Re: [OAUTH-WG] draft-hunt-oauth-client-association-00

2013-11-01 Thread Josh Mandel
Hi Justin, Well, I spent ~20min to read over this pair of drafts (association + software_statement). I have to say that in isolation, I find this approach quite reasonable. In particular: 1. This approach does *not* require both a bearer token and software_statement for the registration step. The

Re: [OAUTH-WG] draft-hunt-oauth-client-association-00

2013-11-01 Thread Phil Hunt
I think for the client types, the trick is to try to make it restrictive enough so there's no second-guessing the client developer has to do about what SPs will accept. The line I was drawing was for implicit/javascript clients in the current draft. We could open it to a simple decision for th

Re: [OAUTH-WG] draft-hunt-oauth-software-statement-00

2013-11-01 Thread Phil Hunt
Phil @independentid www.independentid.com phil.h...@oracle.com On 2013-11-01, at 1:17 PM, Hannes Tschofenig wrote: > Hi Phil, > > thanks for the quick response. > > > Am 01.11.13 20:54, schrieb Phil Hunt: >> See below... Phil >> >> @independentid www.independentid.com phil.h...@oracle.com

[OAUTH-WG] draft-ietf-oauth-jwt-bearer-06

2013-11-01 Thread Hannes Tschofenig
Hi Mike, Hi all, I read through draft-ietf-oauth-jwt-bearer-06 in an attempt to find out whether I would be able to produce an interoperable implementation from this document. A few minor things came to my mind: Section 3: You write: " 1. The JWT MUST contain an "iss" (issuer) claim th

Re: [OAUTH-WG] draft-hunt-oauth-client-association-00

2013-11-01 Thread Hannes Tschofenig
Hi Phil, We definitely have to figure out how the differentiation is made so that a developer (or someone who deploys the technology) understands the scenario they are in and what the implications are. At the moment I would struggle a bit. Using examples is certainly a good idea, like you did be

Re: [OAUTH-WG] draft-hunt-oauth-software-statement-00

2013-11-01 Thread Hannes Tschofenig
Hi Phil, thanks for the quick response. Am 01.11.13 20:54, schrieb Phil Hunt: See below... Phil @independentid www.independentid.com phil.h...@oracle.com On 2013-11-01, at 12:13 PM, Hannes Tschofenig wrote: Hi Phil, Hi Tony, Hi all, regarding this document I believe there are the followi

Re: [OAUTH-WG] Next Steps for the JSON Web Token Document

2013-11-01 Thread Hannes Tschofenig
Thank you for your review, Brian. Am 01.11.13 20:53, schrieb Brian Campbell: I just saw http://www.ietf.org/mail-archive/web/oauth/current/msg12218.html from Hannes noting reviews on draft-ietf-oauth-json-web-token and was surprised that mine wasn't included. So I went looking for it and apparen

Re: [OAUTH-WG] draft-hunt-oauth-client-association-00

2013-11-01 Thread Phil Hunt
Hannes, Great timing! This is an aspect that I think deserves more discussion. One of the challenges was to draw a clear line of distinction between transient and dynamic. Transient clients are really meant for javascript clients that decide to connect to a particular end-point on the fly.

Re: [OAUTH-WG] draft-hunt-oauth-software-statement-00

2013-11-01 Thread Phil Hunt
See below... Phil @independentid www.independentid.com phil.h...@oracle.com On 2013-11-01, at 12:13 PM, Hannes Tschofenig wrote: > Hi Phil, Hi Tony, Hi all, > > regarding this document I believe there are the following questions the group > may want to think about: > > a) Is the lifecycle of

Re: [OAUTH-WG] Next Steps for the JSON Web Token Document

2013-11-01 Thread Brian Campbell
I just saw http://www.ietf.org/mail-archive/web/oauth/current/msg12218.htmlfrom Hannes noting reviews on draft-ietf-oauth-json-web-token and was surprised that mine wasn't included. So I went looking for it and apparently I didn't actually send it to the list. But I did find it and am including wha

[OAUTH-WG] draft-ietf-oauth-json-web-token-12

2013-11-01 Thread Hannes Tschofenig
Hi Mike, Hi all, I was just trying to find out whether version -12 of the JWT spec addresses prior comments and the diff version of the document does not really give that indication. To me it seems that version -12 of the document was published to update -11 in an attempt to create an alignme

[OAUTH-WG] draft-hunt-oauth-software-statement-00

2013-11-01 Thread Hannes Tschofenig
Hi Phil, Hi Tony, Hi all, regarding this document I believe there are the following questions the group may want to think about: a) Is the lifecycle of software development (Figure 1) common accross several companies? b) The document defines a number of attributes. Are those attributes als

[OAUTH-WG] Client Association alternative to Dyn Reg and stateless oauth client

2013-11-01 Thread Phil Hunt
I would like to encourage people to read the client association draft before monday. http://tools.ietf.org/html/draft-hunt-oauth-client-association-00.txt and the related http://tools.ietf.org/html/draft-hunt-oauth-software-statement-00.txt Most of the draft just focuses on background and taxon

[OAUTH-WG] draft-hunt-oauth-client-association-00

2013-11-01 Thread Hannes Tschofenig
Hi Phil, Hi Tony, Hi all, I re-read the document and I believe the most important concept it introduces is the classification of different associations, namely into 'static', 'dynamic', and 'transient'. This is certainly something worthwhile to discuss during the meeting and to ensure that it

Re: [OAUTH-WG] draft-bradley-stateless-oauth-client-00

2013-11-01 Thread Hannes Tschofenig
Hi John, thanks for the super-quick response. Am 01.11.13 19:18, schrieb John Bradley: The client_id would continue to be opaque to the client as it is now. The AS can send a JWE using AES_128_CBC_HMAC_SHA_256 to encrypt and provide integrity if it is using a symmetric key (probably the simple

Re: [OAUTH-WG] draft-bradley-stateless-oauth-client-00

2013-11-01 Thread John Bradley
The client_id would continue to be opaque to the client as it is now. The AS can send a JWE using AES_128_CBC_HMAC_SHA_256 to encrypt and provide integrity if it is using a symmetric key (probably the simplest thing if we are talking about a single registration endpoint paired with a single AS)

[OAUTH-WG] draft-bradley-stateless-oauth-client-00

2013-11-01 Thread Hannes Tschofenig
Hi John, Hi all, I read your document and here a few remarks. In the dynamic client registration conference calls the topic of the stateless client was raised since there was the argument in the air that the current OAuth 2.0 RFC requires clients to be stateless due to the nature of the clien