All,

Based on the responses received on the mailing list, we believe that there
is enough support for this document to become a WG document.


Authors,

Feel free to submit a -00 version at your convenience.

Regards,
 Rifaat & Hannes




On Tue, Sep 17, 2024 at 4:55 AM Vladimir Dzhuvinov / Connect2id <
vladi...@connect2id.com> wrote:

> Hi Pieter,
>
> Thanks for your responses. I'm writing to state my support for the
> adoption of this draft.
>
> I'm starting to see it as a meaningful evolution of the deprecated
> password grant. I read the arguments to stay focused on the browser-based
> code flow. Browser APIs have evolved over the course of OAuth 2.0, but the
> reality is that devs and architects do not see them as ideal in all
> situations and the password grant is still being used and considered. This
> improved sped for 1st party apps should make it easier to have solutions
> that are standard and interoperable.
>
> About the auth techniques, I would like to ask you and the other authors
> working on the spec to consider defining parameters for the ones that are
> most likely to see use in practice, in the coming years. I'm asking you
> this because my past experience with profiles is that when they do appear,
> it may be too late. The JWT profile for access tokens - RFC 9068 - comes to
> mind. It was published 9 years after the bearer token RFC.
>
> Cheers,
>
> Vladimir
>
>
> On 16/09/2024 16:40, Pieter Kasselman wrote:
>
> Hi Vladimir
>
>
>
> Thanks for reading the draft and raising questions. See responses inline.
>
>
>
> Cheers
>
>
>
> Pieter
>
>
>
> *From:* Vladimir Dzhuvinov / Connect2id <vladi...@connect2id.com>
> <vladi...@connect2id.com>
> *Sent:* Friday 13 September 2024 07:50
> *To:* oauth@ietf.org
> *Subject:* [OAUTH-WG] Re: Call for adoption - First Party Apps
>
>
>
> I read the proposed spec and it's evident substantial work has gone into
> it. Congratulations for this.
>
> How does the 1st party flow compare to the (deprecated in OAuth 2.1)
> password grant? People with existing 1st party apps that rely on the
> password grant or consider using it are going to look for a discussion on
> this.
>
> <pk>
>
> The first party flow is meant to provide a framework to allow for multiple
> authentication factors to enable MFA type scenarios where there is a first
> party trust relationship between the application gathering the credentials
> and the authorization server. It provides a pathway from single factor
> authentication methods to stronger MFA and ultimately phishing resistant
> authentication methods.
>
> </pk>
>
>
>
> In terms of security properties (leaving aside the design to support
> factors other than user password and the support for interaction), does it
> offer advantages? In the simple case (no interaction), do developers have a
> reason to choose the 1st party flow when the password grant only needs a
> single call to the token endpoint?
>
> <pk>
>
> The main advantage is the ability to step up to MFA (or even to require a
> web redirect to collect credentials on the web if the authorization server
> deems the risk of a “first party” flow excessive).
>
> </pk>
>
>
>
> The password grant has been subjected to (non-standard) customisations to
> support challenges, for example to be able to ask the user for an OTP after
> the password is verified. The 1st party flow takes such scenarios into
> account, but appears to have taken the framework approach, leaving it up to
> developers to complete the definition of the flow for the factors an AS is
> required to use / combine. Is it envisioned for the 1st party flow spec to
> get complemented with profiles or is it expected developers / deployments
> to take care of this?
>
> <pk>
>
> We expect there will be profiles for popular authentication techniques.
>
> </pk>
>
>
>
> Vladimir Dzhuvinov
>
> On 03/09/2024 13:46, Rifaat Shekh-Yusef wrote:
>
> All,
>
> As per the discussion in Vancouver, this is a call for adoption for the
> First Party Apps draft:
> https://datatracker.ietf.org/doc/draft-parecki-oauth-first-party-apps/
>
> Please, reply on the mailing list and let us know if you are in favor or
> against adopting this draft as WG document, by *Sep 17th*.
>
> Regards,
>  Rifaat & Hannes
>
>
>
> _______________________________________________
>
> OAuth mailing list -- oauth@ietf.org
>
> To unsubscribe send an email to oauth-le...@ietf.org
>
> _______________________________________________
> OAuth mailing list -- oauth@ietf.org
> To unsubscribe send an email to oauth-le...@ietf.org
>
_______________________________________________
OAuth mailing list -- oauth@ietf.org
To unsubscribe send an email to oauth-le...@ietf.org

Reply via email to