From an OAuth perspective, there isn’t much here - I can’t log into GitHub or 
stack overflow with OAuth, I need extensions such as those provided by OpenID 
Connect (or something more bespoke in Github’s case).

From a general standards perspective, this would be more implementation 
guidance for relying parties who want to support multiple authentication 
mechanisms. In this case, a relying party should not register a new third-party 
authentication provider against a user account without authenticated user 
consent - unless it is being done as part of an account creation process itself.

Or to put it more simply - outside of streamlining account creation, these 
third-party authentication providers are just authentication mechanisms chosen 
by the user - you have no basis of trust to accept any other attributes/claims 
given, and trust the assertion of authentication solely because _your_ user has 
indicated it is how they want to be able to log in.

For a more trusted setup, such as a first-party authentication system or second 
party (such as the authentication system chosen by a SaaS tenant), you can rely 
on this sort of data quite a bit more. For example, an authentication assertion 
might be sufficient to provision an entirely new user account in a SaaS 
on-demand.

This sort of implementation is fairly common, and means that I can authenticate 
into the service whether the email accounts are the same or different (or if 
the authentication provider withholds email address altogether). My impression 
was that stack overflow already acted according to this hypothetical guidance.

> Anyone read this topic or could tell if there is a better place to adress 
> this?


OpenID Connect might be an  appropriate place for additional relying party 
guidance. The broader issue is that someone implementing a bespoke system like 
GitHub or Facebook integration is not going to look to OpenID Connect for 
implementation guidance.

-DW




> On Aug 9, 2023, at 2:05 PM, mfulz <mf...@olznet.de> wrote:
> 
> 
> Sent from Nine <http://www.9folders.com/>
> Von: mfulz
> Gesendet: Sonntag, 16. Juli 2023 03:38
> An: oauth@ietf.org
> Betreff: [OAUTH-WG] OAuth Trust model
> 
> 
> 
> Hi Together,
> 
> I was thinking about some (at least I see it in that way) problem in the 
> whole oauth/openid design:
> 
> The problem is the following:
> 
> The user has no control about what providers are accepted by the clients 
> (websites, etc.) and this opens access to these providers without any way to 
> protect against that.
> 
> Example:
> 
> I've created an account with email/password login at stackoverflow
> 
> I've created an account with the same email at github
> 
> -> logged out from stackoverflow
> 
> -> logged in via github oauth -> working and connected to the email/pw 
> account from stackoverflow
> 
> 
> 
> Stackoverflow has the possibility to remove the github login now, but the 
> main problem is, that I would be out of control, that some of these oauth 
> providers
> 
> (please don't go into the discussion WHY they or anyone should do it) could 
> access my accounts, when such site would allow them as provider.
> 
> 
> 
> In my opionion it would be good to avoid such issues, by including something 
> in the standard, that the user MUST allow the connection on both sides on the 
> client
> 
> and on the provider.
> 
> 
> 
> Yes for sso without any existing account that's some kind of an issue, but 
> still it could be added some verification process like sending confirmation 
> link
> 
> That the user is accepting the oauth provider on the Client side.
> 
> Then the oauth provider would also need access to my emails to access my 
> account.
> 
> 
> 
> Not sure if I'm wrong here but I think my description is correct.
> 
> 
> 
> BR,
> 
> Matthias
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to