Hi Nat, > Am 16.11.2018 um 10:12 schrieb n-sakimura <n-sakim...@nri.co.jp>: > > Good points. > > > > Also, while it may be off-topic, I do see values in implicit flows. In some > cases, such as when the AS is inside the firewall or on a localhost (e.g., > smartphone), “code flow” is not possible as the client cannot reach the AS > directly.
are you saying the browser can send the HTTP GET to the authorization endpoint but the JS in the browser cannot send the HTTP POST to the token endpoint? > Banning implicit (and thus “token id_token” as well) has this repercussion First of all we are not banning anything. The OAuth WG does no longer recommend to use the implicit for very good reasons, which can be found here https://xml2rfc.tools.ietf.org/cgi-bin/xml2rfc.cgi#rfc.section.2.1.2 I would appreciate your comments. > and I would not agree to it. As you were always on the „make it secure“ side, I’m a bit surprised. kind regards, Torsten. > > > > Best, > > > > Nat Sakimura > > > > From: OAuth <oauth-boun...@ietf.org> On Behalf Of Brock Allen > Sent: Friday, November 16, 2018 7:01 AM > To: Torsten Lodderstedt <tors...@lodderstedt.net> > Cc: oauth@ietf.org > Subject: Re: [OAUTH-WG] draft-parecki-oauth-browser-based-apps-00 > > > > > It still lacks the ability to issue sender constraint access tokens. > > > > So you mean at the resource server ensuring the token was really issued to > the client? Isn't that an inherent limitation of all bearer tokens (modulo > HTTP token binding, which is still some time off)? Resource servers don't > know the flow the clients might use, especially if/when they have many > clients. > > > > > The AS can bind the lifetime of the refresh tokens to the session lifetime, > > i.e. automatically revoke it on logout. > > > > Yea, I saw your other email asking about refresh token revocation relating to > session management. Obviously for certain clients, this won't make sense, but > for implicit/browser-based ones it's a nice feature to have. > > > > The alternative, as you mentioned, is to not issue refresh tokens and do > token renewal the "same old way" via iframe with prompt=none, while still > using code flow. > > > > > The only potential „baby step“ I would see is to move towards „token > > id_token“. Since this requires signature/at_hash checks etc. I doubt this > > is really easier than moving to code and exchange the code for an access > > token. What’s your opinion? > > > > Even since OIDC arrived, this is the only flow I use for JS/browser-based > clients (anything less has always seemed so obviously inferior). So for me > and my customers, all browser-based clients I am involved in are already > there. Perhaps this is the reason for all of my questions/comments about the > recent BCP doc. Given "id_token token", CSP, and using the browser history > API to wipe the access token from browser history, we already have a decent > set of tools to mitigate attacks. As I already conceded, the only remaining > issue (IMO) is the short window of time the access token is in the URL. > > > > Given that it seems to me that OIDC and OAuth2 are typically used together > (at least when a user is involved with authentication), I always wonder why > the OAuth and OIDC WGs are separate. Given that so much effort of the two > sets of specs overlap, it seems odd to keep adding onto the OAuth specs and > ignoring the added features that OIDC provides. I don't mean to derail this > thread, or step on any political toes, so apologies in advance. > > > > > > -Brock > > >
smime.p7s
Description: S/MIME cryptographic signature
_______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth