Re: [OAUTH-WG] Client credentials type

2010-06-29 Thread Torsten Lodderstedt
that's pretty big! Can you please explain what kind of client you authenticate with such assertions? They must contain hundreds of attributes. regards, Torsten. Zitat von Yaron Goland : We regularly deal with SAML assertions that easily go into the 100s of K. This is far more than most HT

Re: [OAUTH-WG] Draft -09

2010-06-29 Thread Torsten Lodderstedt
Hi Eran, what about token revocation? Will you include it? regards, Torsten. Am 29.06.2010 08:56, schrieb Eran Hammer-Lahav: Draft -09 is now posted. Main changes include: o Fixed typos, editorial changes. Thanks to Dick for his useful feedback. o Added token expiration example. o Added

Re: [OAUTH-WG] OAuth 1.0 token assertion to OAuth 2.0 token (was: Draft -09)

2010-06-29 Thread Luke Shepard
That's a good point :) We may want to allow batch exchanges for an upgrade flow, but you're right, then that doesn't really apply here. On Jun 29, 2010, at 6:50 PM, Marius Scurtescu wrote: > On Tue, Jun 29, 2010 at 6:30 PM, Luke Shepard wrote: >> One reason is that you may want to exchange toke

Re: [OAUTH-WG] Proposal for text for section 2

2010-06-29 Thread Kris Selden
This is configurable in IIS, Apache and Nginx but the default ranges from 4k to 16k. Don't know if there are issues with buffer sizes on the client side. On Jun 29, 2010, at 5:14 PM, Eran Hammer-Lahav wrote: > More precisely, what are the actual deployed limits on HTTP *request* headers > in

Re: [OAUTH-WG] Proposal for text for section 2

2010-06-29 Thread Manger, James H
Yaron, [Sorry I didn't see your response before sending my previous reply] > SAML assertions routinely run into the 10s and even 100s of K. > This exceeds the practical limit that most HTTP servers and proxies > put on the size of the HTTP request headers they are willing to accept. > So we canno

Re: [OAUTH-WG] OAuth 1.0 token assertion to OAuth 2.0 token (was: Draft -09)

2010-06-29 Thread Marius Scurtescu
On Tue, Jun 29, 2010 at 6:30 PM, Luke Shepard wrote: > One reason is that you may want to exchange tokens in a batch, whereas you > typically can only sign requests individually. How does the assertion grant type help in this case? As far as I can tell this also allows you to exchange only one t

Re: [OAUTH-WG] OAuth 1.0 token assertion to OAuth 2.0 token (was: Draft -09)

2010-06-29 Thread Luke Shepard
One reason is that you may want to exchange tokens in a batch, whereas you typically can only sign requests individually. On Jun 29, 2010, at 6:12 PM, Marius Scurtescu wrote: > On Tue, Jun 29, 2010 at 8:22 AM, Eran Hammer-Lahav > wrote: >> >> The assertion grant type is really the grant type

[OAUTH-WG] OAuth 1.0 token assertion to OAuth 2.0 token (was: Draft -09)

2010-06-29 Thread Marius Scurtescu
On Tue, Jun 29, 2010 at 8:22 AM, Eran Hammer-Lahav wrote: > > The assertion grant type is really the grant type extension point. Libraries > should treat it as a way to support custom grant types. One of the things I > would like to see someone draft is how to use OAuth 1.0 tokens to obtain > O

Re: [OAUTH-WG] Proposal for text for section 2

2010-06-29 Thread Eran Hammer-Lahav
More precisely, what are the actual deployed limits on HTTP *request* headers in popular HTTP servers like Apache and IIS, and in popular client platform likely to use this size assertions? EHL > -Original Message- > From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf

Re: [OAUTH-WG] Proposal for text for section 2

2010-06-29 Thread Manger, James H
Marius, >> For instance, why not define a SAML HTTP authentication mechanism: >> >>    Authorization: SAML a= > This came up in another thread, but SAML assertions could be too large > to be passed through an HTTP header. Other than that, your suggestion > really simplifies things. What are the

[OAUTH-WG] OAuth 2.0 PHP Library - Updated for v9

2010-06-29 Thread Tim Ridgely
Hi everybody, I updated the PHP library to include the changes in draft v9; hopefully I read everything correctly. Feedback always welcome! I also added a sample PHP Data Objects (PDO) implementation, so you can see how it'd work with MySQL, MSSQL, etc. Blog: http://www.opendining.net/category/

Re: [OAUTH-WG] How do we deal with unrecognized elements in requests and responses?

2010-06-29 Thread Yaron Goland
Personally I think we should go with #2. Those who need 'mandatory to implement' extensions should do exactly what Eran suggested and implement the extension in a way that breaks the core syntax so they are guaranteed that those who don't support the extension will fail.

Re: [OAUTH-WG] OAuth discovery draft?

2010-06-29 Thread Eran Hammer-Lahav
It is. 401 without it is not. The discovery spec should spell out how to include it with a 200 response when additional, private data is available. EHL From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of Yaron Goland Sent: Tuesday, June 29, 2010 12:28 PM To: William Mills

Re: [OAUTH-WG] OAuth discovery draft?

2010-06-29 Thread Yaron Goland
This then goes back to one of my original posts which is - Is www-authenticate legal on a non-401 response? I honestly don't know. From: William Mills [mailto:wmi...@yahoo-inc.com] Sent: Monday, June 28, 2010 3:30 PM To: Yaron Goland; Torsten Lodderstedt Cc: OAuth WG Subject: RE: [OAUTH-WG] OAuth

Re: [OAUTH-WG] Proposal for text for section 2

2010-06-29 Thread Yaron Goland
SAML assertions routinely run into the 10s and even 100s of K. This exceeds the practical limit that most HTTP servers and proxies put on the size of the HTTP request headers they are willing to accept. So we cannot rely on the HTTP authorization header as a means of transporting SAML assertions

Re: [OAUTH-WG] Proposal for text for section 2

2010-06-29 Thread Marius Scurtescu
On Mon, Jun 28, 2010 at 9:37 PM, Manger, James H wrote: > > For instance, why not define a SAML HTTP authentication mechanism: > >    Authorization: SAML a= This came up in another thread, but SAML assertions could be too large to be passed through an HTTP header. Other than that, your suggestion

Re: [OAUTH-WG] Draft -09

2010-06-29 Thread Eran Hammer-Lahav
> -Original Message- > From: pel...@gmail.com [mailto:pel...@gmail.com] On Behalf Of Pelle > Braendgaard > Sent: Tuesday, June 29, 2010 7:43 AM > To: Eran Hammer-Lahav > Cc: OAuth WG (oauth@ietf.org) > Subject: Re: [OAUTH-WG] Draft -09 > > I found one small error in 3.1 for the "code" pa

Re: [OAUTH-WG] Draft -09

2010-06-29 Thread Pelle Braendgaard
I found one small error in 3.1 for the "code" parameter. It mistakenly says "token" and not "code": http://r6.sharedcopy.com/6bnqq8v Anyway I hadn't seen any of the changes since 2.05 which I just implemented for the Ruby on Rails OAuth Plugin and I have to say the changes look great. I will have

Re: [OAUTH-WG] Draft -09

2010-06-29 Thread Eran Hammer-Lahav
For editorial feedback, I am going to try something new and use SharedCopy.com (no install required). Try it out at: http://r6.sharedcopy.com/6bnqq8v If this doesn't work, I'll let people know and cancel it. EHL From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of Eran H