Sigh.

Phil

@independentid
www.independentid.com
phil.h...@oracle.com



On Nov 2, 2014, at 10:33 AM, John Bradley <ve7...@ve7jtb.com> wrote:

> If a client developer doesn't have Connect available then they need to point 
> the API developer at this doc, so that they do provide Connect or some other 
> API that takes into account all of the security considerations.
> 
> A client developer should never make up there own identity protocol out of 
> someone else's API that is not designed for it.
> 
> A vanilla OAuth API with no additional security considerations on the API 
> developers part is pretty much guaranteed to go horribly wrong.
> 
> John B.
> 
> On Nov 2, 2014, at 2:15 PM, Phil Hunt <phil.h...@oracle.com> wrote:
> 
>> We may have a problem with audience here. 
>> 
>> Justin mentioned he wrote it for service providers but the threats are 
>> against the client that wants to authenticate users. 
>> 
>> Would be better to have recommendations for each group. 
>> 
>> Since oidc is the only recommendation, what does a client implementer do 
>> when openid connect is not available?  Suggest we give a list of qualities 
>> developers should look for (eg is fb connect good)?
>> 
>> Phil
>> 
>>> On Nov 2, 2014, at 09:04, Torsten Lodderstedt <tors...@lodderstedt.net> 
>>> wrote:
>>> 
>>> Hi all,
>>> 
>>> I just read the document. It explains the situation, challenges/threats, 
>>> and options very clear and readable.
>>> 
>>> So +1 for publishing it soon.
>>> 
>>> kind regards,
>>> Torsten.
>>> 
>>> Am 28.10.2014 00:21, schrieb Richer, Justin P.:
>>>> I've been incorporating peoples' feedback into the proposed oauth.net 
>>>> page, and the current state is here:
>>>> 
>>>> https://github.com/jricher/oauth.net/blob/authentication/articles/authentication.php
>>>> 
>>>> Commentary has slowed down and I think the document's in reasonable. I 
>>>> would like to publish this as a draft version on oauth.net in the very 
>>>> near future (like, this week), so get comments and feedback to me on this 
>>>> soon. I'm going to be at IIW all week if anyone wants to back me into a 
>>>> corner and talk about this.
>>>> 
>>>> -- Justin
>>>> 
>>>>> On Oct 16, 2014, at 12:54 PM, Hannes Tschofenig 
>>>>> <hannes.tschofe...@gmx.net> wrote:
>>>>> 
>>>>> Participants:
>>>>> 
>>>>> * Brian Campbell
>>>>> * John Bradley
>>>>> * Derek Atkins
>>>>> * Phil Hunt
>>>>> * William Kim
>>>>> * Josh Mandel
>>>>> * Hannes Tschofenig
>>>>> 
>>>>> 
>>>>> Notes:
>>>>> 
>>>>> Justin distributed a draft writeup and explained the reasoning behind
>>>>> it. The intended purpose is to put the write-up (after enough review) on
>>>>> oauth.net. See attachments. Justin solicited feedback from the
>>>>> conference call participants and from the working group.
>>>>> 
>>>>> One discussion item was specifically related to the concept of audience
>>>>> restrictions, which comes in two flavours: (a) restriction of the access
>>>>> token regarding the resource server and (b) restriction of the id token
>>>>> regarding the client. Obviously, it is necessary to have both of these
>>>>> audience restrictions in place and to actually check them.
>>>>> 
>>>>> The group then went into a discussion about the use of pseudonyms in
>>>>> authentication and the problems deployments ran into when they used
>>>>> pseudonyms together with a wide range of attributes that identified
>>>>> users nevertheless. Phil suggested to produce a write-up about this topic.
>>>>> 
>>>>> Finally, the group started a discussion about potential actions for the
>>>>> OAuth working groups. Two activities were mentioned, namely to produce
>>>>> an IETF draft of the write-up Justin has prepared as a "formal" response
>>>>> to the problems with authentication using OAuth and, as a second topic,
>>>>> potential re-chartering of the OAuth working group to work on some
>>>>> solutions in this area. Hannes suggested to postpone these discussions
>>>>> and to first finish the write-up Justin had distributed.
>>>>> 
>>>>> Ciao
>>>>> Hannes & Derek
>>>>> <Authentication with OAuth 2.doc><Authentication with OAuth 
>>>>> 2.html><Authentication with OAuth 
>>>>> 2.pdf>_______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>> 
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>> 
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
> 

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to