Re: [OAUTH-WG] AD review of draft-ietf-oauth-native-apps

2017-05-18 Thread John Bradley
2017 2:14 PM To: William Denniss<mailto:wdenn...@google.com> Cc: oauth@ietf.org<mailto:oauth@ietf.org> Subject: Re: [OAUTH-WG] AD review of draft-ietf-oauth-native-apps Hi, Will there be a new document posted today/tomorrow to address last call comments/the GenART review? I'd l

Re: [OAUTH-WG] AD review of draft-ietf-oauth-native-apps

2017-05-18 Thread Kathleen Moriarty
Hi, Will there be a new document posted today/tomorrow to address last call comments/the GenART review? I'd like to add the ballot for the IESG review and telechat next week, , but it would be best on the updated draft to avoid duplicate comments. Thank you, Kathleen On Tue, May 2, 2017 at 2:34

Re: [OAUTH-WG] AD review of draft-ietf-oauth-native-apps

2017-05-02 Thread Kathleen Moriarty
Hi William, Thank you for making the updates. Just a few notes inline and I'll kick off IETF last call. On Wed, Apr 26, 2017 at 5:50 PM, William Denniss wrote: > Thank you for your review Kathleen. > > Version 10 which addresses your comments is out: > https://tools.ietf.org/html/draft-ietf-oau

Re: [OAUTH-WG] AD review of draft-ietf-oauth-native-apps

2017-04-25 Thread Kathleen Moriarty
Hi, On Tue, Apr 25, 2017 at 9:09 AM, John Bradley wrote: > Thanks Kathleen, > > William and I will address these shortly. > > We can take out the IANA section completely if you think it is better. No, I think it's fine. Let's see what happens. It could be helpful text for some readers, I was j

Re: [OAUTH-WG] AD review of draft-ietf-oauth-native-apps

2017-04-25 Thread John Bradley
Thanks Kathleen, William and I will address these shortly. We can take out the IANA section completely if you think it is better. In the current implementations on Android and iOS Universal Links/App Links and are only http or HTTPS schema URI making them URL. So while all URL are URI, we cou

[OAUTH-WG] AD review of draft-ietf-oauth-native-apps

2017-04-24 Thread Kathleen Moriarty
Hello, Thanks for taking the time to document this best practice and the implementations in the appendix. I have one comment and a few nits. Security Considerations: I think it would go a long way to organize these as ones that apply to this best practice and ones (8.1 and the example in 8.2) abo