Re: [OAUTH-WG] Assertion flow: please add optional refresh_token in response

2010-06-17 Thread Torsten Lodderstedt
Am 16.06.2010 00:35, schrieb Brian Eaton: On Tue, Jun 15, 2010 at 8:54 AM, Torsten Lodderstedt wrote: Wouldn't it be an alternative solution, if the AS first tries to authenticate the user using SPNEGO within the Web Server flow? This should work in the inhouse scenario. If it fails, it c

Re: [OAUTH-WG] Status update

2010-06-17 Thread Eran Hammer-Lahav
I don't care about IPR. I asked for it to be submitted as I-D because for now, I think we have consensus to move it forward in that form. We can always merge it into core, but for now, it is not part of core. Don't worry about this too much at this moment. What you need to do is get consensus t

Re: [OAUTH-WG] Status update

2010-06-17 Thread Nat Sakimura
I was wondering when you suggested to write an I-D about the request by reference (which started as mobile WebApp flow), you wanted it for the IPR reason or meant that it should be separate from the core. To cover both case, I have submit the I-D http://datatracker.ietf.org/doc/draft-sakimura-oauth

Re: [OAUTH-WG] Status update

2010-06-17 Thread Eran Hammer-Lahav
Not sure what you are referring to. EHL > -Original Message- > From: Nat [mailto:sakim...@gmail.com] > Sent: Thursday, June 17, 2010 4:42 PM > To: Eran Hammer-Lahav > Cc: OAuth WG (oauth@ietf.org) > Subject: Re: [OAUTH-WG] Status update > > What about the 'request_url' indirection (witho

Re: [OAUTH-WG] Status update

2010-06-17 Thread Nat
What about the 'request_url' indirection (without sig and enc)? On 2010/06/18, at 6:36, Eran Hammer-Lahav wrote: With the exception of extensibility, I consider draft -08 to be feature complete. This means that the draft contains all the features and components needed and other then editori

Re: [OAUTH-WG] Proposal: simplification of the end-user authorization endpoint

2010-06-17 Thread Marius Scurtescu
On Thu, Jun 17, 2010 at 2:30 PM, Eran Hammer-Lahav wrote: > > >> -Original Message- >> From: Marius Scurtescu [mailto:mscurte...@google.com] >> Sent: Thursday, June 17, 2010 11:08 AM >> To: David Recordon >> Cc: Eran Hammer-Lahav; OAuth WG (oauth@ietf.org) >> Subject: Re: [OAUTH-WG] Propos

[OAUTH-WG] Status update

2010-06-17 Thread Eran Hammer-Lahav
With the exception of extensibility, I consider draft -08 to be feature complete. This means that the draft contains all the features and components needed and other then editorial work is close to finished. I plan to finish work on the -09 draft by Mon or Tue next week which will include the e

Re: [OAUTH-WG] Proposal: simplification of the end-user authorization endpoint

2010-06-17 Thread Eran Hammer-Lahav
> -Original Message- > From: Marius Scurtescu [mailto:mscurte...@google.com] > Sent: Thursday, June 17, 2010 11:08 AM > To: David Recordon > Cc: Eran Hammer-Lahav; OAuth WG (oauth@ietf.org) > Subject: Re: [OAUTH-WG] Proposal: simplification of the end-user > authorization endpoint > > Ye

Re: [OAUTH-WG] Proposal: simplification of the end-user authorization endpoint

2010-06-17 Thread Justin Richer
OK, nevermind, I think I wasn't reading things correctly. I've re-read both the current spec and the proposal below and I think I've answered my own question. My question was essentially "how does the Javascript client get the authorization code back to the server?", but now I see that it doesn't h

Re: [OAUTH-WG] Proposal: simplification of the end-user authorization endpoint

2010-06-17 Thread David Recordon
Sure, a refresh token as well depending on the AS implementation. On Thu, Jun 17, 2010 at 11:17 AM, Marius Scurtescu wrote: > On Thu, Jun 17, 2010 at 11:09 AM, Eran Hammer-Lahav > wrote: >> We added an optional authorization code which can only be used after >> exchanging it for an access toke

Re: [OAUTH-WG] Proposal: simplification of the end-user authorization endpoint

2010-06-17 Thread Marius Scurtescu
On Thu, Jun 17, 2010 at 11:09 AM, Eran Hammer-Lahav wrote: > We added an optional authorization code which can only be used after > exchanging it for an access token with required client authentication (client > secret). Just to make sure I understand the new flow, the authorization code is sup

