+1

Phil

> On Feb 15, 2016, at 16:50, John Bradley <ve7...@ve7jtb.com> wrote:
> 
> The question is what counts as re-authentication.  
> 
> It may be that the environment is changing.  Re-prompting for a password in 
> many cased just tells you the user has a form filler.
> 
> It may be better to use risk based factors such as prompting for a pin, or 
> using a local passive biometric, eg has the phone got screen lock and is it 
> in proximity to the persons smart watch etc.   
> 
> What google seems to be doing is using the amr to say how they did the last 
> authentication and leave it up to the client to decide if it is good enough.
> 
> Simple always ask for a password may no longer provide the security that most 
> people think it is giving.
> 
> Looking at what enterprise customers are asking for, they are becoming more 
> concerned with checking the MDM posture of the device at authentication.
> 
> This is a larger conversation about authentication context and methods.
> 
> The establishment of the amr registry will provide a place to document a part 
> of this, however authentication context (there is already a registry) and amr 
> values themselves are probably out of scope for this WG.
> 
> John B.
> 
> 
>> On Feb 15, 2016, at 8:22 PM, Jim Manico <j...@manicode.com> wrote:
>> 
>> Polite comment, Google in general is pretty "open" about session management 
>> in general - long idle timeout and no apparent absolute timeout. For a bank 
>> or other organization that produces high risk software, this is not standard 
>> practice. Re-authentication is a critical security boundary, not prompting 
>> the user for re-authentication credentials is unacceptable in those 
>> environments.
>> 
>> I may be jumping in out of context, but fair?
>> 
>> --
>> Jim Manico
>> @Manicode
>> +1 (808) 652-3805
>> 
>>> On Feb 15, 2016, at 3:36 PM, William Denniss <wdenn...@google.com> wrote:
>>> 
>>> We return 'amr' claims in ID Tokens if "max_age" is requested (per OpenID 
>>> Connect), e.g.:
>>> 
>>> https://accounts.google.com/o/oauth2/auth?redirect_uri=https%3A%2F%2Fdevelopers.google.com%2Foauthplayground&response_type=code&client_id=407408718192.apps.googleusercontent.com&scope=openid+profile&approval_prompt=force&access_type=offline&max_age=1
>>> 
>>> The reason we do this is to be explicit about how we are processing the 
>>> "max_age" reauth request, specifically that we don't always prompt the user 
>>> to reauthenticate directly (but do perform in-session risk analysis).
>>> 
>>> I can see us potentially using the more generic amr values like "user", and 
>>> "mfa" but we will probably avoid very specific ones like "sms" or "otp" to 
>>> avoid brittle relationships with RPs. That said, I don't object to those 
>>> being in the registry, perhaps there is value in some tightly coupled 
>>> enterprise configurations.
>>> 
>>> 
>>>> On Sun, Feb 14, 2016 at 5:30 AM, Torsten Lodderstedt 
>>>> <tors...@lodderstedt.net> wrote:
>>>> Hi Denniss,
>>>> 
>>>> out of curiosity: Does Google use amr values? 
>>>> 
>>>> best regards,
>>>> Torsten.
>>>> 
>>>> 
>>>>> Am 14.02.2016 um 02:40 schrieb William Denniss:
>>>>> 
>>>>> 
>>>>>> On Sat, Feb 13, 2016 at 12:19 PM, Mike Jones 
>>>>>> <michael.jo...@microsoft.com> wrote:
>>>>>> It's an acceptable fallback option if the working group decides it 
>>>>>> doesn't want to register the values that are already in production use 
>>>>>> at the time we establish the registry. But add William points out, 
>>>>>> Google is already using some of these values. Microsoft is using some of 
>>>>>> them. The OpenID MODRNA specs are using some of them. So it seems more 
>>>>>> efficient to register them at the same time.
>>>>>> 
>>>>>> That would be my preference.
>>>>> 
>>>>> +1, it is also my preference to register the current values.
>>>>> 
>>>>> I don't see any harm in the spec that establishes the registry also 
>>>>> seeding it with all known values in use at the time of drafting, 
>>>>> regardless of the group that originally specified them. Makes the 
>>>>> original spec more useful, and avoids the need to submit each value for 
>>>>> consideration separately – they can be all be reviewed at the same time. 
>>>>> 
>>>>> 
>>>>>> From: Justin Richer
>>>>>> Sent: ‎2/‎13/‎2016 11:11 AM
>>>>>> To: Phil Hunt
>>>>>> 
>>>>>> Cc: <oauth@ietf.org>
>>>>>> Subject: Re: [OAUTH-WG] Authentication Method Reference Values: Call for 
>>>>>> Adoption Finalized
>>>>>> 
>>>>>> Can we just do that, then? Seems to be the easiest way to address 
>>>>>> various needs and concerns. 
>>>>>> 
>>>>>>  — Justin
>>>>>> 
>>>>>>> On Feb 13, 2016, at 11:08 AM, Phil Hunt (IDM) <phil.h...@oracle.com> 
>>>>>>> wrote:
>>>>>>> 
>>>>>>> Yes
>>>>>>> 
>>>>>>> Phil
>>>>>>> 
>>>>>>> On Feb 13, 2016, at 07:59, "tors...@lodderstedt.net" 
>>>>>>> <tors...@lodderstedt.net> wrote:
>>>>>>> 
>>>>>>>> So basically, the RFC could also just establish the new registry and 
>>>>>>>> oidf could feel in the values?
>>>>>>>> 
>>>>>>>> (just trying to understand)
>>>>>>>> 
>>>>>>>> 
>>>>>>>> 
>>>>>>>> -------- Originalnachricht --------
>>>>>>>> Betreff: RE: [OAUTH-WG] Authentication Method Reference Values: Call 
>>>>>>>> for Adoption Finalized
>>>>>>>> Von: Mike Jones <michael.jo...@microsoft.com>
>>>>>>>> An: tors...@lodderstedt.net,John Bradley <ve7...@ve7jtb.com>
>>>>>>>> Cc: oauth@ietf.org
>>>>>>>> 
>>>>>>>> The context that most people on this thread probably don’t have is 
>>>>>>>> that an IANA registry can only be established by an RFC.  Non-RFC 
>>>>>>>> specifications, such as OpenID specifications, can *register* values 
>>>>>>>> in a registry, but they cannot *establish* a registry.  The OpenID 
>>>>>>>> Foundation inquired about this with the IETF before OpenID Connect was 
>>>>>>>> finalized and learned that its specifications could not establish IANA 
>>>>>>>> registries.  Otherwise, they would have.
>>>>>>>> 
>>>>>>>>  
>>>>>>>> Instead, RFCs need to be created to establish registries – even for 
>>>>>>>> values first defined in non-RFC specifications.  This specification is 
>>>>>>>> one example of doing this.
>>>>>>>> 
>>>>>>>>  
>>>>>>>>                                                                        
>>>>>>>>                              -- Mike
>>>>>>>> 
>>>>>>>>  
>>>>>>>> 
>>>>>>>> From: OAuth [mailto:oauth-boun...@ietf.org] On Behalf Of 
>>>>>>>> tors...@lodderstedt.net
>>>>>>>> Sent: Saturday, February 13, 2016 6:37 AM
>>>>>>>> To: John Bradley <ve7...@ve7jtb.com>
>>>>>>>> Cc: oauth@ietf.org
>>>>>>>> Subject: Re: [OAUTH-WG] Authentication Method Reference Values: Call 
>>>>>>>> for Adoption Finalized
>>>>>>>> 
>>>>>>>>  
>>>>>>>> We clearly have this problem between oauth and oidc. Just take a look 
>>>>>>>> at the discovery thread.
>>>>>>>> 
>>>>>>>> According to you argument I see two options:
>>>>>>>> (1) amr stays an oidc claim, is used in oidc only and the oauth wg 
>>>>>>>> just publishes the registry entries. In this case, the spec should 
>>>>>>>> clearly explain this.
>>>>>>>> (2) amr is of any use in oauth (although it has been invented in oidc) 
>>>>>>>> - than define it and motivate it's use in oauth in this spec.
>>>>>>>> 
>>>>>>>> Right now, I think it creates the impression oauth is for 
>>>>>>>> authentication.
>>>>>>>> 
>>>>>>>> 
>>>>>>>> 
>>>>>>>> -------- Originalnachricht --------
>>>>>>>> Betreff: Re: [OAUTH-WG] Authentication Method Reference Values: Call 
>>>>>>>> for Adoption Finalized
>>>>>>>> Von: John Bradley <ve7...@ve7jtb.com>
>>>>>>>> An: tors...@lodderstedt.net
>>>>>>>> Cc: roland.hedb...@umu.se,oauth@ietf.org
>>>>>>>> 
>>>>>>>> This is not a issue between oauth and OIDC.
>>>>>>>> 
>>>>>>>>  
>>>>>>>> This has to do with the registry for JWT being in OAuth.   Many 
>>>>>>>> protocols that use JWT are going to want to register claims.  
>>>>>>>> 
>>>>>>>> We can’t ask them to all move the parts of there specs that use JWT to 
>>>>>>>> OAuth.
>>>>>>>> 
>>>>>>>>  
>>>>>>>> Perhaps JWT should have been part of JOSE, but that is water under the 
>>>>>>>> bridge.  
>>>>>>>> 
>>>>>>>>  
>>>>>>>> The OAuth WG is responsible for JWT and it’s registry, and we will 
>>>>>>>> need to deal with registering claims.  
>>>>>>>> 
>>>>>>>>  
>>>>>>>> I guess that we can tell people that they need to publish the specs 
>>>>>>>> defining the claims someplace else, and just do the registry part.
>>>>>>>> 
>>>>>>>> However doing that will probably not improve interoperability and 
>>>>>>>> understanding.
>>>>>>>> 
>>>>>>>>  
>>>>>>>> This document defines the claim for JWT in general.  We still have 
>>>>>>>> almost no documentation in the WG about what a JWT access token would 
>>>>>>>> contain other than the POP work.
>>>>>>>> 
>>>>>>>>  
>>>>>>>> John B.
>>>>>>>> 
>>>>>>>> On Feb 13, 2016, at 9:18 AM, tors...@lodderstedt.net wrote:
>>>>>>>> 
>>>>>>>>  
>>>>>>>> I basically support adoption of this document. Asserting 
>>>>>>>> authentication methods in access tokens (in this case in JWTS format) 
>>>>>>>> is reasonable. We use it to pass information about the authentication 
>>>>>>>> performed prior issuing an access token to the _resource_ server.
>>>>>>>> 
>>>>>>>> What worries me is the back and forth between oauth and oidc. The amr 
>>>>>>>> claim is defined in oidc (which sits on top of oauth) but the oauth wg 
>>>>>>>> specifies the registry? Moreover, the current text does not give a 
>>>>>>>> rationale for using amr in context of oauth.
>>>>>>>> 
>>>>>>>> As a WG we need to find a clear delineation                            
>>>>>>>>                      between both protocols, otherwise noone will 
>>>>>>>> really understand the difference and when to                           
>>>>>>>>                       use what. We create confusion!
>>>>>>>> 
>>>>>>>> For this particular draft                                              
>>>>>>>>    this means to either move amr to oauth or the registry to oidc.
>>>>>>>> 
>>>>>>>> best regards, 
>>>>>>>> Torsten.
>>>>>>>> 
>>>>>>>> 
>>>>>>>> 
>>>>>>>> -------- Ursprüngliche                                                 
>>>>>>>> Nachricht --------
>>>>>>>> Von: Roland Hedberg <roland.hedb...@umu.se>
>>>>>>>> Gesendet: Friday, February 12, 2016 05:45 PM
>>>>>>>> An: oauth@ietf.org
>>>>>>>> Betreff: Re: [OAUTH-WG] Authentication Method Reference Values: Call 
>>>>>>>> for Adoption Finalized
>>>>>>>> 
>>>>>>>> +1
>>>>>>>> 
>>>>>>>> > 12 feb 2016 kl. 16:58 skrev John Bradley <ve7...@ve7jtb.com>:
>>>>>>>> > 
>>>>>>>> > +1 to adopt this draft.
