Le mar. 10 juil. 2018 21:55, Andres Torres <jant...@gmail.com> a écrit :

>    If the issuer identifier value contains a path component, any
>    terminating "/" MUST be removed before inserting "/.well-known/" and
>    the well-known URI suffix between the host component and the path
>    component.
>
>
> Just as clarification then, this section does not require that path
> components not related to the issuer should be removed from the URI:
> ex:
> https://example.com/{application-identifier}/.wellknown/oauth-authorization-server/{issuer}
>
> Is that correct?
>
> The language in this section suggests that the url path should start in
> every case with /.well-known, which would not allow to have URIs like the
> one in the example above, ie: {application-identifier} and 
> /.wellknown/oauth-authorization-server
> should always be at the root of the host
>


This is how it is defined in https://tools.ietf.org/html/rfc5785



>
> ~AT
>
> On Tue, Jul 10, 2018 at 2:39 PM, David Waite <da...@alkaline-solutions.com
> > wrote:
>
>>
>>
>> On Jul 10, 2018, at 12:19 PM, Andres Torres <jant...@gmail.com> wrote:
>>
>>
>> In terms of API design the final result is confusing. The resource
>> /.well-known/oauth-authorization-server becomes a collection of
>> resources where issuer is a subresource.. However,
>> /.well-known/oauth-authorization-server should be a subresource of the
>> issuer/tenant. It is my understanding that .well-known is a prefix for
>> known resources in a given service. Multiple instances of a service (ie:
>> tenants) can be hosted using the same hostname in the form
>> {issuer|tenant-identifier}/.well-known/{known-resource}. This way a
>> proper resource hierarchy can be maintained in the URI namespace
>> and heterogeneous services can be deployed under the same hostname.
>>
>>
>> This is/was actually how it was done within OpenID Connect. However, the
>> only structured URL components allowed within IETF specifications are
>> underneath a /.well-known root. Since a multi-tenant application may have a
>> different issuer per tenant all within one origin, this transformation was
>> created such that each can have their own metadata.
>>
>> Another option would have been to have the issuer URL be the discovery
>> URL, but this would require an issuer of https://example.com to modify
>> the root of their service to respond to requests for metadata (such as in
>> response to the requirements of an Accepts header).
>>
>> A third option might be to define an ‘issuer’ parameter and behavior on
>> the metadata endpoint, such that servers which host only one issuer could
>> ignore it, but a server with multiple issuers could require and act on this
>> parameter.
>>
>> -DW
>>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to