Thanks Rifaat,

I've published a version -00 to datatracker and it is awaiting approval
from the chairs.

Aaron


On Mon, Oct 7, 2024 at 12:23 PM Rifaat Shekh-Yusef <rifaat.s.i...@gmail.com>
wrote:

> All,
>
> Based on the responses received on the mailing list, we believe that there
> is enough support for this document to become a WG document.
>
>
> Authors,
>
> Feel free to submit a -00 version at your convenience.
>
> Regards,
>  Rifaat & Hannes
>
>
>
>
> On Tue, Sep 17, 2024 at 4:55 AM Vladimir Dzhuvinov / Connect2id <
> vladi...@connect2id.com> wrote:
>
>> Hi Pieter,
>>
>> Thanks for your responses. I'm writing to state my support for the
>> adoption of this draft.
>>
>> I'm starting to see it as a meaningful evolution of the deprecated
>> password grant. I read the arguments to stay focused on the browser-based
>> code flow. Browser APIs have evolved over the course of OAuth 2.0, but the
>> reality is that devs and architects do not see them as ideal in all
>> situations and the password grant is still being used and considered. This
>> improved sped for 1st party apps should make it easier to have solutions
>> that are standard and interoperable.
>>
>> About the auth techniques, I would like to ask you and the other authors
>> working on the spec to consider defining parameters for the ones that are
>> most likely to see use in practice, in the coming years. I'm asking you
>> this because my past experience with profiles is that when they do appear,
>> it may be too late. The JWT profile for access tokens - RFC 9068 - comes to
>> mind. It was published 9 years after the bearer token RFC.
>>
>> Cheers,
>>
>> Vladimir
>>
>>
>> On 16/09/2024 16:40, Pieter Kasselman wrote:
>>
>> Hi Vladimir
>>
>>
>>
>> Thanks for reading the draft and raising questions. See responses inline.
>>
>>
>>
>> Cheers
>>
>>
>>
>> Pieter
>>
>>
>>
>> *From:* Vladimir Dzhuvinov / Connect2id <vladi...@connect2id.com>
>> <vladi...@connect2id.com>
>> *Sent:* Friday 13 September 2024 07:50
>> *To:* oauth@ietf.org
>> *Subject:* [OAUTH-WG] Re: Call for adoption - First Party Apps
>>
>>
>>
>> I read the proposed spec and it's evident substantial work has gone into
>> it. Congratulations for this.
>>
>> How does the 1st party flow compare to the (deprecated in OAuth 2.1)
>> password grant? People with existing 1st party apps that rely on the
>> password grant or consider using it are going to look for a discussion on
>> this.
>>
>> <pk>
>>
>> The first party flow is meant to provide a framework to allow for
>> multiple authentication factors to enable MFA type scenarios where there is
>> a first party trust relationship between the application gathering the
>> credentials and the authorization server. It provides a pathway from single
>> factor authentication methods to stronger MFA and ultimately phishing
>> resistant authentication methods.
>>
>> </pk>
>>
>>
>>
>> In terms of security properties (leaving aside the design to support
>> factors other than user password and the support for interaction), does it
>> offer advantages? In the simple case (no interaction), do developers have a
>> reason to choose the 1st party flow when the password grant only needs a
>> single call to the token endpoint?
>>
>> <pk>
>>
>> The main advantage is the ability to step up to MFA (or even to require a
>> web redirect to collect credentials on the web if the authorization server
>> deems the risk of a “first party” flow excessive).
>>
>> </pk>
>>
>>
>>
>> The password grant has been subjected to (non-standard) customisations to
>> support challenges, for example to be able to ask the user for an OTP after
>> the password is verified. The 1st party flow takes such scenarios into
>> account, but appears to have taken the framework approach, leaving it up to
>> developers to complete the definition of the flow for the factors an AS is
>> required to use / combine. Is it envisioned for the 1st party flow spec to
>> get complemented with profiles or is it expected developers / deployments
>> to take care of this?
>>
>> <pk>
>>
>> We expect there will be profiles for popular authentication techniques.
>>
>> </pk>
>>
>>
>>
>> Vladimir Dzhuvinov
>>
>> On 03/09/2024 13:46, Rifaat Shekh-Yusef wrote:
>>
>> All,
>>
>> As per the discussion in Vancouver, this is a call for adoption for the
>> First Party Apps draft:
>> https://datatracker.ietf.org/doc/draft-parecki-oauth-first-party-apps/
>>
>> Please, reply on the mailing list and let us know if you are in favor or
>> against adopting this draft as WG document, by *Sep 17th*.
>>
>> Regards,
>>  Rifaat & Hannes
>>
>>
>>
>> _______________________________________________
>>
>> OAuth mailing list -- oauth@ietf.org
>>
>> To unsubscribe send an email to oauth-le...@ietf.org
>>
>> _______________________________________________
>> OAuth mailing list -- oauth@ietf.org
>> To unsubscribe send an email to oauth-le...@ietf.org
>>
> _______________________________________________
> OAuth mailing list -- oauth@ietf.org
> To unsubscribe send an email to oauth-le...@ietf.org
>
_______________________________________________
OAuth mailing list -- oauth@ietf.org
To unsubscribe send an email to oauth-le...@ietf.org

Reply via email to