Re: [OAUTH-WG] OAuth2 scheme

2011-04-08 Thread Eran Hammer-Lahav
Thanks James. I think overall your proposal is a good direction. I think the combination of Link and WWW-Authenticate headers (static/dynamic) discovery is interesting. If you have the time, I would love to see an I-D defining the OAuth2 authentication scheme (partial as you defined it) with cl

Re: [OAUTH-WG] Flowchart for legs of OAuth

2011-04-08 Thread Phil Hunt
I don't think you are looking at it quite correctly. The token/auth code is a session asserted by the server. The generated secret is asserted by the client. This allows the server to detect more faults with the client or attempts to intercept a particular sequence. I'm not yet convinced it is

Re: [OAUTH-WG] Flowchart for legs of OAuth

2011-04-08 Thread Skylar Woodward
Torsten, that's what the spec recommends already. That's my assumption for everything I've discussed thus far - that clients who can't keep secrets are never issued them and thus must omit them out of lack of having any. We're just splitting hairs on the definition of "omit." Also, there's con

Re: [OAUTH-WG] Flowchart for legs of OAuth

2011-04-08 Thread Skylar Woodward
I can't see the purpose of "generated secret" by the client. I fear this is going to lead down the same confusing path as the last thread on auth codes. Essentially what you're asking for is a unique session ID per grant request. If TLS is required across all connections to protect the generate

Re: [OAUTH-WG] Flowchart for legs of OAuth

2011-04-08 Thread Phil Hunt
I am assuming the outbound requests are secured by TLS, but for various reasons the return path (e.g. the redirect) might not be. Thus, one restriction would be that the server never returns the code to the client. Thus, you could submit a secret simply for the purpose of verifying the same spe

Re: [OAUTH-WG] Flowchart for legs of OAuth

2011-04-08 Thread torsten
This would be another possible standard option. As you pointed out, it would help to detect authz code theft even for native apps. It would not help wrt client authorization since there are no properties associated with the new credential. The key is: how does the authz server get to know this

Re: [OAUTH-WG] Confusing wording in section 2.1

2011-04-08 Thread Eran Hammer-Lahav
Typo. On Apr 8, 2011, at 8:04, "Andrew Arnott" mailto:andrewarn...@gmail.com>> wrote: Draft 15, section 2.1 Since requests to the authorization endpoint result in user authentication and the transmission of clear-text credentials (in the HTTP response), the authorization server MUST req

Re: [OAUTH-WG] Flowchart for legs of OAuth

2011-04-08 Thread Phil Hunt
Why not have the client app generate a random text string to be used as a request secret. The random text string would be matched during all subsequent requests by the client surrounding a particular authorization. Assuming the endpoints all require TLS for request side operations it would pre

Re: [OAUTH-WG] Flowchart for legs of OAuth

2011-04-08 Thread Torsten Lodderstedt
As to the question of interoperability, the fact that OAuth allows freedom of choice to the AS for method of authentication makes this point moot. Would you agree? (short of various providers could pooling together to standardize on an auth method outside of the spec). One possible standard

[OAUTH-WG] Confusing wording in section 2.1

2011-04-08 Thread Andrew Arnott
Draft 15, section 2.1 Since requests to the authorization endpoint result in user >authentication and the transmission of clear-text credentials (in the >HTTP response), the authorization server MUST require the use of a >transport-layer security mechanism when sending requests to the

Re: [OAUTH-WG] Flowchart for legs of OAuth

2011-04-08 Thread Skylar Woodward
I think I see the confusion now between this and Torsten's questions. The assumption is that if the client has no secret, no assertion would be made. No client authentication is performed. The app is essentially anonymous. That's how folks interpret this? So while I agree in theory, I propose t

Re: [OAUTH-WG] OAuth2 scheme

2011-04-08 Thread Manger, James H
[Sorry, I didn't see this email before I sent my last one] > Chairs - I would like to ask that you declare all discovery requirements and > use cases out of scope for v2 and the working group at this point. > > --- > > As for the error code registry and the request Mike posted, I do not thi

Re: [OAUTH-WG] Flowchart for legs of OAuth

2011-04-08 Thread Skylar Woodward
Yes, I can see how this might seem confusing. Actually, we're authenticating the client with authorization server - not a resource request. On the MAC threads we discussed how the token can be used for both. Hopefully that clears everything up, but I'll briefly address some of the questions in