I didn't see the earlier discussion (do you have a date or title?) so
apologies if I'm bringing up something that's been resolved.  But I still
think that it's really confusing to say "it
may be a better decision to avoid using OAuth entirely"  if the application
will still be using Oauth/OIDC (which will, of course, involve a browser
flow).

ors...@lodderstedt.net <tors...@lodderstedt.net>  has raised the same (or
similar?) objection in a parallel thread.  I suggest we continue the
conversation there.

- Leo


On Mon, Jul 22, 2019 at 1:09 PM Hans Zandbelt <hans.zandb...@zmartzone.eu>
wrote:

> +1, as discussed before
>
> Hans.
>
> On Mon, Jul 22, 2019, 18:25 Brock Allen <brockal...@gmail.com> wrote:
>
>> I think the implication is that the server-side would use something like
>> OIDC to the token server in order to establish the identity of the user.
>> The difference is that this would be driven from the server-side piece of
>> the application, as any other normal server-side client would. The result
>> would then simply be a cookie-based authentication session in the client,
>> and any JS code would leverage the http only, same-site cookie for Ajax
>> calls.
>>
>> -Brock
>>
>> On 7/21/2019 10:22:38 PM, Leo Tohill <leotoh...@gmail.com> wrote:
>> The advice for the architectural pattern "JavaScript served from a common
>> domain as the resource server"  reads:
>>
>> "For simple system architectures, such as when the JavaScript application
>> is served
>> from a domain that can share cookies with the domain of the API (resource
>> server), it
>> may be a better decision to avoid using OAuth entirely, and instead use
>> session
>> authentication to communicate directly with the API."
>>
>> I can agree that session authentication could be best here, but how was
>> the user authenticated in order to create the trusted session?  Wouldn't
>> that/shouldn't that still use an oauth flow to collect credentials?
>>
>> We need to be clear on the distinction between browser based apps that
>> hold the token(s) in the browser space, vs. those that don't.  I agree that
>> with this
>> "common domain" architecture, the tokens should not be held in the
>> browser, but it doesn't follow that oauth should not be used at all.
>>
>> Leo
>>
>>
>> _______________________________________________ OAuth mailing list
>> OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to