Hi Justin,
On 03/11/14 04:30, Justin Richer wrote:
As of earlier this evening, I've published the article that we've been
working on about dealing with OAuth and end-user authentication. It's
available here:
http://oauth.net/articles/authentication/
Huge thanks to everyone who commented on the text, both here on the list
and last week at IIW. If there are edits to be made, either reply here
or just make a pull request directly from GitHub. It's not an RFC, we
can keep editing it. :)
Thanks for your help. Nice article indeed.
Something I've been planning to ask, sorry if it is off topic - may be
it is better be posted elsewhere, just let me know please, the actual
question is here for now:
OIDC can help Clients ask for the permissions to access the user's
identity info plus some other info this Client actually needs to have in
order to do something useful for the user at the same time. This is one
of the distinguishing features of OIDC. I guess a good example would be
an "openid profile calendar" scope, where a 'calendar' scope is about
the Client being able to access the user's calendar.
What is not clear here is how it all fits into a typical sign on process
followed by some service offerings. Suppose we have a ReservationService
Client. When the user goes to the ReservationService's web site which
supports a sign on via Google or other OIDC IDP, the user is obviously
not redirected immediately to Google with "openid profile calendar"
scope already set, the user would see some kind of Sign On Welcome Page
first.
After the user completes the sign on process, the OIDC RP would validate
id_token, may be get UserProfile, and then the session would begin and
the service will offer the user an option to do some reservation which
requires a Client to have an access token allowing it to get to the
user's calendar.
One question here is really how it can be aligned with the OIDC feature
allowing IDP/AS to ask during the user signing on with OIDC IDP for
multiple permissions such as "openid profile calendar" at the same time.
I can only imagine that for this to work, the Sign On Welcome Page would
already have a script with the "openid profile calendar" scope set, so
when the user clicks some 'Sign In' button, the user would be asked at
the OIDC IDP site to let the Client access "the profile info and the
calendar info".
That is probably how it should flow. If so, then it is obvious OIDC RP
should share a session state with the actual ReservationService client
because a signed on user redirected back to it from OIDC IDP/AS won't
have reserved something for it straight away, ReservationService would
only now ask the signed on user some questions re the reservation
details. And the only way ReservationService can complete the
reservation is for it to use an access token OIDC RP received when it
itself accessed the OIDC UserProfile endpoint.
Effectively we are talking about OIDC RP sharing an access token via a
session state with the Client in this case. Note I'm referring to the
case where the Client wants to ask both OIDC related and its own
application specific permissions such as "openid profile calendar" and
the fact that the end user would be typically be exploring
ReservationService site in two steps, sign on first, ask for the
reservation service next.
Does it make sense at all ? If yes, what, if anything, can be
recommended in this case where an access token is to be shared between
OIDP RP and the actual Client ?
Thanks, sorry for a long message
Sergey
In the process of putting this together for the site, I also created an
"Articles" structure on the site so that if there are other topics we
want to add, we (the community, not just the WG) can do so.
-- Justin
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth