Re: [OAUTH-WG] New Version Notification for draft-hunt-oauth-bound-config-00.txt

2016-03-14 Thread Hans Zandbelt
+1, I've found the very same in OAuth deployments that I was involved in; the hard part is to give names and descriptions to these concepts so that they cover all use cases and can be applied unambiguously Hans. On 3/14/16 10:44 PM, Justin Richer wrote: I agree that this is valuable, and not

Re: [OAUTH-WG] New Version Notification for draft-hunt-oauth-bound-config-00.txt

2016-03-14 Thread John Bradley
Yes Brian and I discussed the reasons for separating audience/resource/destination from scope yesterday, and how that might impact token exchange and the need to align. I think this is a core problem that needs to be addressed. The mixup at the resource is posable because scope is too overlo

Re: [OAUTH-WG] New Version Notification for draft-hunt-oauth-bound-config-00.txt

2016-03-14 Thread Justin Richer
I agree that this is valuable, and not just for PoP. In all honesty, it’s not even really required for PoP to function in many cases — it’s just an optimization for one particular kind of key distribution mechanism in that case. In the years of deployment experience with OAuth 2, I think we’ve r

Re: [OAUTH-WG] New Version Notification for draft-hunt-oauth-bound-config-00.txt

2016-03-14 Thread Anthony Nadalin
I would really like to see a comprehensive solution not this piece work, so we know what we are solving and what we are not. -Original Message- From: OAuth [mailto:oauth-boun...@ietf.org] On Behalf Of Hans Zandbelt Sent: Monday, March 14, 2016 3:26 PM To: Phil Hunt (IDM) ; John Bradley C

Re: [OAUTH-WG] New Version Notification for draft-hunt-oauth-bound-config-00.txt

2016-03-14 Thread John Bradley
Yes I will work on another proposal for allowing clients to specify what resource they want a token for and providing the meta-data to the client about the resources that a token is valid for. We have part of it in the POP key distribution spec and talked about separating it, as it is used more

Re: [OAUTH-WG] New Version Notification for draft-hunt-oauth-bound-config-00.txt

2016-03-14 Thread Hans Zandbelt
On 3/14/16 10:17 PM, Phil Hunt (IDM) wrote: On Mar 14, 2016, at 14:13, John Bradley mailto:ve7...@ve7jtb.com>> wrote: Any client that has the resource and issuer hard coded probably doesn’t need discovery. We agree Yet any client that has hard coded a resource and 2 issuers doesn't need dis

Re: [OAUTH-WG] New Version Notification for draft-hunt-oauth-bound-config-00.txt

2016-03-14 Thread Phil Hunt (IDM)
Inline Phil > On Mar 14, 2016, at 14:13, John Bradley wrote: > > We had two mandates. One was to provide a spec for AS metadata. The other > was to mitigate the client mixup attack. The request was to do the latter > without requiring the former for clients that don’t otherwise need disco

Re: [OAUTH-WG] New Version Notification for draft-hunt-oauth-bound-config-00.txt

2016-03-14 Thread John Bradley
We had two mandates. One was to provide a spec for AS metadata. The other was to mitigate the client mixup attack. The request was to do the latter without requiring the former for clients that don’t otherwise need discovery. Returning the issuer and client_id from the authorization endpoint

Re: [OAUTH-WG] Multiple authorization servers for one resource server

2016-03-14 Thread Justin Richer
We don’t include the scopes or identity information in the token itself, so as to prevent it from leaking to parties that shouldn’t need it. The main benefit of introspection is liveness, but it also lets you reference data tied to the token that you don’t want to ship in the token itself. At

Re: [OAUTH-WG] Multiple authorization servers for one resource server

2016-03-14 Thread John Bradley
Sorry your first email didn’t mention introspection. I answered assuming a JWT. A JWE can have the issuer in the envelope, so the recipient just needs to base64url decode the envelope to see who it issuer was and from that determine where to introspect it. However if you are introspecting the

Re: [OAUTH-WG] New Version Notification for draft-hunt-oauth-bound-config-00.txt

2016-03-14 Thread Phil Hunt
Thanks to Mike and John for their feedback. I’ll take each in turn: Mike, Regarding your suggested amendments Item 1: Returning the config URL would create two problems. One,it makes bound discovery a two-step process - that adds complexity. It seems far simpler to mandate TLS (which I think

Re: [OAUTH-WG] Multiple authorization servers for one resource server

2016-03-14 Thread Mike Schwartz
This was the original requirement: " multiple authorization servers that can issue access tokens for one resource server, when the resource server receives an access token from a client application, as the first step, the resource server has to determine which authorization server to use for a

[OAUTH-WG] oauth - Requested session has been scheduled for IETF 95

2016-03-14 Thread "IETF Secretariat"
Dear Hannes Tschofenig, The session(s) that you have requested have been scheduled. Below is the scheduled session information followed by the original request. oauth Session 1 (2:00:00) Wednesday, Morning Session I 1000-1230 Room Name: Buen Ayre B size: 125 -

Re: [OAUTH-WG] Multiple authorization servers for one resource server

2016-03-14 Thread George Fletcher
For what it's worth, we deployed such a system in 2011 using signed JWTs, symmetric keys and supporting key rotation via the kid JWT header field. The body of the JWT includes 'iss', 'exp', 'uid' (for the user), 'access_token' (AS specific opaque blob), and 'validation_url' (where to validate t

Re: [OAUTH-WG] New Version Notification for draft-hunt-oauth-bound-config-00.txt

2016-03-14 Thread Anthony Nadalin
Mike, there is no need to rush standardizing the metadata since there are still obvious issues with discovery or what one thinks discovery should be and should not be. This is also not the OpenID Foundation, this group should not be constrained by what OpenID has done but we should be informed.