Re: [OAUTH-WG] Open Issues: Group Survey (respond by 5/13)

2010-05-13 Thread Torsten Lodderstedt
from my understanding, the assertion you explained in your scenario represent the authorization of end-users (not client applications) to access feeds. Thus I see them as a kind of user credentials and would send them as request parameter. Authorization headers will be used for client authentic

Re: [OAUTH-WG] Separate HTTP and HTTPS tokens

2010-05-13 Thread Manger, James H
David, > Why would we support bearer tokens over HTTP? > Is someone planning to implement this? Because the cookies-over-HTTP ~equivalent is widely used. The spec does say SHOULD NOT, but also explicitly talks about how to do it. the spec suggests limited scope and lifetime -- limited scope impli

Re: [OAUTH-WG] Separate HTTP and HTTPS tokens

2010-05-13 Thread David Recordon
Why would we support bearer tokens over HTTP? Is someone planning to implement this? On Thu, May 13, 2010 at 8:25 PM, Manger, James H < james.h.man...@team.telstra.com> wrote: > Some APIs (and certainly lots of web sites) use a mix of HTTPS and HTTP > resources. Using the same bearer token for b

[OAUTH-WG] Details on the Facebook OAuth 2.0 implementation

2010-05-13 Thread Luke Shepard
Hey everyone, I wrote up a post giving detail about exactly what Facebook has and has not implemented from the OAuth 2.0 spec (with plenty of supporting links): http://www.sociallipstick.com/?p=239 In summary: - Current as of v0 of the draft. I think we are mostly current with v4 (although I

[OAUTH-WG] Separate HTTP and HTTPS tokens

2010-05-13 Thread Manger, James H
Some APIs (and certainly lots of web sites) use a mix of HTTPS and HTTP resources. Using the same bearer token for both sets of resources limits security of the HTTPS interactions to the insecurity of the HTTP ones. A better approach is to use separate tokens. Exposure of a token used on HTTP do

Re: [OAUTH-WG] Open Issues: Group Survey (respond by 5/13)

2010-05-13 Thread Eran Hammer-Lahav
> -Original Message- > From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf > Of Greg Brail > Sent: Thursday, May 13, 2010 6:57 PM >Eran or whoemever is so empowered were to choose No one is empowered to choose. We need to keep at it until we reach consensus, but some

Re: [OAUTH-WG] Open Issues: Group Survey (respond by 5/13)

2010-05-13 Thread Greg Brail
I'm sorry that I'm late on this but for what it's worth: Server Response Format: I prefer A (form-encoded only). It's the simplest solution that requires the least amount of client-side technology. JSON is too complex a spec for simply encoding a set of flat key-value parameters when where is alre

Re: [OAUTH-WG] Open Issues: Group Survey (respond by 5/13)

2010-05-13 Thread Robert Sayre
On Thu, May 13, 2010 at 7:43 PM, Eran Hammer-Lahav wrote: > Can you give a reason why you are objecting to C. > As I just wrote: > My objection to C was that your examples were buggy. I don't think servers or clients will get XML, JSON, and form-encoded right without taking on a lot of 3rd party

Re: [OAUTH-WG] Indicating sites where a token is valid

2010-05-13 Thread Manger, James H
Evan, > we have no API endpoints that are only arrived at by links This doesn't sound very web-friendly. Your APIs don't have to follow a web-style, but an IETF spec should support web-style APIs. I am a bit surprised with your statement as a whole lot of Google APIs do have API endpoints arri

Re: [OAUTH-WG] Open Issues: Group Survey (respond by 5/13)

2010-05-13 Thread Eran Hammer-Lahav
Can you give a reason why you are objecting to C. EHL > -Original Message- > From: Robert Sayre [mailto:say...@gmail.com] > Sent: Thursday, May 13, 2010 4:27 PM > To: Eran Hammer-Lahav > Cc: Yaron Goland; OAuth WG (oauth@ietf.org) > Subject: Re: [OAUTH-WG] Open Issues: Group Survey (respo

Re: [OAUTH-WG] Indicating sites where a token is valid

2010-05-13 Thread Evan Gilbert
On Thu, May 13, 2010 at 4:54 PM, Manger, James H < james.h.man...@team.telstra.com> wrote: > Evan, > > > we have no API endpoints that are only arrived at by links > > This doesn't sound very web-friendly. Your APIs don't have to follow a > web-style, but an IETF spec should support web-style APIs

[OAUTH-WG] Three issues with format parameter in draft-05

2010-05-13 Thread Michael D Adams
Three things about draft-05's new format parameter. 1. Error Response: http://tools.ietf.org/html/draft-ietf-oauth-v2-05#section-3.3.2.2 Presumably, the error response format should reflect the format parameter passed by the client. Proposed Text (wording taken from http://tools.ietf.org/html/dr

[OAUTH-WG] Requiring Cryptographic Access Tokens

2010-05-13 Thread Michael D Adams
I'm interested in the possibility of requiring clients to use cryptographic tokens. Context: I'm writing a WordPress plugin to handle OAuth 2.0 authentication. Small one-off WordPress sites (probably on a shared host) likely cannot use SSL. Such a site would necessarily be non-compliant because

