Re: [OAUTH-WG] Token Access Authentication Scheme Draft

2010-02-04 Thread John Panzer
On Thu, Feb 4, 2010 at 12:02 AM, Eran Hammer-Lahav wrote: > Thanks John. > > > -Original Message- > > From: John Panzer [mailto:jpan...@google.com] > > Sent: Tuesday, December 08, 2009 11:29 AM > > > Suggestion: It would be better to start with simple examples (bearer > token) > > which av

[OAUTH-WG] Which draft to use as a starting point for 'using a token'?

2010-02-04 Thread Eran Hammer-Lahav
On the call today I clarified what is going on with all the different drafts. In brief: draft-hammer-oauth - documentation of the OAuth 1.0 Rev A (with changes) protocol. This is done and should be approved by the IESG shortly for publication. draft-ietf-oauth-authentication - the part of OAut

Re: [OAUTH-WG] proposed agenda for second interim meeting

2010-02-04 Thread Peter Saint-Andre
Indeed. Feel free to start separate threads on each, add them to the issue tracker, etc. I'll be mostly offline (travelling) for the next 36 hours but will try to catch up then. Thanks to everyone who participated in today's call. On 2/4/10 4:26 PM, Eran Hammer-Lahav wrote: > All these items are

Re: [OAUTH-WG] proposed agenda for second interim meeting

2010-02-04 Thread Eran Hammer-Lahav
All these items are still open for discussion, even if we didn't get to them on the call. EHL > -Original Message- > From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf > Of Eran Hammer-Lahav > Sent: Tuesday, February 02, 2010 11:25 PM > To: Peter Saint-Andre; OAuth WG

[OAUTH-WG] third OAuth interim meeting

2010-02-04 Thread Peter Saint-Andre
The OAuth WG will hold its third in a series of virtual interim meetings on February 18, 2010, at 19:00 UTC. This will be a two-hour call to work through a number of open issues leading up to IETF 77. smime.p7s Description: S/MIME Cryptographic Signature ___

Re: [OAUTH-WG] UMA use cases (was Re: proposed agenda for second interim meeting)

2010-02-04 Thread Anthony Nadalin
Agree on the measurable/enforceable items -Original Message- From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of Paul C. Bryan Sent: Thursday, February 04, 2010 2:38 PM To: OAuth WG Subject: Re: [OAUTH-WG] UMA use cases (was Re: proposed agenda for second interim me

Re: [OAUTH-WG] UMA use cases (was Re: proposed agenda for second interim meeting)

2010-02-04 Thread Paul C. Bryan
On Thu, 2010-02-04 at 19:17 +, Anthony Nadalin wrote: > > use UMA to require the requester to assure her they will not misuse > or further share her information > > Not sure how UMA would be able to deal with this, if you look at > things like the OECD Data Protection Principles (on which Priv

Re: [OAUTH-WG] UMA use cases (was Re: proposed agenda for second interim meeting)

2010-02-04 Thread Igor Faynberg
I think it is worth a detailed discussion to conclude whether or not UMA addresses the OECD principles. I don't have an opinion, and I don't know OECD well enough to have one, but I think it is important, and I am glad that Anthony has brought this up. Igor Anthony Nadalin wrote: use UMA to

Re: [OAUTH-WG] UMA use cases (was Re: proposed agenda for second interim meeting)

2010-02-04 Thread Anthony Nadalin
> use UMA to require the requester to assure her they will not misuse or > further share her information Not sure how UMA would be able to deal with this, if you look at things like the OECD Data Protection Principles (on which Privacy laws have been based) there are a lot of things considered

Re: [OAUTH-WG] proposed agenda for second interim meeting

2010-02-04 Thread Peter Saint-Andre
On 2/4/10 11:52 AM, Dick Hardt wrote: > > On 2010-02-04, at 10:47 AM, Peter Saint-Andre wrote: > >> >> >> On 2/3/10 11:55 AM, Dick Hardt wrote: >>> I recall from the call that Peter did ask if there was consensus >>> on the approach of gathering use cases. There seemed consensus >>> that the WG

Re: [OAUTH-WG] proposed agenda for second interim meeting

2010-02-04 Thread Dick Hardt
On 2010-02-04, at 10:47 AM, Peter Saint-Andre wrote: > > > On 2/3/10 11:55 AM, Dick Hardt wrote: >> I recall from the call that Peter did ask if there was consensus on >> the approach of gathering use cases. There seemed consensus that the >> WG might not fully understand the problem and that t

Re: [OAUTH-WG] proposed agenda for second interim meeting

2010-02-04 Thread Peter Saint-Andre
On 2/3/10 11:55 AM, Dick Hardt wrote: > I recall from the call that Peter did ask if there was consensus on > the approach of gathering use cases. There seemed consensus that the > WG might not fully understand the problem and that this made sense. I agree, but given that we haven't had a lot of

Re: [OAUTH-WG] UMA use cases (was Re: proposed agenda for second interim meeting)

2010-02-04 Thread Dick Hardt
On 2010-02-03, at 10:54 AM, Eve Maler wrote: > > - There is a conceptual similarity between the UMA and WRAP entities, but our > analysis so far shows it to be shallow in spots. For example, WRAP's > "protected resource" maps fairly well to an UMA "host" (which may host any > number of prote

Re: [OAUTH-WG] What are the primary criteria in issuing an authentication challenge?

2010-02-04 Thread Peter Saint-Andre
If James is interested in this then he can write an Internet-Draft. That's how the IETF works. :) IMHO such a WWW-Authenticate header might be quite useful, if we think that random entities might try to access a resource that is protected and therefore might need a way to know that they can acce

[OAUTH-WG] Use case: photo framing app access new photo service

2010-02-04 Thread Manger, James H
Below is a scenario that captures most of the key aspects that I believe OAuth specs should support. [Some might recognize it from 19 months ago on the OAuth googlegroups list] Consider an app (the client) that adds pretty frames to photos. The app understands Atom feeds that hold collections

Re: [OAUTH-WG] proposed agenda for second interim meeting

2010-02-04 Thread Vrancken Bart bv
Hi folks, In the beginning of December, I posted 2 use cases for multi-level delegation, but I didn't receive a lot of feedback there: http://www.ietf.org/mail-archive/web/oauth/current/msg00807.html Please feel free to provide feedback, now we are discussing about use cases. Best regards, Bart

Re: [OAUTH-WG] Token Access Authentication Scheme Draft

2010-02-04 Thread Eran Hammer-Lahav
Thanks John. > -Original Message- > From: John Panzer [mailto:jpan...@google.com] > Sent: Tuesday, December 08, 2009 11:29 AM > Suggestion: It would be better to start with simple examples (bearer token) > which avoids the need to wade through concepts like timestamp > synchronization and