Polite comment, Google in general is pretty "open" about session management in 
general - long idle timeout and no apparent absolute timeout. For a bank or 
other organization that produces high risk software, this is not standard 
practice. Re-authentication is a critical security boundary, not prompting the 
user for re-authentication credentials is unacceptable in those environments.

I may be jumping in out of context, but fair?

--
Jim Manico
@Manicode
+1 (808) 652-3805

> On Feb 15, 2016, at 3:36 PM, William Denniss <wdenn...@google.com> wrote:
> 
> We return 'amr' claims in ID Tokens if "max_age" is requested (per OpenID 
> Connect), e.g.:
> 
> https://accounts.google.com/o/oauth2/auth?redirect_uri=https%3A%2F%2Fdevelopers.google.com%2Foauthplayground&response_type=code&client_id=407408718192.apps.googleusercontent.com&scope=openid+profile&approval_prompt=force&access_type=offline&max_age=1
> 
> The reason we do this is to be explicit about how we are processing the 
> "max_age" reauth request, specifically that we don't always prompt the user 
> to reauthenticate directly (but do perform in-session risk analysis).
> 
> I can see us potentially using the more generic amr values like "user", and 
> "mfa" but we will probably avoid very specific ones like "sms" or "otp" to 
> avoid brittle relationships with RPs. That said, I don't object to those 
> being in the registry, perhaps there is value in some tightly coupled 
> enterprise configurations.
> 
> 
>> On Sun, Feb 14, 2016 at 5:30 AM, Torsten Lodderstedt 
>> <tors...@lodderstedt.net> wrote:
>> Hi Denniss,
>> 
>> out of curiosity: Does Google use amr values? 
>> 
>> best regards,
>> Torsten.
>> 
>> 
>>> Am 14.02.2016 um 02:40 schrieb William Denniss:
>>> 
>>> 
>>> On Sat, Feb 13, 2016 at 12:19 PM, Mike Jones <michael.jo...@microsoft.com> 
>>> wrote:
>>>> It's an acceptable fallback option if the working group decides it doesn't 
>>>> want to register the values that are already in production use at the time 
>>>> we establish the registry. But add William points out, Google is already 
>>>> using some of these values. Microsoft is using some of them. The OpenID 
>>>> MODRNA specs are using some of them. So it seems more efficient to 
>>>> register them at the same time.
>>>> 
>>>> That would be my preference.
>>> 
>>> +1, it is also my preference to register the current values.
>>> 
>>> I don't see any harm in the spec that establishes the registry also seeding 
>>> it with all known values in use at the time of drafting, regardless of the 
>>> group that originally specified them. Makes the original spec more useful, 
>>> and avoids the need to submit each value for consideration separately – 
>>> they can be all be reviewed at the same time. 
>>> 
>>> 
>>>> From: Justin Richer
>>>> Sent: ‎2/‎13/‎2016 11:11 AM
>>>> To: Phil Hunt
>>>> 
>>>> Cc: <oauth@ietf.org>
>>>> Subject: Re: [OAUTH-WG] Authentication Method Reference Values: Call for 
>>>> Adoption Finalized
>>>> 
>>>> Can we just do that, then? Seems to be the easiest way to address various 
>>>> needs and concerns. 
>>>> 
>>>>  — Justin
>>>> 
>>>>> On Feb 13, 2016, at 11:08 AM, Phil Hunt (IDM) <phil.h...@oracle.com> 
>>>>> wrote:
>>>>> 
>>>>> Yes
>>>>> 
>>>>> Phil
>>>>> 
>>>>> On Feb 13, 2016, at 07:59, "tors...@lodderstedt.net" 
>>>>> <tors...@lodderstedt.net> wrote:
>>>>> 
>>>>>> So basically, the RFC could also just establish the new registry and 
>>>>>> oidf could feel in the values?
>>>>>> 
>>>>>> (just trying to understand)
>>>>>> 
>>>>>> 
>>>>>> 
>>>>>> -------- Originalnachricht --------
>>>>>> Betreff: RE: [OAUTH-WG] Authentication Method Reference Values: Call for 
>>>>>> Adoption Finalized
>>>>>> Von: Mike Jones <michael.jo...@microsoft.com>
>>>>>> An: tors...@lodderstedt.net,John Bradley <ve7...@ve7jtb.com>
>>>>>> Cc: oauth@ietf.org
>>>>>> 
>>>>>> The context that most people on this thread probably don’t have is that 
>>>>>> an IANA registry can only be established by an RFC.  Non-RFC 
>>>>>> specifications, such as OpenID specifications, can *register* values in 
>>>>>> a registry, but they cannot *establish* a registry.  The OpenID 
>>>>>> Foundation inquired about this with the IETF before OpenID Connect was 
>>>>>> finalized and learned that its specifications could not establish IANA 
>>>>>> registries.  Otherwise, they would have.
