Hi all,
I'm still looking for answers to these two questions
<https://mailarchive.ietf.org/arch/msg/oauth/NLj-xnAZ4BtFs9z62OzCro4xxoc/>
regarding the OPRM draft that was recently adopted by the WG:

   1. If I have a resource server that has multiple endpoints, each of
   which require different scopes, how should those be handled? For example,
   in the SSF spec, the SSF Transmitter has a Create Stream endpoint and a
   Polling endpoint. The scopes required for these are different. How would
   the client know which scope is to be used with which endpoint?
   2. Does the spec encourage insecure behavior in the caller by requesting
   tokens with scopes that they do not understand? I.e. If an authorization
   server is known to provide valuable tokens with certain scopes, can a
   malicious resource server trick the client into requesting a more powerful
   token, which it then uses to access some other service? Since the consent
   dialog is likely to show two trusted names (i.e. the requesting client and
   the authorization server), the user would be prone to providing consent,
   even if the scope looks unnecessarily permissive.

Thanks,
Atul
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to