Re: [OAUTH-WG] Proposal: simplification of the end-user authorization endpoint

2010-06-17 Thread Eran Hammer-Lahav
What do you mean by valid data? In the user-agent case, the server returns an access token. We added an optional authorization code which can only be used after exchanging it for an access token with required client authentication (client secret). EHL -Original Message- From: Justin Ri

Re: [OAUTH-WG] Proposal: simplification of the end-user authorization endpoint

2010-06-17 Thread Marius Scurtescu
Yes, I am aware of that thread. I did ask some questions there which are unanswered. Basically, why cannot be that problem solved by 2 different requests, both done by the JavaScript layer? If latency is a problem, it would be good to know exactly where. I assume that authorization codes are issu

Re: [OAUTH-WG] Proposal: simplification of the end-user authorization endpoint

2010-06-17 Thread Justin Richer
I think I'm missing something on the combined case here. How does the server trust the javascript client code to pass it back valid data? Is it assumed to just rely on an established browser session at that point that the javascript client has access to? -- Justin On Thu, 2010-06-17 at 13:48 -04

Re: [OAUTH-WG] Proposal: simplification of the end-user authorization endpoint

2010-06-17 Thread David Recordon
Hey Marius, take a look at http://www.ietf.org/mail-archive/web/oauth/current/msg02657.html from Twitter. On Thu, Jun 17, 2010 at 10:48 AM, Marius Scurtescu wrote: > Shifting from client type profile names to flow type profiles sounds good. > > Not too sure about the combined case, token_and_cod

Re: [OAUTH-WG] Proposal: simplification of the end-user authorization endpoint

2010-06-17 Thread Marius Scurtescu
Shifting from client type profile names to flow type profiles sounds good. Not too sure about the combined case, token_and_code. I am not opposed to it, but I think it would help us wrap our heads around it if a detailed use case was presented. Thanks, Marius On Wed, Jun 16, 2010 at 11:05 PM,

[OAUTH-WG] grant type related typo

2010-06-17 Thread Laurence Miao
hi, this seems to be a typo, notice the inconsistency of definition of grant_type value and example of grant_type parameter. this apply to oauth spec 2 draft 08 == 4. Obtaining an Access Token ... grant_type REQUIRED. The access grand type included in the request.

Re: [OAUTH-WG] Proposal: simplification of the end-user authorization endpoint

2010-06-17 Thread Torsten Lodderstedt
+1, although "request" sounds a bit wierd. Don't you like "response_type" or just "response"? Am 17.06.2010 08:05, schrieb Eran Hammer-Lahav: This is a joint proposal from David Recordon and me: ** Background: The latest draft (-08) unified the web-server and user-agent client types into a

Re: [OAUTH-WG] proposal: multiple access tokens from a single authorization flow

2010-06-17 Thread Torsten Lodderstedt
I'm going to write an I-D for multiple access tokens. If someone else would like to contribute, please contact me. regards, Torsten. Am 17.06.2010 03:56, schrieb Eran Hammer-Lahav: This use case seems to have some support for an extension, but enough resistance for being added to core. I sug

Re: [OAUTH-WG] Draft iteration frequency

2010-06-17 Thread SM
Hi Eran, At 10:14 14-06-10, Eran Hammer-Lahav wrote: I am now making daily changes to the draft. I check these changes in daily (sometimes more) to my github account [1] but I'm not clear how often do people here wants me to submit those as I-D revisions. Frequent submission makes it harder for

[OAUTH-WG] grant type related typo

2010-06-17 Thread Laurence Miao
hi, this seems to be a typo, notice the inconsistency of definition of grant_type value and example of grant_type parameter. this apply to oauth spec 2 draft 08 == 4. Obtaining an Access Token ... grant_type REQUIRED. The access grand type included in the request.

Re: [OAUTH-WG] New Version Notification for draft-sakimura-oauth-requrl-00

2010-06-17 Thread Nat Sakimura
P.S. It has extra things like Signing and Encrypting of the Request payload for some use-case stated in the introduction, but the core is the "request_url". (The draftactually is largely copy and paste of OpenID Artifact Binding, which is based on OAuth2.0). > A new version of I-D, draft-sakimura