Mohamed Boucadair has entered the following ballot position for
draft-ietf-oauth-browser-based-apps-24: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-oauth-browser-based-apps/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

Hi Aaron, Philippe, and David,

Thank you for the effort put into this specification.

Thanks to Qin Wu for the opsdir review and to the authors for addressing that
review in -22.

I support Andy’s DISCUSS points on (1) the need to better clarify the
relationship vs. 9700 and also “BFF as an HTTP Proxy”. Likewise, I strongly
support Andy’s comment on “BFF Operational Considerations”.

Please find below some comments, fwiw:

# Which BCP Umbrella?

Do we plan to include this document under the BCP 212 or BCP 240 umbrella? Else?

I guess it is natural to list under BCP240 as the document currently says:

 “This document expands on and further restricts various
  recommendations given in [RFC9700].”

# Heavy use of field specific concept without introducing them

It was difficult to got through the text as I had check other OAUTH
specifications to find and understand some statements and also digest some
concepts. The text does not provide pointers to help readers find where to look
at. A non-exhaustive list of points that require companion citations are: OAuth
2.0  clients, first-party context, third-party context, resource servers,
Implicit flow, public clients, private clients, and so on. Please consider
fixing that.

Also, enigmatic statements such as the following are not helpful. Please list
these explicitly.

CURRENT:
   In addition to the terms defined in referenced specifications, this
   document uses the following terms:

# Recommendations/Guidance “lost” in the analysis

The document includes implementation guidance but that guidance is lost in the
mass of attack analysis. This may be a matter of taste, but I’m afraid that if
we want the guidance to be followed, we need an effort to make that guidance
easily identified at the first place. Separating (or even offloading) the
attack analysis vs actual recommendations would be cleaner.

# Provisioning and management-related matters

CURRENT:
   As stated in Section 10.2 of [RFC6749], the authorization server
   SHOULD NOT process authorization requests automatically without user
   consent or interaction, except when the authorization server can
   assure the the identity of the client application.

Do we have some reco about how we can seek for user consent?

More generally, do we expect any knobs for users to interact with the clients
and provide some policies? Maybe the same considerations apply also for native
clients? If so, can we say that in the text.

As I’m there, can we have a discussion about how to help with
diagnostic/troubleshooting when problems are encountered? For example, are
there same (levels of) logs? How these are accessed by each app?

Thank you.

Cheers,
Med



_______________________________________________
OAuth mailing list -- oauth@ietf.org
To unsubscribe send an email to oauth-le...@ietf.org

Reply via email to