>>>>>>>> > 
>>>>>>>> >> On Feb 12, 2016, at 3:07 AM, Mike Jones 
>>>>>>>> >> <michael.jo...@microsoft.com> wrote:
>>>>>>>> >> 
>>>>>>>> >> Draft -05 incorporates the feedback described below - deleting the 
>>>>>>>> >> request parameter, noting that this spec isn't an encouragement to 
>>>>>>>> >> use                                                 OAuth 2.0 for 
>>>>>>>> >> authentication without employing appropriate                        
>>>>>>>> >>                          extensions, and no longer requiring a 
>>>>>>>> >> specification for IANA registration.  I believe that it’s now ready 
>>>>>>>> >> for working group adoption.
>>>>>>>> >> 
>>>>>>>> >>                                                                     
>>>>>>>> >>                                       -- Mike
>>>>>>>> >> 
>>>>>>>> >> -----Original Message-----
>>>>>>>> >> From: OAuth [mailto:oauth-boun...@ietf.org] On Behalf Of Hannes 
>>>>>>>> >> Tschofenig
>>>>>>>> >> Sent: Thursday, February 4, 2016 11:23 AM
>>>>>>>> >> To: oauth@ietf.org
>>>>>>>> >> Subject: [OAUTH-WG] Authentication Method Reference Values: Call 
>>>>>>>> >> for Adoption Finalized
>>>>>>>> >> 
>>>>>>>> >> Hi all,
>>>>>>>> >> 
>>>>>>>> >> On January 19th I posted a call for adoption of the Authentication 
>>>>>>>> >> Method                                                 Reference 
>>>>>>>> >> Values specification, see 
>>>>>>>> >> http://www.ietf.org/mail-archive/web/oauth/current/msg15402.html
>>>>>>>> >> 
>>>>>>>> >> What surprised us is that this work is conceptually very simple: we 
>>>>>>>> >> define new claims and create a registry with new values. Not a big 
>>>>>>>> >> deal but that's not what the                                        
>>>>>>>> >>          feedback from the Yokohama IETF meeting and the subsequent 
>>>>>>>> >> call for adoption on the list shows. The feedback lead to mixed 
>>>>>>>> >> feelings and it is a bit difficult for Derek and myself to judge 
>>>>>>>> >> consensus.
>>>>>>>> >> 
>>>>>>>> >> Let me tell you what we see from the comments on the list.
>>>>>>>> >> 
>>>>>>>> >> In his review at
>>>>>>>> >> http://www.ietf.org/mail-archive/web/oauth/current/msg15423.html 
>>>>>>>> >> James Manger asks for significant changes. Among other things, he 
>>>>>>>> >> wants to remove one of the claims. He provides a detailed review 
>>>>>>>> >> and actionable items.
>>>>>>>> >> 
>>>>>>>> >> William Denniss believes the document is ready for adoption but 
>>>>>>>> >> agrees with some of the comments from James. Here is his review:
>>>>>>>> >> http://www.ietf.org/mail-archive/web/oauth/current/msg15426.html
>>>>>>>> >> 
>>>>>>>> >> Justin is certainly the reviewer with the strongest opinion. Here 
>>>>>>>> >> is one of his posts:
>>>>>>>> >> http://www.ietf.org/mail-archive/web/oauth/current/msg15457.html
>>>>>>>> >> 
>>>>>>>> >> Among all concerns Justin expressed the following one is actually 
>>>>>>>> >> actionable IMHO: Justin is worried that reporting how a person 
>>>>>>>> >> authenticated to an authorization endpoint                          
>>>>>>>> >>                        and encouraging people to use OAuth for 
>>>>>>>> >> authentication is a fine line. He believes that this document leads 
>>>>>>>> >> readers to believe the latter.