Re: [OAUTH-WG] I-D Action:draft-ietf-oauth-v2-04.txt

2010-05-13 Thread Robert Sayre
On Thu, May 13, 2010 at 6:12 AM, Torsten Lodderstedt wrote: > >> >> Sure, to give one example, I would make the device flow a separate >> spec immediately. That seems only distantly related to other things in >> the spec, and may not be really necessary by the time the standard >> matures. >> > >

Re: [OAUTH-WG] Open Issues: Group Survey (respond by 5/13)

2010-05-13 Thread Robert Sayre
On Thu, May 13, 2010 at 5:14 PM, Eran Hammer-Lahav wrote: > There is clearly no consensus for either A or B. There was mostly no > objection to C, > and the reason given by most of those who objected was client complexity with > the current proposal solves. My objection to C was that your examp

Re: [OAUTH-WG] Open Issues: Group Survey (respond by 5/13)

2010-05-13 Thread Eran Hammer-Lahav
There is clearly no consensus for either A or B. There was mostly no objection to C, and the reason given by most of those who objected was client complexity with the current proposal solves. Weak consensus means that the option has some support and little objection. If those who had something

Re: [OAUTH-WG] sites with wildcard

2010-05-13 Thread Yaron Goland
Why would there be any use experience at all? 1. An OAuth client gets a refresh token in the context of http://example.com 2. While interacting with http://example.com the OAuth client sees a link to http://foo.com and has reason to believe that foo.com is actually part of example.com but isn'

Re: [OAUTH-WG] Open Issues: Group Survey (respond by 5/13)

2010-05-13 Thread Yaron Goland
But in federation scenarios the client credentials are an assertion. For example, Microsoft has a service called Dallas that lets entities purchase access to proprietary data feeds. A common scenario we run into with Dallas is that a company will purchase access to a feed for its employees. But

Re: [OAUTH-WG] Open Issues: Group Survey (respond by 5/13)

2010-05-13 Thread Yaron Goland
I went through and counted all the votes I could find in the mail archive (I have reproduced the results below). 8 people explicitly stated a preference for A or B (of those 4 explicitly stated they don't want C). Only 3 people voted for C as their first choice. Even if we bunch together peopl

Re: [OAUTH-WG] Comments on draft-ietf-oauth-v2-03.txt

2010-05-13 Thread Axel.Nennker
Two snippets from the emails below: > > You mean token format? OAuth defined the token as opaque so that > would be counter-productive. My comment on that comment: "opaque" for oauth could mean that oauth does not handle certain types of tokens specially. I think this is not an a

Re: [OAUTH-WG] I-D Action:draft-ietf-oauth-v2-05.txt

2010-05-13 Thread Eran Hammer-Lahav
Changes: o Corrected device example. o Added client credentials parameters to the assertion flow as OPTIONAL. o Added the ability to send client credentials using an HTTP authentication scheme. o Initial text for the "WWW-Authenticate" header (also added scope support). o Chan

[OAUTH-WG] I-D Action:draft-ietf-oauth-v2-05.txt

2010-05-13 Thread Internet-Drafts
A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Open Authentication Protocol Working Group of the IETF. Title : The OAuth 2.0 Protocol Author(s) : E. Hammer-Lahav, et al. Filename: dr

Re: [OAUTH-WG] Comments on draft-ietf-oauth-v2-03.txt

2010-05-13 Thread Eran Hammer-Lahav
> -Original Message- > From: Torsten Lodderstedt [mailto:tors...@lodderstedt.net] > Sent: Monday, May 10, 2010 12:12 PM > >> 3.6.1.1. End-user Grants Authorization > >> > >> Why not call the "code" Parameter "verification_code"? It's called > >> verification code in the text. > >> > > L

Re: [OAUTH-WG] User and Client identity in the Assertion Flow

2010-05-13 Thread Eran Hammer-Lahav
The flow is not SAML-specific. EHL > -Original Message- > From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf > Of Prateek Mishra > Sent: Thursday, May 13, 2010 10:15 AM > To: oauth@ietf.org > Subject: Re: [OAUTH-WG] User and Client identity in the Assertion Flow > > S

Re: [OAUTH-WG] User and Client identity in the Assertion Flow

2010-05-13 Thread Prateek Mishra
SAML 2.0 assertions can represent a variety (very large) of relationships between the presenter, issuer, subject, means of confirmation and so on and so forth. So representing multiple identities - i am server foo but I am acting for joe - is not very difficult. We can profile these versus add

Re: [OAUTH-WG] Open Issues: Group Survey (respond by 5/13)

2010-05-13 Thread Eran Hammer-Lahav
Thanks to those who participated! Some conclusions: > 1. Server Response Format > > After extensive debate, we have a large group in favor of using JSON as the > only response format (current draft). We also have a smaller group but with > stronger feelings on the subject that JSON adds complexi

Re: [OAUTH-WG] Indicating sites where a token is valid

2010-05-13 Thread Eran Hammer-Lahav
Today when I cut/paste a URI of an image using Basic auth, the browser knows exactly what to do. I want to do the same with an OAuth-protected image. Saying that there aren't standards API out there to benefit from this is incorrect. There are plenty. This is complete discovery for the authenti

