Hi Dick,

I too reviewed the document, and had similar questions in mind.
I agree with Torsten, a figure would make it easier to follow and
understand.

Regards,
 Rifaat


On Tue, Jul 17, 2018 at 12:01 PM Dick Hardt <dick.ha...@gmail.com> wrote:

> Thanks for the review Torsten. All good points to be clarified in the doc..
> Responses inserted ...
>
> On Tue, Jul 17, 2018 at 11:22 AM, Torsten Lodderstedt <
> tors...@lodderstedt.net> wrote:
>
>> Hi Dick,
>>
>> I gave you draft a read and came up with the following questions:
>>
>> Section 2: How does Party A know it is supposed to conduct a reciprocal
>> OAuth flow if Party B does not indicate so in the authorization response?
>>
>
> Out of band configuration. Will clarify in next version.
>
>
>>
>> Section 3
>>
>> Party A is supposed to call the token endpoint of Party B using an
>> authorization code generated by Party A. How does Party B interpret this
>> code? Or does it just send this code back to Party A to obtain its access
>> token for A?
>>
>
> Yes, per last sentence in Section 3. What language would clarify that?
>
>
>>
>> Party B uses the access token issued to Party A in the first part of the
>> flow (ordinary OAuth code flow) to identify the respective user account
>> with Party B. Since the AS consumes its access token as an RS, does Party A
>> need to include a certain scope in the code flow request in order to enable
>> this part of the flow?
>>
>
> Party A is using its own access token for context. Party B is not
> accessing the user context / account.
>
>
>>
>> How is the AS of Party B supposed to determine the token endpoint of
>> Party A’s AS?
>>
>
> Same as Party A learns Party B's token endpoint.
>
> In practice, the flow could be started by either party. Both can initiate
> and complete. I'll clarify in the next version.
>
>
>>
>> I think a figure of the overall process would help to understand the
>> concept.
>>
>
> It is pretty much the same as OAuth with one extra flow. I can add if that
> would help.
>
>
>>
>> kind regards,
>> Torsten.
>>
>> > Am 24.05.2018 um 22:28 schrieb internet-dra...@ietf.org:
>> >
>> >
>> > A New Internet-Draft is available from the on-line Internet-Drafts
>> directories.
>> > This draft is a work item of the Web Authorization Protocol WG of the
>> IETF.
>> >
>> >        Title           : Reciprocal OAuth
>> >        Author          : Dick Hardt
>> >       Filename        : draft-ietf-oauth-reciprocal-00.txt
>> >       Pages           : 4
>> >       Date            : 2018-05-24
>> >
>> > Abstract:
>> >   There are times when a user has a pair of protected resources that
>> >   would like to request access to each other.  While OAuth flows
>> >   typically enable the user to grant a client access to a protected
>> >   resource, granting the inverse access requires an additional flow.
>> >   Reciprocal OAuth enables a more seamless experience for the user to
>> >   grant access to a pair of protected resources.
>> >
>> >
>> > The IETF datatracker status page for this draft is:
>> > https://datatracker.ietf.org/doc/draft-ietf-oauth-reciprocal/
>> >
>> > There are also htmlized versions available at:
>> > https://tools.ietf.org/html/draft-ietf-oauth-reciprocal-00
>> > https://datatracker.ietf.org/doc/html/draft-ietf-oauth-reciprocal-00
>> >
>> >
>> > Please note that it may take a couple of minutes from the time of
>> submission
>> > until the htmlized version and diff are available at tools.ietf.org.
>> >
>> > Internet-Drafts are also available by anonymous FTP at:
>> > ftp://ftp.ietf.org/internet-drafts/
>> >
>> > _______________________________________________
>> > OAuth mailing list
>> > OAuth@ietf.org
>> > https://www.ietf.org/mailman/listinfo/oauth
>>
>>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to