Good work, Mike, John, Nat! I see that the introspection and revocation endpoints are included now (they've been missing in OpenID discovery).
Regarding client authentication, would it make sense to let token_endpoint_auth_methods_supported apply to the introspection and revocation endpoints as well? token_endpoint_auth_methods_supported OPTIONAL. JSON array containing a list of client authentication methods supported by this token endpoint. Client authentication method values are used in the "token_endpoint_auth_method" parameter defined in Section 2 of [RFC7591] <http://tools.ietf.org/html/rfc7591#section-2>. If omitted, the default is "client_secret_basic" -- the HTTP Basic Authentication Scheme specified in Section 2.3.1 <http://tools.ietf.org/html/draft-jones-oauth-discovery-00#section-2.3.1> of OAuth 2.0 [RFC6749 <http://tools.ietf.org/html/rfc6749>]. Vladimir On 26.11.2015 01:37, Mike Jones wrote: > I'm pleased to announce that Nat Sakimura, John Bradley, and I have created > an OAuth 2.0 Discovery specification. This fills a hole in the current OAuth > specification set that is necessary to achieve interoperability. Indeed, the > Interoperability section of OAuth 2.0 > <https://tools.ietf.org/html/rfc6749#section-1.8> states: > > In addition, this specification leaves a few required components partially or > fully undefined (e.g., client registration, authorization server > capabilities, endpoint discovery). Without these components, clients must be > manually and specifically configured against a specific authorization server > and resource server in order to interoperate. > > > > This framework was designed with the clear expectation that future work will > define prescriptive profiles and extensions necessary to achieve full > web-scale interoperability. > > This specification enables discovery of both endpoint locations and > authorization server capabilities. > > This specification is based upon the already widely deployed OpenID Connect > Discovery 1.0<http://openid.net/specs/openid-connect-discovery-1_0.html> > specification and is compatible with it, by design. The OAuth Discovery spec > removes the portions of OpenID Connect Discovery that are OpenID specific and > adds metadata values for Revocation and Introspection endpoints. It also > maps OpenID concepts, such as OpenID Provider, Relying Party, End-User, and > Issuer to their OAuth underpinnings, respectively Authorization Server, > Client, Resource Owner, and the newly introduced Configuration Information > Location. Some identifiers with names that appear to be OpenID specific were > retained for compatibility purposes; despite the reuse of these identifiers > that appear to be OpenID specific, their usage in this specification is > actually referring to general OAuth 2.0 features that are not specific to > OpenID Connect. > > The specification is available at: > > * http://tools.ietf.org/html/draft-jones-oauth-discovery-00 > > An HTML-formatted version is also available at: > > * http://self-issued.info/docs/draft-jones-oauth-discovery-00.html > > -- Mike > > P.S. This note was also posted at http://self-issued.info/?p=1496 and as > @selfissued<https://twitter.com/selfissued>. > > > > _______________________________________________ > OAuth mailing list > OAuth@ietf.org > https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth