From: Mario Loffredo <mario.loffr...@iit.cnr.it>
Sent: Monday, February 14, 2022 2:05 AM
To: Hollenbeck, Scott <shollenb...@verisign.com>; regext@ietf.org
Subject: [EXTERNAL] Re: [regext] I-D Action: 
draft-ietf-regext-rdap-openid-10.txt



Caution: This email originated from outside the organization. Do not click 
links or open attachments unless you recognize the sender and know the content 
is safe.

Hi Scott,

here in the following some additional feedback:

1)  In the introductory sections, nothing is written about the fact that an 
RDAP server outsources authentication services to an OP  if the registry trusts 
that OP.

I think that this is a pre-condition to make a federation and for this reason, 
in my opinion, it's worth being mentioned somewhere at the beginning of the 
draft.

[SAH] OK, I’ll see what I can add.

2) It seems from the text of section 3.1.3 that dynamic registration is the 
only method available  to register an RP. Instead, we all know that the most 
commonly used method to do that is manually through an out-of-band procedure. I 
think this alternative should also be mentioned to make section 3.1.3 
consistent with the text in section 3.1.3.1 about the fact that an RDAP server 
can trust a limited number of OPs and out-of-band methods are used to implement 
the discovery process. If an RDAP server supports a limit number of OPs, it 
doesn't make sense that it is registered dynamically.

[SAH] Agreed, I’ll add text to make it clear that out-of-band methods are both 
available and acceptable.

3) It seems from the draft content that the session expiring time is tied to 
the access token lifespan. Instead, in my experience with Keycloak, the session 
max idle time corresponds to the refresh token lifespan.

Honestly, don't know if this happens in other OPs, anyway, I would opt for 
letting the RDAP server choose the basis to calculate the session expiring time 
upon and in Section 4.2 I would omit the sentence "... to refresh the access 
token associated with the current session and ...".

[SAH] Agreed. The expiration value is only RECOMMENDED per the normative 
reference, so it really is up to the RDAP server to determine when things 
expire.

In addition, in general, I would replace "token refresh" with "session 
refresh". After all, the endpoint that should be used for refreshing is called 
"session/refresh" and the final result to the End-User would be that the 
session lifetime is extended.

[SAH] Agreed.

4) It doesn't make sense to me to return the claims in the response to the 
"session/refresh" query. Can they really change during the session?

[SAH] They can’t, but I think it’s a good idea to return them so that the 
client has an easy way to retrieve that information at any time without having 
to logout and then login again.

5) If I understood well, a successful "session/refresh" query don't always 
result in resetting the session expiring time. How can the RDAP server decide 
to do that?

[SAH] As noted above, it’s something that the RDAP server has to manage. I’d 
like to RECOMMEND and make it clear that the RDAP server SHOULD extend the 
duration of a session as part of processing a refresh, otherwise a refresh 
doesn’t do anything. Thanks again for the feedback!

Scott

_______________________________________________
regext mailing list
regext@ietf.org
https://www.ietf.org/mailman/listinfo/regext

Reply via email to