Re: [OAUTH-WG] SAML 2.0 Bearer Assertion Profile for OAuth 2.0 draft

2010-07-27 Thread Torsten Lodderstedt
Am 28.07.2010 um 01:40 schrieb Brian Eaton : > On Tue, Jul 27, 2010 at 11:56 AM, Brian Campbell > wrote: >> There seem to be two potential arguments against it - the burden of >> tracking the state and the potential that it's unnecessarily >> restrictive. I don't personally see either as being a

Re: [OAUTH-WG] OAuth Signature

2010-07-27 Thread Nat
If nobody does, I could since this is one of the most crucial piece that I need. =nat @ Tokyo via iPhone On 2010/07/27, at 17:36, Eran Hammer-Lahav wrote: > Is someone going to turn this into an I-D anytime soon? > > > > EHL > > > > From: oauth-boun...@ietf.org [mailto:oauth-boun...@i

Re: [OAUTH-WG] OAuth Signature

2010-07-27 Thread Nat
If nobody does, I could since this is one of the most crucial piece that I need. =nat @ Tokyo via iPhone On 2010/07/27, at 17:36, Eran Hammer-Lahav wrote: > Is someone going to turn this into an I-D anytime soon? > > > > EHL > > > > From: oauth-boun...@ietf.org [mailto:oauth-boun...@i

Re: [OAUTH-WG] OAuth Signature

2010-07-27 Thread Eran Hammer-Lahav
Is someone going to turn this into an I-D anytime soon? EHL From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of Dirk Balfanz Sent: Tuesday, July 27, 2010 4:04 PM To: Nat Sakimura Cc: oauth Subject: Re: [OAUTH-WG] OAuth Signature On Tue, Jul 27, 2010 at 3:35 PM, Nat Sakimu

Re: [OAUTH-WG] SAML 2.0 Bearer Assertion Profile for OAuth 2.0 draft

2010-07-27 Thread Brian Eaton
On Tue, Jul 27, 2010 at 11:56 AM, Brian Campbell wrote: > There seem to be two potential arguments against it - the burden of > tracking the state and the potential that it's unnecessarily > restrictive.  I don't personally see either as being a major issue but > would like to hear from folks if t

[OAUTH-WG] On the discovery of the OAuth Signature

2010-07-27 Thread Nat Sakimura
Hi. Currently, the discovery document would have something like: { "verification_keys": { "key1":"RSA.ALqcwR...", "key2":"X509. } } It defines RSA and X509. Could we define a third type "certs_url" that points to the file that stores PEM format ce

Re: [OAUTH-WG] Facebook's experience with OAuth2.0 signatures

2010-07-27 Thread Nat Sakimura
Thanks for sharing! One question: Was there a particular reason for having signature first instead of the payload? On Tue, Jul 27, 2010 at 7:18 AM, Paul Tarjan wrote: > Facebook released an early version of the proposed signature method, with the > aim of getting real-life implementation experi

Re: [OAUTH-WG] OAuth Signature

2010-07-27 Thread Dirk Balfanz
On Tue, Jul 27, 2010 at 3:35 PM, Nat Sakimura wrote: > On Wed, Jul 28, 2010 at 1:12 AM, Dirk Balfanz wrote: > > > > > > On Tue, Jul 27, 2010 at 12:34 AM, Nat Sakimura > wrote: > >> > >> I have a fundamental question. > >> > >> While separating signature and payload by a dot "." seems ok, > >> I

Re: [OAUTH-WG] OAuth Signature

2010-07-27 Thread Nat Sakimura
On Wed, Jul 28, 2010 at 1:12 AM, Dirk Balfanz wrote: > > > On Tue, Jul 27, 2010 at 12:34 AM, Nat Sakimura wrote: >> >> I have a fundamental question. >> >> While separating signature and payload by a dot "." seems ok, >> I still have not the answer for the question "why not make everything >> int

Re: [OAUTH-WG] OAuth Signature

2010-07-27 Thread Nat Sakimura
On Wed, Jul 28, 2010 at 5:43 AM, Dick Hardt wrote: > > > On 2010-07-27, at 12:34 AM, Nat Sakimura wrote: > >> I have a fundamental question. >> >> While separating signature and payload by a dot "." seems ok, >> I still have not the answer for the question "why not make everything >> into JSON and

Re: [OAUTH-WG] OAuth Signature

2010-07-27 Thread Dick Hardt
On 2010-07-27, at 12:34 AM, Nat Sakimura wrote: > I have a fundamental question. > > While separating signature and payload by a dot "." seems ok, > I still have not the answer for the question "why not make everything > into JSON and base64url it?". bloat from base64 encoding twice > > BTW,

[OAUTH-WG] Fwd: New Version Notification for draft-campbell-oauth-saml-00

2010-07-27 Thread Brian Campbell
Now that the I-D submission process/tool is open again, I went ahead and submitted the "SAML 2.0 Bearer Assertion Profile for OAuth 2.0" as an I-D. It's basically the same as the version I posted to the WG mailing list except I added some language in the introduction stating the intended similarit

Re: [OAUTH-WG] SAML 2.0 Bearer Assertion Profile for OAuth 2.0 draft

2010-07-27 Thread Brian Campbell
On Tue, Jul 27, 2010 at 12:26 PM, Chuck Mortimore wrote: > For both of these, We intend to enforce one time use; I suspect that type of > state maintenance will get argued against by those running the large > scale consumer systems...it's manageable for us given how our Multi-tenancy > is setup.

