
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>> 
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to