resource service X could be any http accessible service:

* CRM
* Finance
* Payroll
* ERP
* any application on the web.

The spec seems to suggest that we use /.well-known/crm to discover OAuth config 
for crm.  But that may cause conflict if crm has its own discovery. Which leads 
us down the path of doing something like “crm-oauth”.

Then there is confusion about what host the discovery is done on.

For example, hypothetically do I do:

GET /.well-known/crm
Host: example.com

But what about the CRM’s configuration information. Is this stomping on it?

Or, what If we put the oauth configuration at the host for the crm service:
GET /.well-known/openid-configuration
Host: crm.example.com

I think the point is that there is a relationship between a protected resource 
and its designated OAuth service. 

The client needs to discover:
* Where is its designated resource service and what security does it use
* If it is OAuth, where is the intended OAuth configuration for that resource 
service instance?

Phil

@independentid
www.independentid.com <http://www.independentid.com/>phil.h...@oracle.com 
<mailto:phil.h...@oracle.com>





> On Feb 18, 2016, at 7:19 AM, John Bradley <ve7...@ve7jtb.com> wrote:
> 
> Can you clarify what you mean by “resource service x”?
> 
> Is that the RS base URI for the resource,  a specific URI that the client is 
> requesting?
> 
> That is getting UMA ish. 
> 
> The concept of a base RS URI is a rat hole that I prefer not to go down, as 
> it is something everyone thinks exists but like SCIM if it exists it is 
> protocol or deployment specific.
> 
> The notion that you would send the URI you are planning on requesting to a 
> Webfinger server to find the OAuth server, is probably going to have privacy 
> issues.
> 
> I suspect that you need to hand back a error from the resource to say where 
> the AS is, or have a .well-known for the RS.
> 
> RS discovery probably wants to be separate from AS discovery.  (Yes I do 
> think we need something,  UMA rpt or something like it might be a way to go)
> 
> John B.
> 
>> On Feb 18, 2016, at 9:06 AM, Phil Hunt <phil.h...@oracle.com 
>> <mailto:phil.h...@oracle.com>> wrote:
>> 
>> Maybe SCIM was a bad example.  It functions as a RESTful resource in the 
>> context of OAuth.
>> 
>> I find the use of OIDC to be confusing as an example (and the default) 
>> because it is both an OAuth resource and a security service.  It is a 
>> modification of OAuth.
>> 
>> Start thinking about every application ever written that uses OAuth. Are we 
>> expecting 100s of thousands of these to each register?
>> 
>> To me, this specification is a fine specification for OIDC and it should be 
>> published there because the specification defines how to discovery OAuth and 
>> OpenID information.
>> 
>> Likewise you suggest it is ok for SCIM to do the same. 
>> 
>> How do we expect normal applications to set up and do discovery?
>> 
>> It seems to me that an “OAUTH” discovery spec should have a parameter to 
>> ask, I want to discover OAuth configuration for resource service X.
>> 
>> That still allows me to have a separate discovery service that says, tell me 
>> about resource service X itself.
>> 
>> BTW. I think we are FAR from Last Call on this topic.
>> 
>> Phil
>> 
>> @independentid
>> www.independentid.com <http://www.independentid.com/>phil.h...@oracle.com 
>> <mailto:phil.h...@oracle.com>
>> 
>> 
>> 
>> 
>> 
>>> On Feb 18, 2016, at 6:55 AM, John Bradley <ve7...@ve7jtb.com 
>>> <mailto:ve7...@ve7jtb.com>> wrote:
>>> 
>>> Diffrent protocols like Connect and SCIM may have different configurations, 
>>> endpoints , keys , authentication methods, scopes etc.
>>> 
>>> It should be posable to have them as one document, but forcing them to use 
>>> one document is going to cause a explosion of claim registration for 
>>> discovery.
>>> 
>>> I think it is better for SCIM to register one well known than to have to 
>>> register 20 claims with scim prefixes or something silly like that.
>>> 
>>> Name-spacing the claims by allowing them to be in different well known 
>>> files is not unreasonable.
>>> 
>>> Remember some of these protocols may be hosted on SaaS so there is no 
>>> guarantee that all protocols will have the same OAuth Config.
>>> 
>>> Nothing stops a protocol from doing what it likes with webfinger if it 
>>> wants to use that for discovery.
>>> 
>>> In principal I like the idea of having another protocol as an example.
>>> 
>>> My only concern is that I haven’t seen any discussion of your SCIM 
>>> discovery document in the SCIM WG.  
>>> I personally think sorting out discovery for SCIM is a good idea,  but 
>>> OAUTh is but one of several authentication methods for SCIM, and there are 
>>> probably other non OAuth things that want to be described.
