Agreed.
> On 20 Feb 2019, at 23:09, John Bradley <ve7...@ve7jtb.com> wrote: > > I agree. > > If someone really wants separate meta-data nothing stops them from having a > separate AS with its own meta-data. > > John B. > >> On 2/20/2019 7:04 PM, Torsten Lodderstedt wrote: >> +1 for defining an optional mtls endpoints section >> >> I first leaned towards a second metadata file, mainly due to the potential >> token endpoint authentication method issue. But adding a secondary metadata >> configuration just for this purpose seems a bit over engineered and would >> take a lot of normative language to get it right. Just as an example: does >> the second configuration overload or replace the primary one? On the other >> hand, any client using looking for mtls based token endpoint authentication >> methods must be aware of the potential mtls endpoints section. So I think >> their is no real issue. >> >> Am 20.02.2019 um 17:59 schrieb Filip Skokan <panva....@gmail.com>: >> >>> +1, great summary >>> >>> Odesláno z iPhonu >>> >>> 20. 2. 2019 v 16:10, Brian Campbell >>> <bcampbell=40pingidentity....@dmarc.ietf..org>: >>> >>>> The objective is to allow the AS to provide MTLS negotiating endpoints on >>>> a different host and/or port so that any non-desirable side effects of >>>> requesting client certificates during the TLS handshake can be avoided for >>>> 'regular' clients that are not doing >>>> any MTLS. >>>> >>>> In all likelihood, I'd expect that any pair of MTLS and regular endpoints >>>> have the same application logic behind them. And that just the TLS setup >>>> that differs to accommodate the aforementioned objective. That means that >>>> they'd support the same client authentication methods but the MTLS >>>> endpoint would just be set up so as to get MTLS to work. When first >>>> considering it, that seemed a bit overreaching for the spec to come out >>>> and say and more of a deployment thing for the AS. But maybe being more >>>> prescriptive would reduce some of the professed problematic ambiguity. As >>>> mentioned in a previous message, referring to the mtls endpoints as >>>> aliases might be useful in indicating that they are the same endpoint that >>>> is just known and accessed differently based on the context of use. >>>> >>>> I'll grant that some of the wording in RFC 8414 can be awkward with >>>> respect to this kind of extension. Calling it a violation is a bit over >>>> the top though. And as much as we might try to write specs that are the >>>> final word, there's the realities of how usage and understanding unfold in >>>> practice. As one example, there's some discussion of the treatment of some >>>> of the metadata in this section of a blog post about a different spec >>>> being developed >>>> https://medium.com/@darutk/ciba-a-new-authentication-authorization-technology-in-2019-explained-by-an-implementer-d1e0ac1311b4#8a00.. >>>> Maybe that's in violation of RFC 8414 or RFC 7591. Or maybe it's being >>>> pragmatic in the given circumstances. I suppose opinions will differ. >>>> >>>> It turns out that writing these specifications is >>>> kinda hard. Even when people share the same objective (and >>>> that's often not even the case), opinions can differ about what actually >>>> constitutes simplicity. It seems that's where we are now. >>>> >>>> My stance as an individual is that the mtls_endpoints (or >>>> mtls_endpoint_aliases) approach is reasonable and pragmatic and the most >>>> straightforward and simple of the options put forth (i.e.. vs a metadata >>>> parameter linking to or well-known locations to completely separate >>>> metadata documents). As an editor, I acknowledge that there's been >>>> disagreement about it while also noting again that the dissenting voices >>>> come from a vocal minority of a few individuals. >>>> >>>> >>>> >>>> >>>>> On Mon, Feb 18, 2019 at 2:55 PM Richard Backman, Annabelle >>>>> <richanna=40amazon....@dmarc.ietf.org> wrote: >>>>> Neil’s example demonstrates how the mtls_endpoints approach leads to >>>>> confusion. Consider the following metadata fragment: >>>>> >>>>> >>>>> >>>>> { >>>>> >>>>> “token_endpoint”: “https://as.example..com/token”, >>>>> >>>>> “token_endpoint_auth_methods_supported”: [ “client_secret_basic”, >>>>> “tls_client_auth” ], >>>>> >>>>> “mtls_endpoints”: { >>>>> >>>>> “token_endpoint”: “https://as.example.com/mtls/token” >>>>> >>>>> } >>>>> >>>>> } >>>>> >>>>> >>>>> >>>>> Which of these statements about endpoints on https://as.example.com/ are >>>>> true? >>>>> >>>>> The /token endpoint only supports client_secret_basic, and /mtls/token >>>>> only supports tls_client_auth. >>>>> The /token endpoint supports both methods, and /mtls/token only supports >>>>> tls_client_auth. >>>>> Both /token and /mtls/token support both methods. >>>>> >>>>> >>>>> All of these could be reasonable interpretations of this metadata. When >>>>> properties mean different things in different contexts, ambiguity abounds. >>>>> >>>>> >>>>> >>>>> -- >>>>> >>>>> Annabelle Richard Backman >>>>> >>>>> AWS Identity >>>>> >>>>> >>>>> >>>>> >>>> >>>> CONFIDENTIALITY NOTICE: This email may contain confidential and privileged >>>> material for the sole use of the intended >>>> recipient(s). Any review, use, distribution or disclosure by others is >>>> strictly prohibited.. If you have received this communication in error, >>>> please notify the sender immediately by e-mail and delete the message and >>>> any file attachments from your computer. Thank you. >>>> _______________________________________________ >>>> OAuth mailing list >>>> OAuth@ietf.org >>>> https://www.ietf.org/mailman/listinfo/oauth >>> _______________________________________________ >>> OAuth mailing list >>> OAuth@ietf.org >>> https://www.ietf.org/mailman/listinfo/oauth >> >> >> _______________________________________________ >> OAuth mailing list >> OAuth@ietf.org >> https://www.ietf.org/mailman/listinfo/oauth > _______________________________________________ > OAuth mailing list > OAuth@ietf.org > https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth