Then the sentence should not open extension points even for confidential 
clients,
- by mention OIDC notice explicitly
- by allowing currently existing alternatives only (and prohibit new ones)
etc.

iPadから送信

> 2020/05/15 8:36、Aaron Parecki <aa...@parecki.com>のメール:
> 
> 
>> There is no specific mechanism right now.
>> But future developers won’t be able to read the reason why the extension 
>> point is given only for confidential clients.
> 
> This is not a compelling argument.
> 
> The current situation is that we know of a handful of threats and attacks, we 
> know that PKCE solves them for both confidential and public clients, and we 
> also believe that OpenID Connect has solved one of the threats for 
> confidential clients a different way. The reason this conversation is 
> happening at all is because we want to make sure that OpenID Connect can 
> continue to solve that problem its own way outside of OAuth without 
> conflicting with OAuth..
> 
> It's not useful to anyone to leave extension points open for hypothetical 
> solutions later when we already know of a solution that works for public 
> clients. At that point that should just be a new spec.
> 
> Aaron Parecki
> 
> 
>> On Thu, May 14, 2020 at 3:18 AM Nov Matake <mat...@gmail.com> wrote:
>> There is no specific mechanism right now.
>> But future developers won’t be able to read the reason why the extension 
>> point is given only for confidential clients.
>> 
>> > On May 14, 2020, at 18:32, Torsten Lodderstedt <tors...@lodderstedt.net> 
>> > wrote:
>> > 
>> > Are you aware of any suitable mechanism? I’m asking since from my 
>> > perspective this clause is mainly intended to allow existing OpenID 
>> > Connect deployments to use nonce instead of PKCE in combination with OAuth 
>> > 2.1. It’s a compromise. I think we should not encourage others to invent 
>> > their own OAuth security mechanisms. 
>> > 
>> 
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to