+1.  This is more in line with the alternate proposal submitted previously - 
and probably expressed better. :)
  https://tools.ietf.org/html/draft-hunt-oauth-bound-config-00


Phil

@independentid
www.independentid.com <http://www.independentid.com/>phil.h...@oracle.com 
<mailto:phil.h...@oracle.com>





> On Aug 17, 2016, at 9:07 AM, Nat Sakimura <sakim...@gmail.com> wrote:
> 
> From a security protocols design point of view, it is a good practice to 
> indicate what entity in what role are going to be involved in what sequence. 
> So, including a resource indicator in the authorization request is good - if 
> it does not stop there and it is possible at all. 
> Resource indicator needs to support the notion of the group identifier and 
> allowed processing on them (combined, it sometimes is called `scope`) as 
> well. 
> 
> Then, there is a problem of authorization request / response not tamper 
> protected nor source authenticated. To be really useful, it also has to be 
> addressed.
> 
> Nat
> 
> 
> 2016年8月5日(金) 5:13 John Bradley <ve7...@ve7jtb.com <mailto:ve7...@ve7jtb.com>>:
> This was proposed 
> https://tools.ietf.org/html/draft-campbell-oauth-resource-indicators-01 
> <https://tools.ietf.org/html/draft-campbell-oauth-resource-indicators-01>
> 
> It seemed to be a bit too controversial for the WG to accept at the time it 
> was discussed.
> 
> John B.
> 
>> On Aug 4, 2016, at 6:33 AM, Vladimir Dzhuvinov <vladi...@connect2id.com 
>> <mailto:vladi...@connect2id.com>> wrote:
>> 
>> Thanks Mike for the updates.
>> 
>> These two specs (along with token exchange and perhaps others) effectively 
>> codify "resource" as a key OAuth 2.0 property and parameter, alongside 
>> "scope". RFC 6749 however only specifies "scope" in authz and token requests.
>> 
>> Have there been any thoughts how to reconcile this?
>> 
>> Vladimir
>> 
>> On 03/08/16 23:57, Mike Jones wrote:
>>> The existing OAuth 2.0 Authorization Server 
>>> Metadata<https://tools.ietf.org/html/draft-ietf-oauth-discovery> 
>>> <https://tools.ietf.org/html/draft-ietf-oauth-discovery> specification has 
>>> now been joined by a related OAuth 2.0 Protected Resource 
>>> Metadata<https://tools.ietf.org/html/draft-jones-oauth-resource-metadata> 
>>> <https://tools.ietf.org/html/draft-jones-oauth-resource-metadata> 
>>> specification.  This means that JSON metadata formats are now defined for 
>>> all the OAuth 2.0 parties: clients, authorization servers, and protected 
>>> resources.
>>> 
>>> The most significant addition to the OAuth 2.0 Authorization Server 
>>> Metadata specification is enabling signed metadata, represented as claims 
>>> in a JSON Web Token (JWT).  This is analogous to the role that the Software 
>>> Statement plays in OAuth Dynamic Client Registration.  Signed metadata can 
>>> also be used for protected resource metadata.
>>> 
>>> For use cases in which the set of protected resources used with an 
>>> authorization server are enumerable, the authorization server metadata 
>>> specification now defines the "protected_resources" metadata value to list 
>>> them.  Likewise, the protected resource metadata specification defines an 
>>> "authorization_servers" metadata value to list the authorization servers 
>>> that can be used with a protected resource, for use cases in which those 
>>> are enumerable.
>>> 
>>> The specifications are available at:
>>> 
>>> *       http://tools.ietf.org/html/draft-ietf-oauth-discovery-04 
>>> <http://tools.ietf.org/html/draft-ietf-oauth-discovery-04>
>>> 
>>> *       http://tools.ietf.org/html/draft-jones-oauth-resource-metadata-00 
>>> <http://tools.ietf.org/html/draft-jones-oauth-resource-metadata-00>
>>> 
>>> HTML-formatted versions are also available at:
>>> 
>>> *       http://self-issued.info/docs/draft-ietf-oauth-discovery-04.html 
>>> <http://self-issued.info/docs/draft-ietf-oauth-discovery-04.html>
>>> 
>>> *       
>>> http://self-issued.info/docs/draft-jones-oauth-resource-metadata-00.html 
>>> <http://self-issued.info/docs/draft-jones-oauth-resource-metadata-00.html>
>>> 
>>>                                                        -- Mike
>>> 
>>> P.S.  This notice was also posted at http://self-issued.info/?p=1591 
>>> <http://self-issued.info/?p=1591> and as 
>>> @selfissued<https://twitter.com/selfissued> 
>>> <https://twitter.com/selfissued>.
>>> 
>>> 
>>> 
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>>> https://www.ietf.org/mailman/listinfo/oauth 
>>> <https://www.ietf.org/mailman/listinfo/oauth>
>> 
>> -- 
>> Vladimir Dzhuvinov
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>> https://www.ietf.org/mailman/listinfo/oauth 
>> <https://www.ietf.org/mailman/listinfo/oauth>
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org <mailto:OAuth@ietf.org>
> https://www.ietf.org/mailman/listinfo/oauth 
> <https://www.ietf.org/mailman/listinfo/oauth>
> -- 
> Nat Sakimura
> 
> Chairman of the Board, OpenID Foundation
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to