Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-11.txt

2013-05-24 Thread Phil Hunt
Justin, Thanks. I think this resolved all of my syntax issues. The lifecycle text is very helpful. I still want to continue discussion on initial access and reg access. We can address in other threads. Thx Phil On 2013-05-24, at 14:10, "Richer, Justin P." wrote: > New Dynamic Registrati

Re: [OAUTH-WG] Initial Client Credential - Dynamic Registration

2013-05-24 Thread Phil Hunt
The use cases I have heard of from Justin and Morteza at IIW are based on federated scenarios. These are not just locally asserted tokens. Your assertion that the tokens are local and my assertion they are federated suggests there are things that must be sorted out/understood. I'm merely implyi

Re: [OAUTH-WG] Initial Client Credential - Dynamic Registration

2013-05-24 Thread John Bradley
Phil, The OAuth token used authorize access to the registration endpoint( if one is required) would be issued by the registration server via some method eg cut and paste from a developer portal, email or perhaps via OAuth to a Developer API management application. That is declared out of sc

Re: [OAUTH-WG] Initial Client Credential - Dynamic Registration

2013-05-24 Thread Nat Sakimura
=nat via iPhone May 25, 2013 7:16、Phil Hunt wrote: On 2013-05-24, at 2:54 PM, John Bradley wrote: I agree with Justin. If you want tight authentication on the AS that issues the tokens we can use OAuth for that with short lived tokens granted based on a SAML SSO , PIV card or whatever float

Re: [OAUTH-WG] Initial Client Credential - Dynamic Registration

2013-05-24 Thread Phil Hunt
Phil @independentid www.independentid.com phil.h...@oracle.com On 2013-05-24, at 2:54 PM, John Bradley wrote: > I agree with Justin. > > If you want tight authentication on the AS that issues the tokens we can use > OAuth for that with short lived tokens granted based on a SAML SSO , PIV c

Re: [OAUTH-WG] Initial Client Credential - Dynamic Registration

2013-05-24 Thread John Bradley
I agree with Justin. If you want tight authentication on the AS that issues the tokens we can use OAuth for that with short lived tokens granted based on a SAML SSO , PIV card or whatever floats your boat for authentication. How the tokens are issued to the OAuth client doing the registration (n

Re: [OAUTH-WG] Implicit clients in Dynamic Registration

2013-05-24 Thread John Bradley
Phil, I think the horse is out of the barn on implicit flow. Many websites use implicit rather than code now, it is no worse, and perhaps better than using code flow with a client that is not confidential( though Dynamic registration can dix the public client code flow problem for native apps

Re: [OAUTH-WG] Implicit clients in Dynamic Registration

2013-05-24 Thread Richer, Justin P.
I can see what you're trying to do there, but I agree that it's a bit of a non-starter. It assumes that clients even can be expired (which requires time-based processing of a client, not something most AS's are set up to do today, though it's far from impossible). And an in-browser client is lik

Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-11.txt

2013-05-24 Thread Richer, Justin P.
New Dynamic Registration draft is published, incorporating much of the discussion from the group this week. Some normative changes that should have minimal impact: - "expires_at" is now "client_secret_expires_at" - "issued_at" is now "client_id_issued_at" - creation of an IANA registry for to

Re: [OAUTH-WG] Initial Client Credential - Dynamic Registration

2013-05-24 Thread Richer, Justin P.
I completely disagree with this assessment. The latest draft (which was just posted) has new language describing what this token is and what it's for, and I hope that will clear things up. But even so, let me try to address your concerns in-line. On May 24, 2013, at 4:02 PM, Phil Hunt mailto:p

Re: [OAUTH-WG] Implicit clients in Dynamic Registration

2013-05-24 Thread Josh Mandel
I expect this is a non-starter, but dyn-reg *could* allow the client ti include a "please expire me in xx min" flag in the registration request (avoiding need for explicit cleanup later). -J On Fri, May 24, 2013 at 1:36 PM, Richer, Justin P. wrote: > I agree with Josh, and I believe that this

[OAUTH-WG] I-D Action: draft-ietf-oauth-dyn-reg-11.txt

2013-05-24 Thread internet-drafts
A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Web Authorization Protocol Working Group of the IETF. Title : OAuth 2.0 Dynamic Client Registration Protocol Author(s) : Justin Richer

Re: [OAUTH-WG] Implicit clients in Dynamic Registration

2013-05-24 Thread Richer, Justin P.
I agree with Josh, and I believe that this kind of application should definitely be supported. One of my goals with the Dynamic Registration draft was to make it so that it could be used for all the various flavors of OAuth that people are using today. But that said, I'm not at all against givin

Re: [OAUTH-WG] Implicit clients in Dynamic Registration

2013-05-24 Thread Josh Mandel
I think this discussion mixes two separable questions: 1. Should dyn-reg support client-side browser-based apps (which need client_ids for each AS they talk to, even if they only talk briefly and then throw the credentials away)? 2. Which authorization flows are available to clients? I have exa

[OAUTH-WG] Initial Client Credential - Dynamic Registration

2013-05-24 Thread Phil Hunt
I have been struggling with the concept of an initial client credential covered in the current draft (rev 10): The Client Registration Endpoint MAY accept an initial authorization credential in the form of an OAuth 2.0 [RFC6749] access token in order to limit registration to only previously

[OAUTH-WG] Implicit clients in Dynamic Registration

2013-05-24 Thread Phil Hunt
I wanted to bring out a quick discussion to ask the question if it makes sense to support implicit clients in dynamic registration. By definition, implicit clients are unauthenticated. Therefore the only purpose to register an implicit client is to obtain a client_id with a particular AS instan

Re: [OAUTH-WG] Question/comments on draft-ietf-oauth-revocation-09

2013-05-24 Thread Barry Leiba
> As I recall, the argument was that without this, someone could just keep > fishing at the > token revocation endpoint for valid tokens. Though thinking about it now, > even if you > did get a "token was valid" response, the token wouldn't be valid anymore and > it wouldn't > do you much good.

Re: [OAUTH-WG] Question/comments on draft-ietf-oauth-revocation-09

2013-05-24 Thread Richer, Justin P.
As I recall, the argument was that without this, someone could just keep fishing at the token revocation endpoint for valid tokens. Though thinking about it now, even if you did get a "token was valid" response, the token wouldn't be valid anymore and it wouldn't do you much good. It's possibl

Re: [OAUTH-WG] Question/comments on draft-ietf-oauth-revocation-09

2013-05-24 Thread Barry Leiba
> Sergey has the correct interpretation -- it's to prevent a class of oracle > attacks. > Think of it this way, if you go to revoke a token, and the token wasn't there > in the > first place, the end result is the same: the token's not there when you're > done. So > it's a 200 because the result

Re: [OAUTH-WG] Question/comments on draft-ietf-oauth-revocation-09

2013-05-24 Thread Richer, Justin P.
Sergey has the correct interpretation -- it's to prevent a class of oracle attacks. Think of it this way, if you go to revoke a token, and the token wasn't there in the first place, the end result is the same: the token's not there when you're done. So it's a 200 because the result is what you w

Re: [OAUTH-WG] Question/comments on draft-ietf-oauth-revocation-09

2013-05-24 Thread Sergey Beryozkin
Hi On 23/05/13 21:57, Lewis Adam-CAL022 wrote: Hi, Section 2.2 (Revocation Response) of draft-ietf-oauth-revocation-09 states: The authorization server responds with HTTP status code 200 if the token has been revoked sucessfully or if the client submitted an invalid token. The conten