>From a security protocols design point of view, it is a good practice to
indicate what entity in what role are going to be involved in what
sequence. So, including a resource indicator in the authorization request
is good - if it does not stop there and it is possible at all.
Resource indicator needs to support the notion of the group identifier and
allowed processing on them (combined, it sometimes is called `scope`) as
well.

Then, there is a problem of authorization request / response not tamper
protected nor source authenticated. To be really useful, it also has to be
addressed.

Nat

2016年8月5日(金) 5:13 John Bradley <ve7...@ve7jtb.com>:

> This was proposed
> https://tools.ietf.org/html/draft-campbell-oauth-resource-indicators-01
>
> It seemed to be a bit too controversial for the WG to accept at the time
> it was discussed.
>
> John B.
>
> On Aug 4, 2016, at 6:33 AM, Vladimir Dzhuvinov <vladi...@connect2id.com>
> wrote:
>
> Thanks Mike for the updates.
>
> These two specs (along with token exchange and perhaps others) effectively
> codify "resource" as a key OAuth 2.0 property and parameter, alongside
> "scope". RFC 6749 however only specifies "scope" in authz and token
> requests.
>
> Have there been any thoughts how to reconcile this?
>
> Vladimir
>
>
> On 03/08/16 23:57, Mike Jones wrote:
>
> The existing OAuth 2.0 Authorization Server 
> Metadata<https://tools.ietf.org/html/draft-ietf-oauth-discovery> 
> <https://tools.ietf.org/html/draft-ietf-oauth-discovery> specification has 
> now been joined by a related OAuth 2.0 Protected Resource 
> Metadata<https://tools.ietf.org/html/draft-jones-oauth-resource-metadata> 
> <https://tools.ietf.org/html/draft-jones-oauth-resource-metadata> 
> specification.  This means that JSON metadata formats are now defined for all 
> the OAuth 2.0 parties: clients, authorization servers, and protected 
> resources.
>
> The most significant addition to the OAuth 2.0 Authorization Server Metadata 
> specification is enabling signed metadata, represented as claims in a JSON 
> Web Token (JWT).  This is analogous to the role that the Software Statement 
> plays in OAuth Dynamic Client Registration.  Signed metadata can also be used 
> for protected resource metadata.
>
> For use cases in which the set of protected resources used with an 
> authorization server are enumerable, the authorization server metadata 
> specification now defines the "protected_resources" metadata value to list 
> them.  Likewise, the protected resource metadata specification defines an 
> "authorization_servers" metadata value to list the authorization servers that 
> can be used with a protected resource, for use cases in which those are 
> enumerable.
>
> The specifications are available at:
>
> *       http://tools.ietf.org/html/draft-ietf-oauth-discovery-04
>
> *       http://tools.ietf.org/html/draft-jones-oauth-resource-metadata-00
>
> HTML-formatted versions are also available at:
>
> *       http://self-issued.info/docs/draft-ietf-oauth-discovery-04.html
>
> *       
> http://self-issued.info/docs/draft-jones-oauth-resource-metadata-00.html
>
>                                                        -- Mike
>
> P.S.  This notice was also posted at http://self-issued.info/?p=1591 and as 
> @selfissued<https://twitter.com/selfissued> <https://twitter.com/selfissued>.
>
>
>
>
> _______________________________________________
> OAuth mailing listOAuth@ietf.orghttps://www.ietf.org/mailman/listinfo/oauth
>
>
> --
> Vladimir Dzhuvinov
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
-- 

Nat Sakimura

Chairman of the Board, OpenID Foundation
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to