Hi Marc,

Great point about the mobile app. This was not yet discussed and I must admit I don't have a lot of practical experience in this area.

I don't think the CLI use-case would be the fitting one, as you won't get the best experience with the device flow in the web app, unless you are fine with your user copy-pasting the code in the authorization flow to the IdP page. There was a very good presentation today in the OAuth group about it, along the lines "don't use multi-device flows on the same device" and I think there is a point about it.

In my eyes a mobile app is more like a web app. If I understand how the mobile app can be built, it would trigger the authorization flow either with a built-in browser widget, or trigger the OS-default browser for that. Not 100% sure about the first scenario, but for the second it would be absolutely given that the app won't get access to the cookies set in the browser session, therefore breaking the flow. The only exception are the apps being actually SPAs running in a browser, then it's the same as a browser app - just no clue how the cookies are handled: same-site or cross-site, but likely you can control it in your app.

Kind Regards,

Pawel

Am 09.11.22 um 18:26 schrieb Marc Blanchet:
Sorry I was not able to attend. But reading the slides, I just want to make sure the mobile app RDAP client is properly taken into account. I think this is the « CLI » use case described, but just want to make sure we properly cover the mobile app RDAP client (I wrote one… and intend to implement openid)

Regards, Marc.

Le 9 nov. 2022 à 18:09, Pawel Kowalik <kowa...@denic.de> a écrit :

Hi,


Thanks for the participation in the meeting today.

There are not yet any conclusions, which would be discussed in the WG meeting tomorrow and likely after in the mailing list.

Slides with the current status and possibilities to move forward are attached.


Kind Regards,

Pawel



Am 07.11.22 um 13:33 schrieb Pawel Kowalik:

Hi Mario,

Am 07.11.22 um 11:27 schrieb Mario Loffredo:
I'm very busy Wednesday but, hopefully, I should be free for that time.

Great you can make it.

After a quick reading, a first big doubt from my side is about what is stated in section 4 regarding "redirect URIs".
    Browser-based applications:
    *  MUST Register one or more redirect URIs, and use only exact
       registered redirect URIs in authorization requests

Now, it's clear to me that, in the OpenID model we are working on, the RDAP server acts as an RP and is the one submitting requests to th AS but it can't use a fixed set if redirect_uri values.

Yes, the security considerations part is still open. Applicability mostly depends on whether there are confidential and/or registered clients or not. If clients are anonymous there are certain risks related to the redirect_uri, which can only to some degree be mitigated.

Kind Regards,

Pawel

<IETF 115 Side Meeting RDAP OpenID Status.pdf>_______________________________________________
regext mailing list
regext@ietf.org
https://www.ietf.org/mailman/listinfo/regext


_______________________________________________
regext mailing list
regext@ietf.org
https://www.ietf.org/mailman/listinfo/regext
_______________________________________________
regext mailing list
regext@ietf.org
https://www.ietf.org/mailman/listinfo/regext

Reply via email to