the scope and way of generating sub/client_id is orthogonal to the
semantics IMHO but if I'm the only one who thinks so, I'll rest my case

Hans.

On Mon, May 6, 2019 at 10:49 PM Vittorio Bertocci <vitto...@auth0.com>
wrote:

> See below, Hans- the sub doesn’t have to be global, it could be something
> generated just for this particular RS. Or the AS might have its own recipe
> for generating sub values that different from the recipe used to generate
> client_ids. It would be much easier for an AS to emit a claim making this
> explicit statement than to change sub and client_id assignment logic.
>
> On Mon, May 6, 2019 at 13:49 Hans Zandbelt <hans.zandb...@zmartzone.eu>
> wrote:
>
>> I may be missing something but I'd argue that by requiring and comparing
>> both "sub" and "client_id" we achieve the same semantics without a
>> new/additional claim (barring name spacing)
>>
>> Hans.
>>
>> On Mon, May 6, 2019 at 8:58 PM Karl McGuinness <kmcguinness=
>> 40okta....@dmarc.ietf.org> wrote:
>>
>>> Makes sense that we don’t want to further couple AS and RS with grant
>>> types.  I’m OK if we want a dedicated claim to establish whether the token
>>> is resource owner delegated  vs client acting as itself.
>>>
>>> Subject Type is already a concept in RISC.  Just making folks are aware
>>> of prior art.
>>>
>>> https://openid.net/specs/oauth-event-types-1_0-01.html#rfc.section.2.2
>>> https://openid.net/specs/openid-risc-profile-1_0.html#rfc.section.2.1
>>>
>>> -Karl
>>>
>>> On May 6, 2019, at 12:42 PM, Vittorio Bertocci <
>>> Vittorio=40auth0....@dmarc.ietf.org> wrote:
>>>
>>> *This message originated outside your organization.*
>>> ------------------------------
>>> Fair enough! What others think about it?
>>> Exploring the approach: would we want a bool claim or an enumeration,
>>> e.g. sub_type = [ resource_owner | client ] ?
>>>
>>>
>>> On Mon, May 6, 2019 at 12:35 PM Vladimir Dzhuvinov <
>>> vladi...@connect2id.com> wrote:
>>>
>>>> Hi Vittorio,
>>>>
>>>> On 06/05/2019 22:22, Vittorio Bertocci wrote:
>>>> > It is true that the grant_type is a client side consideration. I did
>>>> think
>>>> > about the "client_id==sub" heuristic, but that's not always
>>>> applicable:
>>>> > many systems have their own rules for generating sub, and in case
>>>> they want
>>>> > to prevent tracking across RSes the sub might be generated ad-hoc for
>>>> that
>>>> > particular RS.
>>>> > Would you prefer to have a dedicated claim that distinguish between
>>>> user
>>>> > and app tokens rather than reusing grant_type?
>>>>
>>>> A dedicated claim to flag client_id effectively == sub would be
>>>> preferable, and much easier for RS developers to process.
>>>>
>>>> The AS is the authority and has all the knowledge to set / indicate
>>>> this.
>>>>
>>>> I want to keep RS developers away from having to deal with grant types
>>>> and having to make decisions whether client_id effectively == sub.
>>>>
>>>> Vladimir
>>>>
>>>>
>>>> > On Mon, May 6, 2019 at 12:16 PM Vladimir Dzhuvinov <
>>>> vladi...@connect2id.com>
>>>> > wrote:
>>>> >
>>>> >> On 06/05/2019 20:32, Vittorio Bertocci wrote:
>>>> >>> To that end, *Karl MCGuinness suggested that we include
>>>> >>> grant_type as a return claim, which the RS could use to the same
>>>> >> effect*. I
>>>> >>> find the proposal very clever, and the people at IIW thought so as
>>>> well.
>>>> >>> What you think?
>>>> >> The grant type is not something that the RS is really concerned
>>>> with, or
>>>> >> should be. Introducing this parameter in the access token will
>>>> create an
>>>> >> additional logical dependency, plus complexity - in the system of
>>>> >> client, AS and RS as a whole, as well as for RS developers. The grant
>>>> >> type, as a concept, is a matter between the client and AS, and IMO
>>>> >> should stay that way.
>>>> >>
>>>> >> Clear language in the spec should suffice. For instance: "If the sub
>>>> >> value matches the client_id value, then the subject is the client
>>>> >> application".
>>>> >>
>>>> >> Vladimir
>>>> >>
>>>> >> --
>>>> >> Vladimir Dzhuvinov
>>>> >>
>>>> >>
>>>> >> _______________________________________________
>>>> >> OAuth mailing list
>>>> >> OAuth@ietf.org
>>>> >> https://www.ietf.org/mailman/listinfo/oauth
>>>> >>
>>>> --
>>>> Vladimir Dzhuvinov
>>>>
>>>>
>>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>>
>>>
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>>>
>>
>> --
>> hans.zandb...@zmartzone.eu
>> ZmartZone IAM - www.zmartzone.eu
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
>

-- 
hans.zandb...@zmartzone.eu
ZmartZone IAM - www.zmartzone.eu
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to