Re: [OAUTH-WG] Moving the User Experience Extension draft forward

2010-07-27 Thread Marius Scurtescu
On Tue, Jul 27, 2010 at 10:31 AM, Justin Richer wrote: > The second use case I outlined is not a distributed app and does not fit > the case for dynamic registration at all. It is a server with a securely > stored and guarded secret. The same user can have multiple authorized > inputs (email addre

Re: [OAUTH-WG] SAML 2.0 Bearer Assertion Profile for OAuth 2.0 draft

2010-07-27 Thread Chuck Mortimore
Yes - this is intended to be a simplified parallel to web sso profile. We also intend to ship a straight adaptation of websso, as do others I believe For both of these, We intend to enforce one time use; I suspect that type of state maintenance will get argued against by those running the large

Re: [OAUTH-WG] Moving the User Experience Extension draft forward

2010-07-27 Thread Justin Richer
The second use case I outlined is not a distributed app and does not fit the case for dynamic registration at all. It is a server with a securely stored and guarded secret. The same user can have multiple authorized inputs (email addresses in this case) to this server, and all are stored with separ

Re: [OAUTH-WG] Moving the User Experience Extension draft forward

2010-07-27 Thread Torsten Lodderstedt
Good question. Probably because the authz servers wants to realize the relationship in order to apply a client (== partner) specific policy to all instances or to present the end user with a tree like view in user self care, like this My EPG Epg on iPhone Epg on Nexus One regards, Torsten.

Re: [OAUTH-WG] SAML 2.0 Bearer Assertion Profile for OAuth 2.0 draft

2010-07-27 Thread Brian Campbell
On Thu, Jul 22, 2010 at 3:39 PM, Torsten Lodderstedt wrote: > Sounds like you defining a profile of the OAuth assertion flow for using > SAML assertions complying to the SAML "Web Browser SSO Profile". I think you > should state that somewhere. There will probably be other assertion flow > profile

Re: [OAUTH-WG] Moving the User Experience Extension draft forward

2010-07-27 Thread Marius Scurtescu
Is there value in pre-registering a binary that gets distributed? How is this better than this application acting anonymously? At some point it was suggested that applications that are distributed could do automatic registration of each instance, at which point they are also issued a secret. Durin

Re: [OAUTH-WG] OAuth Signature

2010-07-27 Thread Dirk Balfanz
On Tue, Jul 27, 2010 at 12:34 AM, Nat Sakimura wrote: > I have a fundamental question. > > While separating signature and payload by a dot "." seems ok, > I still have not the answer for the question "why not make everything > into JSON and base64url it?". > > i.e., Right now, you are proposing:

Re: [OAUTH-WG] Proposed language for section 2.2 on Client Assertions

2010-07-27 Thread Eran Hammer-Lahav
Makes sense. Personally, I don't have any preference on including it or not. EHL > -Original Message- > From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf > Of Brian Campbell > Sent: Tuesday, July 27, 2010 5:49 AM > To: oauth > Subject: Re: [OAUTH-WG] Proposed language

Re: [OAUTH-WG] Moving the User Experience Extension draft forward

2010-07-27 Thread Justin Richer
Right, Torsten has nailed this use case: it's not tied to unregistered clients, though they could be useful there, too. We've seen need for this in both an installed app (actually, a Java Web Start app) and a server-based email gateway system. In both cases, one user can register multiple instances

Re: [OAUTH-WG] Proposed language for section 2.2 on Client Assertions

2010-07-27 Thread Brian Campbell
A client_id parameter would still be presented in the end user authorization request. The text Brian E. quoted is what mandates any specifications/documents/agreements that define how to use client assertions must also define the association between the client_id and some field(s) in the assertion.

Re: [OAUTH-WG] Moving the User Experience Extension draft forward

2010-07-27 Thread Torsten Lodderstedt
If I understand your proposal correctly, you assume the clients knows better than the authz server how to fit the client presentation capabilities the best. Wouldn't it be neccessary to also tell the authz server the screen orientation and available size? regards, Torsten. Am 12.07.2010 21:

Re: [OAUTH-WG] Moving the User Experience Extension draft forward

2010-07-27 Thread Torsten Lodderstedt
I think the proposed parameters are useful for registered clients, too. For installed applications, there is always the chance a user authorizes the same application (==binary==client_id?) several times, every time on a different device. It would be helpful to differentiate those copies. regar

[OAUTH-WG] OAuth Signature

2010-07-27 Thread Nat Sakimura
I have a fundamental question. While separating signature and payload by a dot "." seems ok, I still have not the answer for the question "why not make everything into JSON and base64url it?". i.e., Right now, you are proposing: base64url_encode(JSON(payload,envelope)).base64url_encode(signature