Hello,

Depending on what is meant by “scenario to be supported from the authorization 
server (platform) itself and not in the client app or resource server”, it may 
be it difficult (or impossible) to achieve.
In the end, the resource server only applies token lifetime policy *if it 
decides to do so*, whatever the AS kindly asked him to do

--
Bertrand CARLIER


De : OAuth [mailto:oauth-boun...@ietf.org] De la part de John Bradley
Envoyé : mardi 25 juillet 2017 18:03
À : Bill Burke <bbu...@redhat.com>
Cc : oauth@ietf.org
Objet : Re: [OAUTH-WG] Short lived access token and no refresh token

Max-age has to do with user re-auth in connect.

Some AS only give refresh tokens if a scope of offline_acess or some such 
special scope is requested.
There is no standard scope for that.

I don’t know of any way for the client to control the lifetime of the access 
token other than by revoking it with the AS.
https://tools.ietf.org/html/rfc7009

Depending on the AS you should be able to control the AT lifetime on a per 
client basis.

John B.

On Jul 25, 2017, at 11:37 AM, Bill Burke 
<bbu...@redhat.com<mailto:bbu...@redhat.com>> wrote:

For browser apps, implicit flow provides an access token but no refresh token.  
For non-browser apps only client credentials grant doesn't supply a refresh 
token.  As for token access times, I believe only extensions to OAuth define 
those types of capabilities.  i.e. OpenID Connect defines a "max-age" claim 
that you can pass when requesting a token.

On 7/25/17 10:48 AM, Saurav Sarkar wrote:
Hi All,

We have a scenario where one of our stakeholder wants to mandatorily initiate 
the authentication at certain point of time.

As per https://www.oauth.com/oauth2-servers/access-tokens/access-token-lifetime/
there can be an option where access token is set for certain time and refresh 
token is not set. So we want to explore this option for this scenario.

I have couple of questions regarding this

(a) Is this  option part of OAuth 2 specification ? If yes can you please point 
me to the exact IETF link ?

(b) Is there any other way our scenario can be achieved ? We want this scenario 
to be supported from the authorization server (platform) itself and not in the 
client app or resource server.

Thanks and Best Regards,
Saurav




_______________________________________________

OAuth mailing list

OAuth@ietf.org<mailto:OAuth@ietf.org>

https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth

The information transmitted in the present email including the attachment is 
intended only for the person to whom or entity to which it is addressed and may 
contain confidential and/or privileged material. Any review, retransmission, 
dissemination or other use of, or taking of any action in reliance upon this 
information by persons or entities other than the intended recipient is 
prohibited. If you received this in error, please contact the sender and delete 
all copies of the material.

Ce message et toutes les pièces qui y sont éventuellement jointes sont 
confidentiels et transmis à l'intention exclusive de son destinataire. Toute 
modification, édition, utilisation ou diffusion par toute personne ou entité 
autre que le destinataire est interdite. Si vous avez reçu ce message par 
erreur, nous vous remercions de nous en informer immédiatement et de le 
supprimer ainsi que les pièces qui y sont éventuellement jointes.
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to