>>>>>> 
>>>>>>  
>>>>>> 
>>>>>> Instead, RFCs need to be created to establish registries – even for 
>>>>>> values first defined in non-RFC specifications.  This specification is 
>>>>>> one example of doing this.
>>>>>> 
>>>>>>  
>>>>>> 
>>>>>>                                                           -- Mike
>>>>>> 
>>>>>>  
>>>>>> 
>>>>>> From: OAuth [mailto:oauth-boun...@ietf.org] On Behalf Of 
>>>>>> tors...@lodderstedt.net
>>>>>> Sent: Saturday, February 13, 2016 6:37 AM
>>>>>> To: John Bradley <ve7...@ve7jtb.com>
>>>>>> Cc: oauth@ietf.org
>>>>>> Subject: Re: [OAUTH-WG] Authentication Method Reference Values: Call for 
>>>>>> Adoption Finalized
>>>>>> 
>>>>>>  
>>>>>> 
>>>>>> We clearly have this problem between oauth and oidc. Just take a look at 
>>>>>> the discovery thread.
>>>>>> 
>>>>>> According to you argument I see two options:
>>>>>> (1) amr stays an oidc claim, is used in oidc only and the oauth wg just 
>>>>>> publishes the registry entries. In this case, the spec should clearly 
>>>>>> explain this.
>>>>>> (2) amr is of any use in oauth (although it has been invented in oidc) - 
>>>>>> than define it and motivate it's use in oauth in this spec.
>>>>>> 
>>>>>> Right now, I think it creates the impression oauth is for authentication.
>>>>>> 
>>>>>> 
>>>>>> 
>>>>>> -------- Originalnachricht --------
>>>>>> Betreff: Re: [OAUTH-WG] Authentication Method Reference Values: Call for 
>>>>>> Adoption Finalized
>>>>>> Von: John Bradley <ve7...@ve7jtb.com>
>>>>>> An: tors...@lodderstedt.net
>>>>>> Cc: roland.hedb...@umu.se,oauth@ietf.org
>>>>>> 
>>>>>> This is not a issue between oauth and OIDC.
>>>>>> 
>>>>>>  
>>>>>> 
>>>>>> This has to do with the registry for JWT being in OAuth.   Many 
>>>>>> protocols that use JWT are going to want to register claims.  
>>>>>> 
>>>>>> We can’t ask them to all move the parts of there specs that use JWT to 
>>>>>> OAuth.
>>>>>> 
>>>>>>  
>>>>>> 
>>>>>> Perhaps JWT should have been part of JOSE, but that is water under the 
>>>>>> bridge.  
>>>>>> 
>>>>>>  
>>>>>> 
>>>>>> The OAuth WG is responsible for JWT and it’s registry, and we will need 
>>>>>> to deal with registering claims.  
>>>>>> 
>>>>>>  
>>>>>> 
>>>>>> I guess that we can tell people that they need to publish the specs 
>>>>>> defining the claims someplace else, and just do the registry part.
>>>>>> 
>>>>>> However doing that will probably not improve interoperability and 
>>>>>> understanding.
>>>>>> 
>>>>>>  
>>>>>> 
>>>>>> This document defines the claim for JWT in general.  We still have 
>>>>>> almost no documentation in the WG about what a JWT access token would 
>>>>>> contain other than the POP work.
>>>>>> 
>>>>>>  
>>>>>> 
>>>>>> John B.
>>>>>> 
>>>>>> On Feb 13, 2016, at 9:18 AM, tors...@lodderstedt.net wrote:
>>>>>> 
>>>>>>  
>>>>>> 
>>>>>> I basically support adoption of this document. Asserting authentication 
>>>>>> methods in access tokens (in this case in JWTS format) is reasonable. We 
>>>>>> use it to pass information about the authentication performed prior 
>>>>>> issuing an access token to the _resource_ server.
