After putting out the original proposal, I am not totally sure we need it. In 
many cases we architected around the issue. 
https://tools.ietf.org/html/draft-hunt-oauth-chain-01

Question is token swap for cross domain chaining? Shouldn't in domain servers 
be acting on internal policy mechanisms? Is there an interop need for the 
internal case?

I conclude this is a primarily a cross domain case that could also be used in 
internally. But internal is not the driver. 

Based on the number of submissions, this seems to be a 1% case that everyone 
has. Unfortunately that means we keep downgrading its priority. 

Phil

> On Jul 1, 2015, at 07:59, Brian Campbell <bcampb...@pingidentity.com> wrote:
> 
> One problem, I think, with token exchange is that it can be really simple 
> (token in and token out) and really complicated (client X wants a token that 
> says user A is doing something on behalf of user B) at the same time. 
> 
> I put forth https://tools.ietf.org/html/draft-campbell-oauth-sts-01 in an 
> attempt to simplify things and express what I envisioned as an OAuth based 
> token exchange framework. Though it likely only muddied the waters :) 
> 
>> On Wed, Jul 1, 2015 at 7:07 AM, Sergey Beryozkin <sberyoz...@gmail.com> 
>> wrote:
>> Hi Justin
>> 
>> https://tools.ietf.org/html/draft-richer-oauth-chain-00 is much easier to 
>> read, that I can tell for sure, at least it is obvious why a given entity 
>> (RS1) may want to exchange the current token provided by a client for a new 
>> token. Definitely easily implementable...
>> 
>> One thing I'm not sure in the draft-richer-oauth-chain-00 about is on behalf 
>> of whose entity RS1 will be acting once it starts accessing RS2, On Behalf 
>> Of RO, or may be On Behalf Of (RO + Client), or may be it is On Behalf Of RO 
>> + Act As Client ? The last one seems most logical to me...
>> 
>> Thanks, Sergey
>> 
>> 
>>> On 01/07/15 13:18, Justin Richer wrote:
>>> As it's written right now, it's a translation of some WS-* concepts into
>>> JWT format. It's not really OAuth-y (since the client has to understand
>>> the token format along with everyone else, and according to the authors
>>> the artifacts might not even be "OAuth tokens"), and that's my main
>>> issue with the document. Years ago, I proposed an OAuth-based token swap
>>> mechanism:
>>> 
>>> https://tools.ietf.org/html/draft-richer-oauth-chain-00
>>> 
>>> This works without defining semantics of the tokens themselves, just
>>> like the rest of OAuth. I've proposed to the authors of the current
>>> draft that it should incorporate both semantic (using JWT) and syntactic
>>> (using a simple token-agnostic grant) token swap mechanisms, and that
>>> the two could be easily compatible.
>>> 
>>>   -- Justin
>>> 
>>>> On 7/1/2015 6:35 AM, Sergey Beryozkin wrote:
>>>> Hmm... perhaps the clue is in the draft title, token-exchange, so may
>>>> be it is a case of the given access token ("on_behalf_of" or "act_as"
>>>> claim) being used to request a new security token. One can only guess
>>>> though, does not seem like the authors are keen to answer the newbie
>>>> questions...
>>>> 
>>>> Cheers, Sergey
>>>> 
>>>> 
>>>>> On 30/06/15 13:38, Sergey Beryozkin wrote:
>>>>> Hi,
>>>>> Can you please explain what is the difference between On-Behalf-Of
>>>>> semantics described in the draft-ietf-oauth-token-exchange-01 and the
>>>>> implicit On-Behalf-Of semantics a client OAuth2 token possesses ?
>>>>> 
>>>>> For example, draft-ietf-oauth-token-exchange-01 mentions:
>>>>> 
>>>>> "Whereas, with on-behalf-of semantics, principal A still has its own
>>>>> identity separate from B and it is explicitly understood that while B
>>>>> may have delegated its rights to A, any actions taken are being taken by
>>>>> A and not B. In a sense, A is an agent for B."
>>>>> 
>>>>> This is a typical case with the authorization code flow where a client
>>>>> application acts on-behalf-of the user who authorized this application ?
>>>>> 
>>>>> Sorry if I'm missing something
>>>>> 
>>>>> Cheers, Sergey
>>>>>> On 25/06/15 22:28, Mike Jones wrote:
>>>>>> That’s what
>>>>>> https://tools.ietf.org/html/draft-ietf-oauth-token-exchange-01 is
>>>>>> about.
>>>>>> 
>>>>>> Cheers,
>>>>>> 
>>>>>> -- Mike
>>>>>> 
>>>>>> *From:*OAuth [mailto:oauth-boun...@ietf.org] *On Behalf Of *Vivek
>>>>>> Biswas
>>>>>> -T (vibiswas - XORIANT CORPORATION at Cisco)
>>>>>> *Sent:* Thursday, June 25, 2015 2:20 PM
>>>>>> *To:* OAuth@ietf.org
>>>>>> *Subject:* [OAUTH-WG] JWT Token on-behalf of Use case
>>>>>> 
>>>>>> Hi All,
>>>>>> 
>>>>>>    I am looking to solve a use-case similar to WS-Security On-Behalf-Of
>>>>>> <http://docs.oasis-open.org/ws-sx/ws-trust/v1.4/errata01/os/ws-trust-1.4-errata01-os-complete.html#_Toc325658980>
>>>>>> 
>>>>>> 
>>>>>> with OAuth JWT Token.
>>>>>> 
>>>>>>    Is there a standard claim which we can define within the OAuth JWT
>>>>>> which denote the On-behalf-of User.
>>>>>> 
>>>>>> For e.g., a Customer Representative trying to create token on behalf of
>>>>>> a customer and trying to execute services specific for that specific
>>>>>> customer.
>>>>>> 
>>>>>> Regards,
>>>>>> 
>>>>>> Vivek Biswas,
>>>>>> CISSP
>>>>>> 
>>>>>> *Cisco Systems, Inc <http://www.cisco.com/>*
>>>>>> 
>>>>>> *Bldg. J, San Jose, USA,*
>>>>>> 
>>>>>> *Phone: +1 408 527 9176*
>>>>>> 
>>>>>> 
>>>>>> 
>>>>>> _______________________________________________
>>>>>> OAuth mailing list
>>>>>> OAuth@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>> 
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>> 
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>> 
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to