Re: [OAUTH-WG] Seeking Clarification: Potential Ambiguity in Specification

2012-01-09 Thread agks mehx
Please allow me to step-back and present the issue again in a different way: I think of Section 4.1.1 as an API specification. In my entire career as a programmer I have never encountered an API specification that said that some parameters were optional yet callers were required to specify them b

Re: [OAUTH-WG] Seeking Clarification: Potential Ambiguity in Specification

2012-01-09 Thread William Mills
I am just not yet convinced that it should be REQUIRED.  I think the fact that we have default language for servers to insert a NULL value for omitted params is sufficient.  Do we need that here too?  Would that make it clearer? From: agks mehx To: William Mi

Re: [OAUTH-WG] Seeking Clarification: Potential Ambiguity in Specification

2012-01-09 Thread agks mehx
That's fine and still consistent with the essence of (a), which is to require implementations to accept requests without a scope parameter. If an implementation chooses to issue scoped credentials, that's perfectly fine. My focus is solely on whether the scope parameter should be termed as OPTION

Re: [OAUTH-WG] Seeking Clarification: Potential Ambiguity in Specification

2012-01-09 Thread William Mills
Re your "a" below: No, implementations may issue scoped credentials if they have a default scope.  It says elsewhere in the spec that the scope issued by the server may not match the requested scope, which is why the server returns a scope value.  This is for informational purposes only for the

Re: [OAUTH-WG] Seeking Clarification: Potential Ambiguity in Specification

2012-01-09 Thread agks mehx
scope parameter in the HTTP requests. Two choices stand out to me: (a) keep the scope parameter truly optional which implies requiring all implementations to implement un-scoped credentials; (b) make the scope parameter REQUIRED thus removing the confusion and letting implementations choose whet

Re: [OAUTH-WG] Seeking Clarification: Potential Ambiguity in Specification

2012-01-09 Thread William Mills
There are definitely use cases for un-scoped credentials, which the implementations I have seen implement as an empty scope.  Are you worried specifically about the scope parameter in the HTTP requests, or as represented in the credential used to access the PR? ___

Re: [OAUTH-WG] Seeking Clarification: Potential Ambiguity in Specification

2012-01-09 Thread agks mehx
Hi SM and Eran, I am confused again, after re-reading Eran's response, whether or not an implementation that rejects *missing* (as opposed to empty) scope is conformant or not. (Eran, your response was a bit ambiguous on whether an implementation is free to error out on an missing scope parameter

Re: [OAUTH-WG] Native clients & 'confidentiality'

2012-01-09 Thread Paul Madsen
Thanks Eran and others for their responses FWIW & FYI, OMAP decided to phrase requirements more directly in terms of authentication to the AS (MUST for web app clients & SHOULD for native clients) rather than use the confidential/public distinction. Thanks again for your input Paul On 1/9/1

Re: [OAUTH-WG] Detecting revoked token in OAuth 2.0 client libraries

2012-01-09 Thread Andreas Åkre Solberg
Den 9. jan.2012 kl. 17:35 skrev Torsten Lodderstedt: > Hi, > > an invalid token should cause the server to reply with status code 401. Thanks for the tip, both of you. Andreas___ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinf

Re: [OAUTH-WG] Detecting revoked token in OAuth 2.0 client libraries

2012-01-09 Thread Torsten Lodderstedt
Hi, an invalid token should cause the server to reply with status code 401. regards, Torsten. Bart Wiegmans schrieb: Hi, As far as I know, the implementation of API endpoints is outside of the specification of OAuth. But the specification of Bearer Tokens state that the endpoint must retu

Re: [OAUTH-WG] Native clients & 'confidentiality'

2012-01-09 Thread Eran Hammer
The text is pretty straight forward in its intentions. A confidential client must had a secret - what's open is how well the secret needs to be protected (e.g. hard to extract) to qualify as 'capable of keeping' secrets. You can require all clients to be confidential, but without specifying what

Re: [OAUTH-WG] Error code for access token request

2012-01-09 Thread Eran Hammer
Just return HTTP 5xx. We needed the special error code because of the redirection flow. EHL From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of Antonio Sanso Sent: Friday, December 30, 2011 10:22 AM To: OAuth WG Subject: [OAUTH-WG] Error code for access token request Hi *

Re: [OAUTH-WG] Seeking Clarification: Potential Ambiguity in Specification

2012-01-09 Thread Eran Hammer
In general, you are correct. However in this case, since OAuth 2.0 does not attempt to guarantee interop between a generic client and any vendor, the vendor has the right to define its own requirements as long as they are within the spec boundaries. For example, a vendor can define a missing or

Re: [OAUTH-WG] Seeking Clarification: Potential Ambiguity in Specification

2012-01-09 Thread SM
At 14:12 08-01-2012, agks mehx wrote: I reported this to the vendor and the vendor claims that the IETF draft specification says scope is OPTIONAL and that means the vendor is free to make it required in a conforming implementation. If a bit is said to be optional, it means that it will not ca

Re: [OAUTH-WG] Detecting revoked token in OAuth 2.0 client libraries

2012-01-09 Thread Bart Wiegmans
Hi, As far as I know, the implementation of API endpoints is outside of the specification of OAuth. But the specification of Bearer Tokens state that the endpoint must return the HTTP 403 (Access Denied) status code, along with a WWW-Authenticate: Bearer response header. That should be enough

[OAUTH-WG] Detecting revoked token in OAuth 2.0 client libraries

2012-01-09 Thread Andreas Åkre Solberg
Hi, I'm trying to do an OAuth 2.0 library, and got a question: I cannot find a standardized way for an OAuth protected endpoint to report to the client that the Token is not valid (expired or revoked). As a library developer, I'd like to take away as much of possible of the OAuth logic from th