Re: [OAUTH-WG] Question regarding draft-hunt-oauth-v2-user-a4c

2014-06-05 Thread John Bradley
Using structured access tokens to do delegation or convey other claims to the RS can and should be separate from the assertions delivered to the client. The tokens will have different audiences and if using Proof of Possession different presenter key material. Using one token for both things ma

Re: [OAUTH-WG] Question regarding draft-hunt-oauth-v2-user-a4c

2014-06-05 Thread John Bradley
Looking at the latest draft http://tools.ietf.org/html/draft-hunt-oauth-v2-user-a4c-03 it is better. As far as I can see he deltas from Connect Basic profile are: 1 A new response_type "code_id_token" (I think the similarity to the "code id_token" response_type may cause some confusion but tha

Re: [OAUTH-WG] Question regarding draft-hunt-oauth-v2-user-a4c

2014-06-05 Thread Phil Hunt
A core issue for me is that authentication and access are two separate functions. Some clients want authentication context only. Some want access only, some want both. If you combine both complexity ensues (such as loss of opaqueness, needing introspection, etc etc). Phil phil.h...@yahoo.c

Re: [OAUTH-WG] Question regarding draft-hunt-oauth-v2-user-a4c

2014-06-05 Thread Bill Mills
If you need user info based on an access token the introspection endpoint is the right way to go.  Even so, there's issues with using an access token as an authenticator and this is a major reason why OpenID is the right way to go for authn. On Thursday, June 5, 2014 12:42 PM, Anthony Nadalin

Re: [OAUTH-WG] Question regarding draft-hunt-oauth-v2-user-a4c

2014-06-05 Thread Anthony Nadalin
Delegation From: Torsten Lodderstedt [mailto:tors...@lodderstedt.net] Sent: Thursday, June 5, 2014 12:45 PM To: Anthony Nadalin Cc: Bill Mills; Phil Hunt; oauth@ietf.org Subject: Re: [OAUTH-WG] Question regarding draft-hunt-oauth-v2-user-a4c Examples? Am 05.06.2014 um 21:42 schrieb Anthony Nadal

Re: [OAUTH-WG] Question regarding draft-hunt-oauth-v2-user-a4c

2014-06-05 Thread Justin Richer
No, it's great exactly *because* you can represent things in the access token that make sense for your app/domain and it stays opaque to the parties who shouldn't care: the clients. Access tokens aren't opaque to the AS (or PR), because of OAuth's flexibility of token formats you can use what wo

Re: [OAUTH-WG] Question regarding draft-hunt-oauth-v2-user-a4c

2014-06-05 Thread Torsten Lodderstedt
Examples? > Am 05.06.2014 um 21:42 schrieb Anthony Nadalin : > > It’s great but some ways but also very limiting if you are counting on > certain requirements to be represented in the access token > > From: OAuth [mailto:oauth-boun...@ietf.org] On Behalf Of Torsten Lodderstedt > Sent: Thursday

Re: [OAUTH-WG] Question regarding draft-hunt-oauth-v2-user-a4c

2014-06-05 Thread Anthony Nadalin
It’s great but some ways but also very limiting if you are counting on certain requirements to be represented in the access token From: OAuth [mailto:oauth-boun...@ietf.org] On Behalf Of Torsten Lodderstedt Sent: Thursday, June 5, 2014 12:40 PM To: Bill Mills Cc: Phil Hunt; oauth@ietf.org Subject

Re: [OAUTH-WG] Question regarding draft-hunt-oauth-v2-user-a4c

2014-06-05 Thread Torsten Lodderstedt
+1 the access token is opaque to the client. That's great! Let's keep it that way. > Am 05.06.2014 um 21:20 schrieb Bill Mills : > > Can't agree more with the peril of overloading auth information into an > access token. > > > On Thursday, June 5, 2014 11:05 AM, Mike Jones > wrote: > > >

Re: [OAUTH-WG] draft-ietf-oauth-dyn-reg-17 review

2014-06-05 Thread Vladimir Dzhuvinov
BTW, I just spotted a problem with the example response at the bottom of section 4.1, the HTTP status code should be 201 Created: http://tools.ietf.org/html/draft-ietf-oauth-dyn-reg-17#section-4.1 Vladimir ___ OAuth mailing list OAuth@ietf.org https:/

Re: [OAUTH-WG] Question regarding draft-hunt-oauth-v2-user-a4c

2014-06-05 Thread Bill Mills
Can't agree more with the peril of overloading auth information into an access token. On Thursday, June 5, 2014 11:05 AM, Mike Jones wrote: Hannes, the Access Token and ID Token do quite different things and have different structures and properties.  The Access Token is an opaque value th

Re: [OAUTH-WG] draft-ietf-oauth-dyn-reg-17 review

2014-06-05 Thread Mike Jones
The answer to your question about the Initial Access Token and Software Statement is highly parallel to the answer to your question in the other thread about the Access Token and ID Token. :-) The Initial Access Token and the Software Statement do quite different things and have different struc

Re: [OAUTH-WG] Question regarding draft-hunt-oauth-v2-user-a4c

2014-06-05 Thread Mike Jones
Hannes, the Access Token and ID Token do quite different things and have different structures and properties. The Access Token is an opaque value that grants access to resources. An ID Token is a non-opaque JWT security token that makes claims about the authentication that occurred. You can h

Re: [OAUTH-WG] draft-ietf-oauth-dyn-reg-17 review

2014-06-05 Thread Phil Hunt
Hannes, I’ll clarify the software statement and let Mike/Justin respond for the rest. Phil @independentid www.independentid.com phil.h...@oracle.com On Jun 5, 2014, at 12:42 AM, Hannes Tschofenig wrote: > Hi Justin, Hi Mike, > > thanks for updating the document so quickly. > > I have re-

Re: [OAUTH-WG] Question regarding draft-hunt-oauth-v2-user-a4c

2014-06-05 Thread Phil Hunt
You are correct. Just adding to access token would make a lot of devs happy and that certainly should be discussed. Two requirements issues: 1. A key use case is passing auth ctx only. An access token means asking for consent to access something. This causes many sites to loose new users. Auth

[OAUTH-WG] Question regarding draft-hunt-oauth-v2-user-a4c

2014-06-05 Thread Hannes Tschofenig
Hi Phil, thanks for producing this document write-up. I have a somewhat basic question regarding the document. The id token contains the following mandatory information: - sis: issuer - sub: subject - aud: audience - iat: issued at - exp: expiry - auth_time: time when the end user was authe

[OAUTH-WG] draft-ietf-oauth-dyn-reg-17 review

2014-06-05 Thread Hannes Tschofenig
Hi Justin, Hi Mike, thanks for updating the document so quickly. I have re-read the new version and I have a few minor comments. You write: "The following client metadata fields are defined by this specification. All client metadata fields are OPTIONAL." I guess you mean "Optional to implement