>>>>>> 
>>>>>> What worries me is the back and forth between oauth and oidc. The amr 
>>>>>> claim is defined in oidc (which sits on top of oauth) but the oauth wg 
>>>>>> specifies the registry? Moreover, the current text does not give a 
>>>>>> rationale for using amr in context of oauth.
>>>>>> 
>>>>>> As a WG we need to find a clear delineation between both protocols, 
>>>>>> otherwise noone will really understand the difference and when to use 
>>>>>> what. We create confusion!
>>>>>> 
>>>>>> For this particular draft this means to either move amr to oauth or the 
>>>>>> registry to oidc.
>>>>>> 
>>>>>> best regards, 
>>>>>> Torsten.
>>>>>> 
>>>>>> 
>>>>>> 
>>>>>> -------- Ursprüngliche Nachricht --------
>>>>>> Von: Roland Hedberg <roland.hedb...@umu.se>
>>>>>> Gesendet: Friday, February 12, 2016 05:45 PM
>>>>>> An: oauth@ietf.org
>>>>>> Betreff: Re: [OAUTH-WG] Authentication Method Reference Values: Call for 
>>>>>> Adoption Finalized
>>>>>> 
>>>>>> +1
>>>>>> 
>>>>>> > 12 feb 2016 kl. 16:58 skrev John Bradley <ve7...@ve7jtb.com>:
>>>>>> > 
>>>>>> > +1 to adopt this draft.
>>>>>> > 
>>>>>> >> On Feb 12, 2016, at 3:07 AM, Mike Jones <michael.jo...@microsoft.com> 
>>>>>> >>                                                 wrote:
>>>>>> >> 
>>>>>> >> Draft -05 incorporates the feedback described below - deleting the 
>>>>>> >> request parameter, noting that this spec isn't an encouragement to 
>>>>>> >> use OAuth 2.0 for authentication without employing appropriate 
>>>>>> >> extensions, and no longer requiring a specification for IANA 
>>>>>> >> registration.  I believe that it’s now ready for working group 
>>>>>> >> adoption.
>>>>>> >> 
>>>>>> >>                                                           -- Mike
>>>>>> >> 
>>>>>> >> -----Original Message-----
>>>>>> >> From: OAuth [mailto:oauth-boun...@ietf.org] On Behalf Of Hannes       
>>>>>> >>                                           Tschofenig
>>>>>> >> Sent: Thursday, February 4, 2016 11:23 AM
>>>>>> >> To: oauth@ietf.org
>>>>>> >> Subject: [OAUTH-WG] Authentication Method Reference Values: Call for 
>>>>>> >> Adoption Finalized
>>>>>> >> 
>>>>>> >> Hi all,
>>>>>> >> 
>>>>>> >> On January 19th I posted a call for adoption of the Authentication 
>>>>>> >> Method Reference Values specification, see 
>>>>>> >> http://www.ietf.org/mail-archive/web/oauth/current/msg15402.html
>>>>>> >> 
>>>>>> >> What surprised us is that this work is conceptually very simple: we 
>>>>>> >> define new claims and create a registry with new values. Not a big 
>>>>>> >> deal but that's not what the feedback from the Yokohama IETF meeting 
>>>>>> >> and the subsequent call for adoption on the list shows. The feedback 
>>>>>> >> lead to mixed feelings and it is a bit difficult for Derek and myself 
>>>>>> >> to judge consensus.
>>>>>> >> 
>>>>>> >> Let me tell you what we see from the                                  
>>>>>> >>                comments on the list.
>>>>>> >> 
>>>>>> >> In his review at
>>>>>> >> http://www.ietf.org/mail-archive/web/oauth/current/msg15423.html 
>>>>>> >> James Manger asks for significant changes. Among other things, he 
>>>>>> >> wants to remove one of the claims. He provides a detailed review and 
>>>>>> >> actionable items.
>>>>>> >> 
>>>>>> >> William Denniss believes the document is ready for adoption but 
>>>>>> >> agrees with some of the comments from James. Here is his review:
>>>>>> >> http://www.ietf.org/mail-archive/web/oauth/current/msg15426.html
>>>>>> >> 
>>>>>> >> Justin is certainly the reviewer with the strongest opinion. Here is 
>>>>>> >> one of his posts:
>>>>>> >> http://www.ietf.org/mail-archive/web/oauth/current/msg15457.html
>>>>>> >> 
>>>>>> >> Among all concerns Justin expressed the following one is actually 
>>>>>> >> actionable IMHO: Justin is worried that reporting how a person 
>>>>>> >> authenticated to an authorization endpoint and encouraging people to 
>>>>>> >> use OAuth for authentication is a fine line. He believes that this 
>>>>>> >> document leads readers to believe the latter.
