Hi Ludwig.  You're right that AS Metadata doesn't cover RS Metadata.  I stand 
corrected on that point.  There was once an OAuth Resource Metadata draft but 
the working group didn't have immediate use cases for it and so it was allowed 
to expire.  Work on it can resume, if it would be useful.

I'm glad that "profile" is now optional in ACE.  I still believe that dynamic 
configurations where clients might use multiple OAuth profiles are a corner 
case and that purpose-built clients that have the profile information baked 
into the code will be the norm (particularly in constrained environments).  I'm 
fine with an independent OAuth specification being created that defines a 
profile identifier but I believe that conflating this with OAuth PoP Key 
Distribution would be a mistake.

                                -- Mike

-----Original Message-----
From: OAuth <oauth-boun...@ietf.org> On Behalf Of Ludwig Seitz
Sent: Tuesday, July 3, 2018 11:37 PM
To: oauth@ietf.org
Subject: Re: [OAUTH-WG] PoP Key Distribution

On 2018-07-03 22:10, Mike Jones wrote:

> 
> I believe that the ACE "profile" parameter is typically unnecessary 
> and not in the spirit of normal OAuth.  Configuration information 
> between OAuth participants is typically configured out of band and/or 
> retrieved from the AS Discovery document (per the newly minted RFC 
> 8414 <https://tools.ietf.org/html/rfc8414>). There's no need to 
> dynamically exchange a profile identifier when this is essentially 
> always known in advance.  We should not include "profile".  For that 
> matter, ACE should delete it as well, as it certainly isn't 
> appropriate in constrained environments.
>

I strongly disagree with this statement. First of all let me correct a 
misconception you seem to have: RFC 8414 is about AS metadata, while "profile" 
is RS metadata, so unless I've overlooked something, RFC 8414 is not applicable.
The "profile" parameter tells a client which communication security method to 
use with the RS (e.g. TLS) and how to perform the proof-of-possession of a 
token towards an RS (e.g. TLS client authentication).
When you take the work on proof-of-possession into account, that feels very 
much in the spirit of OAuth.

Second: the "profile" parameter is optional, so if it is already known because 
it was configured out of band or discovered somehow you just don't send it.

Finally: Profile is intended for use cases were mobile clients and RS 
dynamically join and leave a network, so that pre-configuring clients with 
metadata about the RS is difficult. Do you have a better idea how to solve 
these cases?


/Ludwig

--
Ludwig Seitz, PhD
Security Lab, RISE SICS
Phone +46(0)70-349 92 51

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to