Re: [OAUTH-WG] audience parameter in client_credentials

2023-04-18 Thread Evert Pot
On 2023-04-18 02:51, Vittorio Bertocci wrote: Hi Evert, The audience parameter isn’t standard- it was implemented before a standard modeling the corresponding concept (resource indicators) was introduced in https://www.rfc-editor.org/rfc/rfc8707.html. Audience is mostly an alias of the resour

[OAUTH-WG] audience parameter in client_credentials

2023-04-17 Thread Evert Pot
Hi list, I'm the author a OAuth2 client library[1]. I received a feature request to support the "audience" parameter on client_credentials, as seen on the following two server implementations: * Auth0: https://auth0.com/docs/api/authentication?http#authorization-code-flow-with-pkce45 *

[OAUTH-WG] New OAuth2 library for javascript/typescript

2022-06-21 Thread Evert Pot
I hope this is not inappropriate for this list, but I wrote a new OAuth2 library for JS/TS: https://github.com/badgateway/oauth2-client Some highlights: * 3KB compressed / 0 dependencies * Works on Node and in browsers. * Supports the server meta-data document, PKCE, Token introspection I hop

Re: [OAUTH-WG] TMI BFF - html meta tags over/alternative to discovery

2021-05-15 Thread Evert Pot
On 2021-05-15 11:35 a.m., Filip Skokan wrote: Hello Vittorio, Brian, everyone This is a followup to my feedback in the TMI BFF interim meeting on April 26th where I mentioned I'd bring this to the list for discussion. I proposed an alternative to using fixed endpoint locations and/or discov

Re: [OAUTH-WG] One-time token login

2021-03-02 Thread Evert Pot
ice if some other component is generating the emails as it needs no coordination with the AS. — Neil On 2 Mar 2021, at 19:04, Evert Pot wrote:  Dear list, We have a requirement to let users log in to an application via a code sent by email. This code needs to be exchanged for an access/refres

[OAUTH-WG] One-time token login

2021-03-02 Thread Evert Pot
Dear list, We have a requirement to let users log in to an application via a code sent by email. This code needs to be exchanged for an access/refresh token pair, and should only work once. The access/refresh token scope would give limited access to the application. Since we already use the

Re: [OAUTH-WG] We appear to still be litigating OAuth, oops

2021-02-25 Thread Evert Pot
On 2021-02-25 3:41 a.m., Seán Kelleher wrote: Yep, this is the big point - OAuth is designed to require the the third leg of trust that creates the NxM problem. I believe the snippet of Justin's that you quoted actually shows you how you can forgo the trust element using dynamic clie

Re: [OAUTH-WG] We appear to still be litigating OAuth, oops

2021-02-25 Thread Evert Pot
On 2021-02-25 3:22 a.m., Seán Kelleher wrote: Just to clarify, I assume in this discourse that the "server" in this client and server relationship refers to an AS/RS pair in OAuth terminology? Based on this, one big sticking point for me on the applicability of NxM, or even 1xM, is that all of

Re: [OAUTH-WG] JMAP's experience with proposing an Authentication model

2021-02-23 Thread Evert Pot
If every client and every server needs to implement "/all the popular mechanisms/" then that's not such a big deal when you're shipping the client code for your own server as part of a website, but it's a big deal if you're trying to create a general client and don't want to have to hard-code

Re: [OAUTH-WG] Usage of Password Grant

2020-05-13 Thread Evert Pot
On 2020-05-10 10:20 a.m., Aaron Parecki wrote: > Hi Beena, > > This sounds like a great use of the client credentials grant. The > password grant is being removed from OAuth 2.0 by the Security Best > Current Practice. Can you clarify what you've found useful about the > password grant that the cl

[OAUTH-WG] OAuth 2.1 mimetype

2020-05-13 Thread Evert Pot
Currently OAuth 2 uses application/json as their main mimetype for JSON responses. This has at least two drawbacks: 1. Content-negotiation is a good way to to version/alter behavior of endpoints/introduce extensions or modifications. 2. In systems that use Web Linking, it's harder to use a

[OAUTH-WG] Recommendations for OAuth in browsers

2019-12-17 Thread Evert Pot
At our company we're developing REST apis. One of the things that are pretty important to us, is developers being able to access the REST apis directly, via their browsers.Our systems typically have a middleware that converts generated hal+JSON to a HTML interface for easily browsable. When using

Re: [OAUTH-WG] Link relations for authenticating

2019-05-12 Thread Evert Pot
On 2019-05-06 2:35 p.m., Neil Madden wrote: > I don’t know the relative merits of Link headers vs .well-known, but > there is at least one other draft standard I know of that is going > down the .well-known route for this kind of thing (password changes in > this case): > > https://github.com/WICG/

Re: [OAUTH-WG] Link relations for authenticating

2019-05-06 Thread Evert Pot
Hi Benjamin, Thanks for the hint. Will give that a shot! Evert On 2019-05-06 1:38 p.m., Benjamin Kaduk wrote: > Hi Evert, > > On Thu, May 02, 2019 at 11:41:50PM -0400, Evert Pot wrote: >> Hi everyone! >> >> I've been running into a number of situations where it

[OAUTH-WG] Link relations for authenticating

2019-05-02 Thread Evert Pot
Hi everyone! I've been running into a number of situations where it would have been beneficial to have a few protocol/media-type agnositic link relation types for user authentication purposes. https://tools.ietf.org/html/draft-pot-authentication-link Nothing here is coupled to OAuth, but the lin

Re: [OAUTH-WG] Correct error code for rate limiting?

2019-02-22 Thread Evert Pot
On 2019-02-22 10:29 a.m., George Fletcher wrote: > I believe Torsten proposed an "authentication_failed" error response > in a different context. Possibly we could use that? > > Alternatively, OpenID Connect defines a 'login_required' error that > could work in this context as well. It doesn't fit

[OAUTH-WG] draft-hardt-oauth-distributed suggestions

2018-09-28 Thread Evert Pot
I read the Distributed OAuth draft, and I have a few comments and questions: The draft defines 2 new link relations. "resource_uri" and "oauth_server_metadata_uri". However, the underscore is actually invalid[1]. On the IANA Links Relations registry[2], most existing link relations use dashes, or

Re: [OAUTH-WG] Link header for 401 responses

2018-09-24 Thread Evert Pot
org/arch/browse/oauth/?q=Distributed+OAuth&gbt=1&index=m1TUuh7Tcha9tuDrCraIrkjy73o > > So I guess to answer your question, there is interest in it and there > is already some work in the form of a draft. Your input into > developing that document would be welcomed. > &

Re: [OAUTH-WG] Link header for 401 responses

2018-09-22 Thread Evert Pot
ing on out-of-band knowledge of which authorization server belongs to which client resource. On 09/22/2018 03:54 PM, Phil Hunt wrote: > Evert, > > See step “B” in sec 4.2 of RFC6749. The AS worries about authenticating the > user. > > Phil > >> On Sep 22, 2018, at 1

[OAUTH-WG] Link header for 401 responses

2018-09-22 Thread Evert Pot
Dear list, Apologies if this has been brought up before. I searched the archives but didn't find anything related. I am working on a web application + api that uses OAuth2 implicit flow and Bearer tokens. It occurred to that when the API responds with a 401 request, a useful addition would be tha