>>>>>> >> 
>>>>>> >> John agrees with Justin in
>>>>>> >> http://www.ietf.org/mail-archive/web/oauth/current/msg15448.html that 
>>>>>> >> we need to make sure that people are not mislead about the intention 
>>>>>> >> of the document. John also provides additional comments in this post 
>>>>>> >> to the
>>>>>> >> list: http://www.ietf.org/mail-archive/web/oauth/current/msg15441.html
>>>>>> >> Most of them require more than just editing work. For example, 
>>>>>> >> methods listed are really not useful,
>>>>>> >> 
>>>>>> >> Phil agrees with the document adoption but has some remarks about the 
>>>>>> >> registry although he does not propose specific text. His review is 
>>>>>> >> here:
>>>>>> >> http://www.ietf.org/mail-archive/web/oauth/current/msg15462.html
>>>>>> >> 
>>>>>> >> With my co-chair hat on: I just wanted to clarify that registering 
>>>>>> >> claims (and values within those claims) is within the scope of the 
>>>>>> >> OAuth working group. We standardized the JWT in this group and we are 
>>>>>> >> also chartered to standardize claims, as we are currently doing with 
>>>>>> >> various drafts. Not standardizing JWT in the IETF would have lead to 
>>>>>> >> reduced interoperability and less security. I have no doubts that was 
>>>>>> >> a wrong decision.
>>>>>> >> 
>>>>>> >> In its current form, there is not enough support to have this 
>>>>>> >> document as a WG item.
>>>>>> >> 
>>>>>> >> We believe that the document authors should address some of the 
>>>>>> >> easier comments and submit a new version. This would allow us to 
>>>>>> >> reach out to those who had expressed concerns about the scope of the 
>>>>>> >> document to re-evaluate their decision. A new draft version should at 
>>>>>> >> least address the following issues:
>>>>>> >> 
>>>>>> >> * Clarify that this document is not an                                
>>>>>> >>                  encouragement for using OAuth as an authentication 
>>>>>> >> protocol. I believe that this would address some of the concerns 
>>>>>> >> raised by Justin and John.
>>>>>> >> 
>>>>>> >> * Change the registry policy, which would address one of the comments 
>>>>>> >> from James, William, and Phil.
>>>>>> >> 
>>>>>> >> Various other items require discussion since they are more difficult 
>>>>>> >> to address. For example, John noted that he does not like the use of 
>>>>>> >> request parameters. Unfortunately, no alternative is offered. I urge 
>>>>>> >> John to provide an alternative proposal, if there is one. Also, the 
>>>>>> >> remark that the values are meaningless could be countered with an 
>>>>>> >> alternative proposal. James wanted to remove the "amr_values" 
>>>>>> >> parameter.
>>>>>> >> Is this what others want as well?
>>>>>> >> 
>>>>>> >> After these items have been addressed we believe that more folks in 
>>>>>> >> the group will support the document.
>>>>>> >> 
>>>>>> >> Ciao
>>>>>> >> Hannes & Derek
>>>>>> >> 
>>>>>> >> 
>>>>>> >> 
>>>>>> >> _______________________________________________
>>>>>> >> OAuth mailing list
>>>>>> >> OAuth@ietf.org
>>>>>> >> https://www.ietf.org/mailman/listinfo/oauth
>>>>>> > 
>>>>>> > _______________________________________________
>>>>>> > OAuth mailing list
>>>>>> > OAuth@ietf.org
>>>>>> > https://www.ietf.org/mailman/listinfo/oauth
>>>>>> 
>>>>>> — Roland
>>>>>> 
>>>>>> ”Everybody should be quiet near a little stream and listen."
>>>>>> >From ’Open House for Butterflies’ by Ruth Krauss
>>>>>> 
>>>>>> 
>>>>>> _______________________________________________
>>>>>> OAuth mailing list
>>>>>> OAuth@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>> 
>>>>>> _______________________________________________
>>>>>> OAuth mailing list
>>>>>> OAuth@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>> 
>>>>>> _______________________________________________
>>>>>> OAuth mailing list
>>>>>> OAuth@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>> 
>>>> 
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>> 
>>> 
>>> 
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to