>>> 
>>> I would feel better about using it as an example if it were adopted by the 
>>> WG and some general interest shown.
>>> 
>>> I encourage you to do that so we can use it as a example.
>>> 
>>> John B.
>>> 
>>>> On Feb 18, 2016, at 8:35 AM, Phil Hunt <phil.h...@oracle.com 
>>>> <mailto:phil.h...@oracle.com>> wrote:
>>>> 
>>>> I still find the following text objectionable and confusing…
>>>>    By default, for historical reasons, unless an application-specific
>>>>    well-known URI path suffix is registered and used for an application,
>>>>    the client for that application SHOULD use the well-known URI path
>>>>    suffix "openid-configuration" and publish the metadata document at
>>>>    the path formed by concatenating "/.well-known/openid-configuration"
>>>>    to the authorization server's issuer identifier.  As described in
>>>>    Section 5 
>>>> <http://tools.ietf.org/html/draft-ietf-oauth-discovery-01#section-5>, 
>>>> despite the identifier
>>>>    "/.well-known/openid-configuration", appearing to be OpenID-specific,
>>>>    its usage in this specification is actually referring to a general
>>>>    OAuth 2.0 feature that is not specific to OpenID Connect.
>>>> 
>>>> Further, as a default “openid-configuration” as the default further gives 
>>>> people the impression that a plain OAuth server *is* an authentication 
>>>> server and that the normal access token received is evidence of a 
>>>> successful authentication.
>>>> 
>>>> It would be better to point out that application may include oauth 
>>>> discovery in their discovery URI and that OAuth is an example of this. It 
>>>> might be good to include two examples.  E.g. OIDC and SCIM (as another 
>>>> referenceable example).
>>>> 
>>>>  GET /.well-known/openid-configuration
>>>> and
>>>>  GET /.well-known/scim
>>>> Retrieve the OAuth configuration for the application openid and scim 
>>>> respectively.
>>>> 
>>>> The use of:
>>>>  GET /.well-known/oauth2/
>>>> Should be the default used when there is no known application based 
>>>> well-known application based URI discovery.
>>>> 
>>>> Of course, the concern I raised earlier is that this approach of 
>>>> application specific URIs ends up requiring every application to make an 
>>>> IANA registration if they don’t want to use the default of “oauth2” (or 
>>>> “openid-configuration”).  Is that what the authors expect?
>>>> 
>>>> It seemed better to me to use the webfinger syntax to allow the client to 
>>>> say “I want the designated OAuth configuration for the resource service X” 
>>>> would be a better design that avoids extensive IANA registration.
>>>> 
>>>> Phil
>>>> 
>>>> @independentid
>>>> www.independentid.com <http://www.independentid.com/>phil.h...@oracle.com 
>>>> <mailto:phil.h...@oracle.com>
>>>> 
>>>> 
>>>> 
>>>> 
>>>> 
>>>>> On Feb 17, 2016, at 11:48 PM, Mike Jones <michael.jo...@microsoft.com 
>>>>> <mailto:michael.jo...@microsoft.com>> wrote:
>>>>> 
>>>>> In response to working group input, this version of the OAuth Discovery 
>>>>> specification has been pared down to its essence – leaving only the 
>>>>> features that are already widely deployed.  Specifically, all that 
>>>>> remains is the definition of the authorization server discovery metadata 
>>>>> document and the metadata values used in it.  The WebFinger discovery 
>>>>> logic has been removed.  The relationship between the issuer identifier 
>>>>> URL and the well-known URI path relative to it at which the discovery 
>>>>> metadata document is located has also been clarified.
>>>>>  
>>>>> Given that this now describes only features that are in widespread 
>>>>> deployment, the editors believe that this version is ready for working 
>>>>> group last call.
>>>>>  
>>>>> The specification is available at:
>>>>> ·       http://tools.ietf.org/html/draft-ietf-oauth-discovery-01 
>>>>> <http://tools.ietf.org/html/draft-ietf-oauth-discovery-01>
>>>>>  
>>>>> An HTML-formatted version is also available at:
>>>>> ·       http://self-issued.info/docs/draft-ietf-oauth-discovery-01.html 
>>>>> <http://self-issued.info/docs/draft-ietf-oauth-discovery-01.html>
>>>>>  
>>>>>                                                           -- Mike & Nat & 
>>>>> John
>>>>>  
>>>>> P.S.  This notice was also posted at http://self-issued.info/?p=1544 
>>>>> <http://self-issued.info/?p=1544> and as @selfissued 
>>>>> <https://twitter.com/selfissued>.
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>>> https://www.ietf.org/mailman/listinfo/oauth 
>>>>> <https://www.ietf.org/mailman/listinfo/oauth>
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>> https://www.ietf.org/mailman/listinfo/oauth 
>>>> <https://www.ietf.org/mailman/listinfo/oauth>
>>> 
>> 
> 

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to