While it is good to start with the connect spec, i would caution on the 
assumption of compatibility. More than likely there will be changes based on 
broader cases. 

I would like to understand these broader requirements, use cases, and security 
considerations first. 



Phil

> On Nov 27, 2015, at 20:05, Mike Jones <michael.jo...@microsoft.com> wrote:
> 
> It allows non-Connect implementation of OAuth 2.0 to also have a standard 
> discovery capability – and one that can later be updated to also support 
> OpenID Connect with no breaking changes, should that be desired in the future.
>  
>                                                           -- Mike
>  
> From: Bill Mills [mailto:wmills_92...@yahoo.com] 
> Sent: Friday, November 27, 2015 7:58 PM
> To: Mike Jones <michael.jo...@microsoft.com>; oauth@ietf.org
> Subject: Re: [OAUTH-WG] OAuth Discovery
>  
> Can you elaborate on the advantage of having a separate parallel spec to 
> OpenID Discovery?
>  
>  
> 
> On Wednesday, November 25, 2015 3:37 PM, Mike Jones 
> <michael.jo...@microsoft.com> wrote:
>  
> 
> I’m pleased to announce that Nat Sakimura, John Bradley, and I have created 
> an OAuth 2.0 Discovery specification.  This fills a hole in the current OAuth 
> specification set that is necessary to achieve interoperability.  Indeed, the 
> Interoperability section of OAuth 2.0 states:
> In addition, this specification leaves a few required components partially or 
> fully undefined (e.g., client registration, authorization server 
> capabilities, endpoint discovery).  Without these components, clients must be 
> manually and specifically configured against a specific authorization server 
> and resource server in order to interoperate.
>   
> This framework was designed with the clear expectation that future work will 
> define prescriptive profiles and extensions necessary to achieve full 
> web-scale interoperability.
>  
> This specification enables discovery of both endpoint locations and 
> authorization server capabilities.
>  
> This specification is based upon the already widely deployed OpenID Connect 
> Discovery 1.0 specification and is compatible with it, by design.  The OAuth 
> Discovery spec removes the portions of OpenID Connect Discovery that are 
> OpenID specific and adds metadata values for Revocation and Introspection 
> endpoints.  It also maps OpenID concepts, such as OpenID Provider, Relying 
> Party, End-User, and Issuer to their OAuth underpinnings, respectively 
> Authorization Server, Client, Resource Owner, and the newly introduced 
> Configuration Information Location.  Some identifiers with names that appear 
> to be OpenID specific were retained for compatibility purposes; despite the 
> reuse of these identifiers that appear to be OpenID specific, their usage in 
> this specification is actually referring to general OAuth 2.0 features that 
> are not specific to OpenID Connect.
>  
> The specification is available at:
> ·         http://tools.ietf.org/html/draft-jones-oauth-discovery-00
>  
> An HTML-formatted version is also available at:
> ·         http://self-issued.info/docs/draft-jones-oauth-discovery-00.html
>  
>                                                                 -- Mike
>  
> P.S.  This note was also posted at http://self-issued.info/?p=1496 and as 
> @selfissued.
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
> 
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to