+1 
JB.

> On Jul 2, 2015, at 1:33 PM, Adam Lewis <adam.le...@motorolasolutions.com> 
> wrote:
> 
> Hi Lisa,
> 
> Form the perspective of OAuth, there is ALWAYS a client (even if it is 
> running on a server).  Of your two servers, one is exposing an API (so this 
> will be your RS), and the other server is a client of that API, so that will 
> be your Client.  So it is still a client-server communication.  
> 
> So it's a question then if whether or not the server (acting as an API 
> client) is accessing the other server's API on it's own behalf or on behalf 
> of an end user, and if acting on behalf of an end user, then how does the end 
> user interact with the server (acting as the API client)?
> 
> If the server acting as an API client is acting on its own behalf, then you 
> want the client credential grant type (or possible a SAML or JWT assertion).
> If the server acting as an API client is acting on behalf of an end user and 
> the end user is coming in through a browser, then you want the authorization 
> code grant type.
> If the server acting as an API client is acting on behalf of an end user and 
> the end user directly signs onto the server, then you might be stuck using 
> the RO password grant type.
> 
> authorization code and RO grant types give you a refresh token that you can 
> use to refresh the access token.  In the case of client credentials, the 
> client stores a long term PSK or has a public private key pair used to 
> request access tokens, so it will directly communicate with the token 
> endpoint using those to get new access tokens.
> 
> Does that make sense?
> adam
> 
> On Mon, Jun 29, 2015 at 9:18 PM, Lisa Li1 <lisa_...@symantec.com 
> <mailto:lisa_...@symantec.com>> wrote:
> Hi All
> 
>  
> 
> This is Lisa.
> 
> Our project is adopting OAuth 2 as authentication specification.
> 
> For the client-server communication, OAuth token works fine. But we have some 
> cases of server to server communication, usually it will be multiple tasks 
> running in parallel or sequence or even in multiple threads. In this case, we 
> are not sure we should reuse the access token grant by end user or create 
> another token? Moreover, if token is expired in 30 min, we are able to do 
> refresh but may meet some issue on the token consistency between each task, 
> thus it might be refreshed again and again…
> 
>  
> 
> But with OAuth 1.0, since it will not expired and we don’t have to do 
> refresh, it will work fine.
> 
>  
> 
> So for OAuth 2.0, what’s your consideration for server to server 
> communication scenario? Or do you have any suggestion here?
> 
>  
> 
> Thanks.
> 
>  
> 
>  
> 
> Lisa Li
> 
> Principal Software Engineer
> 
> Symantec Corporation
> 
>  
> 
> Office: (010) 6272 5127  /  Mobile: 189 1057 2219
> 
> lisa_...@symantec.com <mailto:lisa_...@symantec.com>
>  
> 
> <image002.png>
> 
>  
> 
>  
> 
> This message (including any attachments) is intended only for the use of the 
> individual or entity to which it is addressed and may contain information 
> that is non-public, proprietary, privileged, confidential, and exempt from 
> disclosure under applicable law or may constitute as attorney work product. 
> If you are not the intended recipient, you are hereby notified that any use, 
> dissemination, distribution, or copying of this communication is strictly 
> prohibited. If you have received this communication in error, notify us 
> immediately by telephone and (i) destroy this message if a facsimile or (ii) 
> delete this message immediately if this is an electronic communication.
> 
>  
> 
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org <mailto:OAuth@ietf.org>
> https://www.ietf.org/mailman/listinfo/oauth 
> <https://www.ietf.org/mailman/listinfo/oauth>
> 
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to