Re: [OAUTH-WG] issuing multiple tokens

2011-06-17 Thread Torsten Lodderstedt
I assume you refer to the openid parameter. This parameter is not general purpose but problem specific. Thus it is in my opinion not suited as an example for a general purpose standard. regards, Torsten. Marius Scurtescu schrieb: On Fri, Jun 17, 2011 at 12:13 PM, David Recordon wrote: > +1

Re: [OAUTH-WG] Redirection URI and Implicit grant

2011-06-17 Thread Marius Scurtescu
On Wed, Jun 15, 2011 at 7:36 PM, Manger, James H wrote: > It seems like an authorization server receiving a request with an > unregistered redirect_uri of https://example.org/ can tell the user: > > > >   “Permission will be passed to your browser then onto *example.org*” > > > > An authorization

Re: [OAUTH-WG] Redirection URI and Implicit grant

2011-06-17 Thread Marius Scurtescu
On Wed, Jun 15, 2011 at 6:09 PM, Eran Hammer-Lahav wrote: > >> -Original Message- >> From: Shane B Weeden [mailto:swee...@au1.ibm.com] >> Sent: Wednesday, June 15, 2011 3:19 PM >> To: Eran Hammer-Lahav >> Cc: OAuth WG >> Subject: Re: [OAUTH-WG] Redirection URI and Implicit grant >> >> > Fr

Re: [OAUTH-WG] issuing multiple tokens

2011-06-17 Thread Marius Scurtescu
On Fri, Jun 17, 2011 at 12:13 PM, David Recordon wrote: > +1 Eran > > On Fri, Jun 17, 2011 at 12:46 AM, Eran Hammer-Lahav > wrote: >> OAuth has been successful because of its simple architecture and because it >> is based on actual deployment experience. Offering multi-token responses >> would

Re: [OAUTH-WG] issuing multiple tokens

2011-06-17 Thread Phil Hunt
+1 Seems a reasonable approach/requirement. Phil @independentid www.independentid.com phil.h...@oracle.com On 2011-06-17, at 1:02 PM, William J. Mills wrote: > This feels right to me. Additionally, any client consuming multiple tokens > (whcih would be new) shoudl be able to add somethin

Re: [OAUTH-WG] issuing multiple tokens

2011-06-17 Thread William J. Mills
This feels right to me.  Additionally, any client consuming multiple tokens (whcih would be new) shoudl be able to add something onto the token request indicating they are capable of such.  This means we never break existing clients. From: Justin Richer To: o

Re: [OAUTH-WG] issuing multiple tokens

2011-06-17 Thread Phil Hunt
-1 on the reason not to discuss the issue now. The current limited deployment case experience of OAuth does not necessarily indicate the expected use in the future. We already know it to be MUCH broader as the password anti-pattern is very large indeed. I will also point out that this is a V. 2

Re: [OAUTH-WG] issuing multiple tokens

2011-06-17 Thread Justin Richer
Incidentally, I'd like to clarify my position that the below or any other kind of multi-token formatting doesn't belong in the core spec. -- Justin On 6/17/2011 9:46 AM, Justin Richer wrote: I completely agree that the single-token case needs to be left alone, and I rather like this idea. The

Re: [OAUTH-WG] issuing multiple tokens

2011-06-17 Thread David Recordon
+1 Eran On Fri, Jun 17, 2011 at 12:46 AM, Eran Hammer-Lahav wrote: > OAuth has been successful because of its simple architecture and because it > is based on actual deployment experience. Offering multi-token responses > would be premature standardization. I am not convinced that adding it lat

Re: [OAUTH-WG] Client authentication requirement

2011-06-17 Thread Torsten Lodderstedt
Shane B Weeden schrieb: >As I understand it, what you've described is precisely the intent of >the >refresh token. The online registration process you refer to is a >corresponding one-time authorization code flow. The authorization code >effectively becomes a one-time-use, short-lived credential

Re: [OAUTH-WG] issuing multiple tokens

2011-06-17 Thread Justin Richer
I completely agree that the single-token case needs to be left alone, and I rather like this idea. The AS would return something like: { access_token: [ { access_token: "1234656", expires_in: 3600, token_type: bearer }, { access_token: "abcdefg", expire

Re: [OAUTH-WG] Client authentication requirement

2011-06-17 Thread Shane B Weeden
As I understand it, what you've described is precisely the intent of the refresh token. The online registration process you refer to is a corresponding one-time authorization code flow. The authorization code effectively becomes a one-time-use, short-lived credential for the client instance which i

Re: [OAUTH-WG] Client authentication requirement

2011-06-17 Thread Dave Nelson
> If you aren't willing to accept the risk of native apps that can't keep > secrets, don't support such apps. We continue to say "can't keep secrets". I think what we mean is "can't keep secrets that are embedded in the code". One could imagine an install-time, leap-of-faith binding to a remotel

Re: [OAUTH-WG] issuing multiple tokens

2011-06-17 Thread Eran Hammer-Lahav
OAuth has been successful because of its simple architecture and because it is based on actual deployment experience. Offering multi-token responses would be premature standardization. I am not convinced that adding it later would entail any real technical difficulty. EHL > -Original Mess

Re: [OAUTH-WG] issuing multiple tokens

2011-06-17 Thread Torsten Lodderstedt
this is kind of a self-fulfilling prophecy. If we do not encourage implementors to use service-specific tokens by supporting it in OAuth most people will not consider it. As James pointed out, there are good reasons to use service-specific tokens in multi-service environments. That's why De