>>>>>>>> >> 
>>>>>>>> >> John agrees with Justin in
>>>>>>>> >> http://www.ietf.org/mail-archive/web/oauth/current/msg15448.html 
>>>>>>>> >> that we need to make sure that people are not mislead about the 
>>>>>>>> >> intention of the document. John also provides additional comments 
>>>>>>>> >> in this post to the
>>>>>>>> >> list: 
>>>>>>>> >> http://www.ietf.org/mail-archive/web/oauth/current/msg15441.html
>>>>>>>> >> Most of them require more than just editing work. For example, 
>>>>>>>> >> methods listed are really not useful,
>>>>>>>> >> 
>>>>>>>> >> Phil agrees with the document adoption but has some remarks about 
>>>>>>>> >> the registry although he does not propose specific text. His review 
>>>>>>>> >> is here:
>>>>>>>> >> http://www.ietf.org/mail-archive/web/oauth/current/msg15462.html
>>>>>>>> >> 
>>>>>>>> >> With my co-chair hat on: I just wanted to clarify that registering 
>>>>>>>> >> claims (and values within those claims) is within the scope of the 
>>>>>>>> >> OAuth working group. We standardized the JWT in this group and we 
>>>>>>>> >> are also chartered to standardize claims, as we are currently doing 
>>>>>>>> >> with various drafts. Not standardizing JWT in the IETF would have 
>>>>>>>> >> lead to reduced interoperability and less security. I have no 
>>>>>>>> >> doubts that was a wrong decision.
>>>>>>>> >> 
>>>>>>>> >> In its current form, there is not enough support to have this 
>>>>>>>> >> document as a WG item.
>>>>>>>> >> 
>>>>>>>> >> We believe that the document authors should address some of the 
>>>>>>>> >> easier comments and submit a new version. This would allow us to 
>>>>>>>> >> reach out to those who had expressed concerns about the scope of 
>>>>>>>> >> the document to re-evaluate their decision. A new draft version 
>>>>>>>> >> should at least address the following issues:
>>>>>>>> >> 
>>>>>>>> >> * Clarify that this document is not an encouragement for using 
>>>>>>>> >> OAuth as an authentication protocol. I believe that this would 
>>>>>>>> >> address some of the concerns raised by Justin and John.
>>>>>>>> >> 
>>>>>>>> >> * Change the registry policy, which would address one of the 
>>>>>>>> >> comments from James, William, and Phil.
>>>>>>>> >> 
>>>>>>>> >> Various other items require discussion since they are more 
>>>>>>>> >> difficult to address. For example, John noted that he does not like 
>>>>>>>> >> the use of request parameters. Unfortunately, no alternative is 
>>>>>>>> >> offered. I urge John to provide an alternative proposal, if there 
>>>>>>>> >> is one. Also, the remark that the values are meaningless could be 
>>>>>>>> >> countered with an alternative proposal. James wanted to remove the 
>>>>>>>> >> "amr_values" parameter.
>>>>>>>> >> Is this what others want as well?
>>>>>>>> >> 
>>>>>>>> >> After these items have been addressed we believe that more folks in 
>>>>>>>> >> the group will support the document.
>>>>>>>> >> 
>>>>>>>> >> Ciao
>>>>>>>> >> Hannes & Derek
>>>>>>>> >> 
>>>>>>>> >> 
>>>>>>>> >> 
>>>>>>>> >> _______________________________________________
>>>>>>>> >> OAuth mailing list
>>>>>>>> >> OAuth@ietf.org
>>>>>>>> >> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>>> > 
>>>>>>>> > _______________________________________________
>>>>>>>> > OAuth mailing list
>>>>>>>> > OAuth@ietf.org
>>>>>>>> > https://www.ietf.org/mailman/listinfo/oauth
>>>>>>>> 
>>>>>>>> — Roland
>>>>>>>> 
>>>>>>>> ”Everybody should be quiet near a little stream and listen."
>>>>>>>> >From ’Open House for Butterflies’ by Ruth Krauss
>>>>>>>> 
>>>>>>>> 
>>>>>>>> _______________________________________________
>>>>>>>> OAuth mailing list
>>>>>>>> OAuth@ietf.org
>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>>> 
>>>>>>>> _______________________________________________
>>>>>>>> OAuth mailing list
>>>>>>>> OAuth@ietf.org
>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>>> 
>>>>>>>> _______________________________________________
>>>>>>>> OAuth mailing list
>>>>>>>> OAuth@ietf.org
>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>> _______________________________________________
>>>>>>> OAuth mailing list
>>>>>>> OAuth@ietf.org
>>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>> 
>>>>>> 
>>>>>> _______________________________________________
>>>>>> OAuth mailing list
>>>>>> OAuth@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>> 
>>>>> 
>>>>> 
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>> 
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
> 
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to