+1

> On Jan 25, 2016, at 1:39 PM, George Fletcher <gffle...@aol.com> wrote:
> 
> So now, in addition to the dynamic client registration spec, the client would 
> need to support OAuth2 Discovery.
> 
> I guess my concern is that it feels like we are adding a lot of little things 
> to try and mitigate these attacks in OAuth2 and it's confusing when they are 
> needed and when they aren't.
> 
> For me it would be simpler to say that OAuth2 with a single pre-configured AS 
> is fine. If a client wants to support multiple Authorization Servers (a la 
> dynamic client registration or some other method) then here are all the 
> things that need to be done. Maybe this would be simpler as a profile of 
> OAuth2 (in the vein of OpenID Connect) that adds the necessary requirements 
> to mitigate these attacks.
> 
> This way an OAuth2 developer knows which spec to follow based on their 
> requirements and all the necessary steps would be in "one" place.
> 
> Thanks,
> George
> 
> On 1/25/16 1:22 PM, John Bradley wrote:
>> The presumption is that registration would need to add a issuer, as an 
>> identifier of the AS, and that would be optionally be used in discovery.
>> 
>> OAuth as is supports the single AS model.
>> 
>> To support multiple AS for a single client something needs to change.    
>> Adding issuer and client_id to the response with optional discovery was seen 
>> as the least disruptive at the Germany meeting.
>> 
>>  The other way to do it is to return discovery info from the the 
>> authorization and token endpoints, however the request probably also need to 
>> be modified so that the AS knows what the resource is, otherwise 
>> other things will break.    
>> 
>> It is possible now to have one authorization endpoint provide code for per 
>> Tennent token endpoints.(No I don’t know of any one doing it).
>> 
>> Anything we add to tighten up the trust model will have impacts on what can 
>> be done with OAuth.  
>> 
>> John B.
>>> On Jan 25, 2016, at 3:10 PM, George Fletcher <gffle...@aol.com 
>>> <mailto:gffle...@aol.com>> wrote:
>>> 
>>> Comments inline
>>> 
>>> On 1/25/16 12:32 PM, John Bradley wrote:
>>>> No, client id_are scoped by issuer.  
>>> This makes sense, but I'm not sure it's a current assumption by OAuth2 
>>> implementations :)
>>>> 
>>>> There is no need for AS to make the client_id globally unique.
>>>> 
>>>>  The client needs to not allow two AS to provide it with the same issuer 
>>>> client_id pair.
>>>> 
>>>> That would probably be imposable for many clients anyway. 
>>> I would rather say that the results of two client_ids being the same from 
>>> two different issuers is undefined.
>>>> 
>>>> For Connect clients typically manage configurations using issuer as the 
>>>> primary key.  I doubt may would support even two client_id from the same 
>>>> issuer.
>>> If scoped by issuer this makes sense, though the concept of "issuer" as a 
>>> comparable entity wasn't really talked about with OAuth2.
>>>> 
>>>> For OAuth what clients do is slightly less clear.  In general they don’t 
>>>> have more than one AS per API do might try and organize things by RS or AS.
>>> I agree that not many clients support dynamic client registration. However, 
>>> I would say there a number that support multiple AS that are "fixed" within 
>>> the code (including fixed endpoint URIs). So I would say that the 
>>> associations would be fixed in code. There wouldn't necessarily be an 
>>> association outside of the code which maps button A to AS1 and button B to 
>>> AS2.
>>>> 
>>>> In principal a OAuth client might have two different AS each with a 
>>>> different client ID and that will be OK as long as the client_id in the 
>>>> request is the same as the one in the response.
>>>> 
>>>> So going to a new AS and getting back the same iss and client_id that you 
>>>> registered someplace else would be an error for the client.
>>>> 
>>>> I don’t think that is unreasonable.
>>> I agree that this is reasonable with the assumption that client_id's are 
>>> scoped by "issuer". It's just likely that most clients in the field do not 
>>> have this sort of explicit association. The OAuth2 Dynamic Client 
>>> Registration spec does not define an "issuer" in the response. For the 
>>> OAuth2 use cases, what is the proposed "issuer" equivalent URI that is 
>>> being used to scope the client_id? 
>>>> 
>>>> John B.
>>>> 
>>>> 
>>>>> On Jan 25, 2016, at 12:30 PM, George Fletcher <gffle...@aol.com 
>>>>> <mailto:gffle...@aol.com>> wrote:
>>>>> 
>>>>> I'm still catching up... but to this point specifically...
>>>>> 
>>>>> Doesn't this require that the same client_id NOT be used simultaneously 
>>>>> at two (or more) Authorization Servers? If so, I don't believe that is a 
>>>>> viable option. It's a little late in the game to be putting requirements 
>>>>> on the AS as to how it generates it's client_id.
>>>>> 
>>>>> Thanks,
>>>>> George
>>>>> 
>>>>> On 1/25/16 9:11 AM, John Bradley wrote:
>>>>>> 
>>>>>> Returning the iss and client_id from the authorization endpoint per 
>>>>>> Mike’s draft allows the client to reject the authorization response and 
>>>>>> not leak the code.
>>>>> 
>>>> 
>>> 
>>> -- 
>>> Chief Architect                   
>>> Identity Services Engineering     Work: george.fletc...@teamaol.com 
>>> <mailto:george.fletc...@teamaol.com>
>>> AOL Inc.                          AIM:  gffletch
>>> Mobile: +1-703-462-3494           Twitter: http://twitter.com/gffletch 
>>> <http://twitter.com/gffletch>
>>> Office: +1-703-265-2544           Photos: http://georgefletcher.photography 
>>> <http://georgefletcher.photography/>
>> 
> 
> -- 
> Chief Architect                   
> Identity Services Engineering     Work: george.fletc...@teamaol.com 
> <mailto:george.fletc...@teamaol.com>
> AOL Inc.                          AIM:  gffletch
> Mobile: +1-703-462-3494           Twitter: http://twitter.com/gffletch 
> <http://twitter.com/gffletch>
> Office: +1-703-265-2544           Photos: http://georgefletcher.photography 
> <http://georgefletcher.photography/>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to