Re: [OAUTH-WG] Indicating sites where a token is valid

2010-05-13 Thread Evan Gilbert
On Thu, May 13, 2010 at 9:08 AM, Eran Hammer-Lahav wrote: > You are trying to match a mechanism designed for automatic discovery with a > system designed to require paperwork. It sounds like for your use cases, you > will not be using this optional parameter and just document how to use your > API

Re: [OAUTH-WG] User and Client identity in the Assertion Flow

2010-05-13 Thread Torsten Lodderstedt
Thanks. Am 13.05.2010 um 18:02 schrieb Eran Hammer-Lahav : Will be added to -05. EHL -Original Message- From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of Brian Eaton Sent: Thursday, May 13, 2010 8:50 AM To: Chuck Mortimore Cc: oauth@ietf.org Subject: Re:

Re: [OAUTH-WG] Indicating sites where a token is valid

2010-05-13 Thread Eran Hammer-Lahav
You are trying to match a mechanism designed for automatic discovery with a system designed to require paperwork. It sounds like for your use cases, you will not be using this optional parameter and just document how to use your API (i.e. hardcode your security setup and API format). The whole

Re: [OAUTH-WG] User and Client identity in the Assertion Flow

2010-05-13 Thread Eran Hammer-Lahav
Will be added to -05. EHL > -Original Message- > From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf > Of Brian Eaton > Sent: Thursday, May 13, 2010 8:50 AM > To: Chuck Mortimore > Cc: oauth@ietf.org > Subject: Re: [OAUTH-WG] User and Client identity in the Assertion Fl

Re: [OAUTH-WG] Indicating sites where a token is valid

2010-05-13 Thread Evan Gilbert
On Wed, May 12, 2010 at 11:52 PM, Manger, James H < james.h.man...@team.telstra.com> wrote: > Evan, > > > The key point is that this discovery covers a lot of the same grounds as > the sites parameter, and it's hard to define semantics around a sites > parameter without understanding the semantic

Re: [OAUTH-WG] User and Client identity in the Assertion Flow

2010-05-13 Thread Brian Eaton
On Thu, May 13, 2010 at 8:26 AM, Chuck Mortimore wrote: > Our plan is to treat SAML assertions passed over the assertion flow as > bearer assertions, so I believe we have everything we need contained within > the assertion (issuer + audience + signature).  That being said, if we want > this to be

Re: [OAUTH-WG] User and Client identity in the Assertion Flow

2010-05-13 Thread Chuck Mortimore
Our plan is to treat SAML assertions passed over the assertion flow as bearer assertions, so I believe we have everything we need contained within the assertion (issuer + audience + signature). That being said, if we want this to be an extensible flow, not all assertion formats will be so trans

Re: [OAUTH-WG] in-app logout?

2010-05-13 Thread Manger, James H
Torsten, > What about refresh token revocation/deletion? HTTP already has a method to do this: DELETE It just needs each token to have a URI. Tokens (almost) already have URIs -- its just not immediately obvious because the URI has to be built from a common token endpoint and a refresh_token.

Re: [OAUTH-WG] User and Client identity in the Assertion Flow

2010-05-13 Thread Torsten Lodderstedt
Am 13.05.2010 13:05, schrieb Paul Madsen: Torsten, have you thought about the relevance of the for identifying the client? Identify if not authenticate. Thanks for your advice. I would not expect the issuer to by the client in that game. In my opinion a client could be a website, which ob

Re: [OAUTH-WG] User and Client identity in the Assertion Flow

2010-05-13 Thread Paul Madsen
Torsten, have you thought about the relevance of the for identifying the client? Identify if not authenticate. On 5/13/2010 6:38 AM, Torsten Lodderstedt wrote: In my perception, we reached consensus in the thread "Autonomous clients and resource owners (editorial)" that the assertion flow s

[OAUTH-WG] in-app logout?

2010-05-13 Thread Torsten Lodderstedt
OAuth currently focues on the issuance and usage of tokens. What about refresh token revocation/deletion? Several mobile apps today use long-living tokens as a means to log in to services. They typically also offer a button to log-off/log-out, which cause the app to delete the token from the d

[OAUTH-WG] User and Client identity in the Assertion Flow

2010-05-13 Thread Torsten Lodderstedt
In my perception, we reached consensus in the thread "Autonomous clients and resource owners (editorial)" that the assertion flow should support clients acting on behalf of users, not only autonomous clients. The specification currently states "This flow is suitable when the client is acting a

Re: [OAUTH-WG] I-D Action:draft-ietf-oauth-v2-04.txt

2010-05-13 Thread Torsten Lodderstedt
Am 13.05.2010 02:41, schrieb Robert Sayre: On Wed, May 12, 2010 at 7:37 PM, Eran Hammer-Lahav wrote: Oh, I wouldn't expect it to stop. The group has a bunch of unrelated stuff grouped into one document. There seems to be consensus to do that, but it still runs counter to the conventio