Yes. This was my worry. 

Unless the oauth server is also an OIDC OP, it has no notion the user login 
state. That state is held in cookies belonging to a federated provider. 

The notion that javascript acting as a client and depends to the user login 
state is what sets these cases apart.  We have to be able to co-ordinate 
between resource api, AS authorization which builds off of some form of 
federation/sso. 

Phil

> On Dec 8, 2018, at 6:51 PM, Brock Allen <brockal...@gmail.com> wrote:
> 
> > How would the token endpoint detect login status of the user?
> 
> Oddball idea: why not use the cookie? If the assumption is that the RT is 
> being used from a client-side browser-based app, and CORS allows for 
> credentials, then perhaps this is a way to bind the RT to the user's browser 
> session.. The spec does say that alternative credentials are allowed at the 
> token endpoint...
> 
> Sounds icky, but compared to iframes back to the authorize endpoint?
> 
> -Brock
> 
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to