> Le 9 nov. 2022 à 18:39, Pawel Kowalik <kowa...@denic.de> a écrit : > > Hi Marc, > > Great point about the mobile app. This was not yet discussed and I must admit > I don't have a lot of practical experience in this area. > > I don't think the CLI use-case would be the fitting one, as you won't get the > best experience with the device flow in the web app, unless you are fine with > your user copy-pasting the code in the authorization flow to the IdP page. > Of course no. that was not obvious to me reading the slides.
> There was a very good presentation today in the OAuth group about it, along > the lines "don't use multi-device flows on the same device" and I think there > is a point about it. > > In my eyes a mobile app is more like a web app. > Yes. It is an http client, and can do whatever with its http connections: cookies, sessions, etc... > If I understand how the mobile app can be built, it would trigger the > authorization flow either with a built-in browser widget, or trigger the > OS-default browser for that. > Both are possible. > Not 100% sure about the first scenario, but for the second it would be > absolutely given that the app won't get access to the cookies set in the > browser session, therefore breaking the flow. The only exception are the apps > being actually SPAs running in a browser > Yeah, not those kind of « apps ». I was talking about « pure » mobile apps. One can also think of a mobile app like a desktop app. No difference to me. Both are http clients. Regards, Marc. > , then it's the same as a browser app - just no clue how the cookies are > handled: same-site or cross-site, but likely you can control it in your app. > > Kind Regards, > > Pawel > > Am 09.11.22 um 18:26 schrieb Marc Blanchet: >> Sorry I was not able to attend. But reading the slides, I just want to make >> sure the mobile app RDAP client is properly taken into account. I think this >> is the « CLI » use case described, but just want to make sure we properly >> cover the mobile app RDAP client (I wrote one… and intend to implement >> openid) >> >> Regards, Marc. >> >>> Le 9 nov. 2022 à 18:09, Pawel Kowalik <kowa...@denic.de> >>> <mailto:kowa...@denic.de> a écrit : >>> >>> Hi, >>> >>> >>> >>> Thanks for the participation in the meeting today. >>> >>> There are not yet any conclusions, which would be discussed in the WG >>> meeting tomorrow and likely after in the mailing list. >>> >>> Slides with the current status and possibilities to move forward are >>> attached. >>> >>> >>> >>> Kind Regards, >>> >>> Pawel >>> >>> >>> >>> >>> >>> Am 07.11.22 um 13:33 schrieb Pawel Kowalik: >>>> Hi Mario, >>>> >>>> Am 07.11.22 um 11:27 schrieb Mario Loffredo: >>>>> I'm very busy Wednesday but, hopefully, I should be free for that time. >>>> Great you can make it. >>>> >>>>> After a quick reading, a first big doubt from my side is about what is >>>>> stated in section 4 regarding "redirect URIs". >>>>> Browser-based applications: >>>>> * MUST Register one or more redirect URIs, and use only exact >>>>> registered redirect URIs in authorization requests >>>>> >>>>> Now, it's clear to me that, in the OpenID model we are working on, the >>>>> RDAP server acts as an RP and is the one submitting requests to th AS but >>>>> it can't use a fixed set if redirect_uri values. >>>> Yes, the security considerations part is still open. Applicability mostly >>>> depends on whether there are confidential and/or registered clients or >>>> not. If clients are anonymous there are certain risks >>>> related to the redirect_uri, which can only to some degree be mitigated. >>>> >>>> Kind Regards, >>>> >>>> Pawel >>>> >>> <IETF 115 Side Meeting RDAP OpenID >>> Status.pdf>_______________________________________________ >>> regext mailing list >>> regext@ietf.org <mailto:regext@ietf.org> >>> https://www.ietf.org/mailman/listinfo/regext >> >> >> >> _______________________________________________ >> regext mailing list >> regext@ietf.org <mailto:regext@ietf.org> >> https://www.ietf.org/mailman/listinfo/regext > _______________________________________________ > regext mailing list > regext@ietf.org > https://www.ietf.org/mailman/listinfo/regext
_______________________________________________ regext mailing list regext@ietf.org https://www.ietf.org/mailman/listinfo/regext