Re: [OAUTH-WG] Comments on draft-ietf-oauth-dyn-reg-01

2012-11-26 Thread John Bradley
The idea is that registration is how you get/set the credential to use at the other endpoints. Bootstrapping and updating that with a bearer token is not unreasonable. The larger problem is that the password credential at the token endpoint is a bit of an anachronism. In my opinion we should be

Re: [OAUTH-WG] Comments on draft-ietf-oauth-dyn-reg-01

2012-11-26 Thread Torsten Lodderstedt
Hi Justin, Am 26.11.2012 15:51, schrieb Justin Richer: Hi Torsten, thanks for the comments. Whats the advantage of having two secrets for the same client_id, namely request_access_token and client_secret? Why not always issuing a secret and use it for authentication on this endpoint (in the s

Re: [OAUTH-WG] Comments on draft-ietf-oauth-dyn-reg-01

2012-11-26 Thread Justin Richer
Hi Torsten, thanks for the comments. Whats the advantage of having two secrets for the same client_id, namely request_access_token and client_secret? Why not always issuing a secret and use it for authentication on this endpoint (in the same way as at the token endpoint)? Two things are at pla

Re: [OAUTH-WG] Comments on draft-ietf-oauth-dyn-reg-01

2012-11-26 Thread John Bradley
Torsten, Originally in OIC we defined using the client secret to access the registration endpoint. We received a lot of feedback that having it bearer protected for the first access and password protected for subsequent access was confusing. There are also the cases where there is no need for

[OAUTH-WG] Comments on draft-ietf-oauth-dyn-reg-01

2012-11-24 Thread Torsten Lodderstedt
Hi Justin, I think your draft is a significant step forward. Thanks for putting it together. Here are my detailed comments/questions: Whats the advantage of having two secrets for the same client_id, namely request_access_token and client_secret? Why not always issuing a secret and use it f