[OAUTH-WG] Re: Call for adoption - First Party Apps

2024-10-07 Thread Aaron Parecki
arer token RFC. >> >> Cheers, >> >> Vladimir >> >> >> On 16/09/2024 16:40, Pieter Kasselman wrote: >> >> Hi Vladimir >> >> >> >> Thanks for reading the draft and raising questions. See responses inline. >> >> >> >&

[OAUTH-WG] Re: Call for adoption - First Party Apps

2024-10-07 Thread Rifaat Shekh-Yusef
> > > On 16/09/2024 16:40, Pieter Kasselman wrote: > > Hi Vladimir > > > > Thanks for reading the draft and raising questions. See responses inline. > > > > Cheers > > > > Pieter > > > > *From:* Vladimir Dzhuvinov / Connect2id > >

[OAUTH-WG] Re: Call for adoption - First Party Apps

2024-09-17 Thread Vladimir Dzhuvinov / Connect2id
Pieter *From:*Vladimir Dzhuvinov / Connect2id *Sent:* Friday 13 September 2024 07:50 *To:* oauth@ietf.org *Subject:* [OAUTH-WG] Re: Call for adoption - First Party Apps I read the proposed spec and it's evident substantial work has gone into it. Congratulations for this. How does the 1s

[OAUTH-WG] Re: Call for adoption - First Party Apps

2024-09-16 Thread Pieter Kasselman
Hi Vladimir Thanks for reading the draft and raising questions. See responses inline. Cheers Pieter From: Vladimir Dzhuvinov / Connect2id Sent: Friday 13 September 2024 07:50 To: oauth@ietf.org Subject: [OAUTH-WG] Re: Call for adoption - First Party Apps I read the proposed spec and it&#

[OAUTH-WG] Re: Call for adoption - First Party Apps

2024-09-12 Thread Vladimir Dzhuvinov / Connect2id
I read the proposed spec and it's evident substantial work has gone into it. Congratulations for this. How does the 1st party flow compare to the (deprecated in OAuth 2.1) password grant? People with existing 1st party apps that rely on the password grant or consider using it are going to look

[OAUTH-WG] Re: Call for adoption - First Party Apps

2024-09-10 Thread Aaron Parecki
Neil, I don't know if you've seen the several presentations I did at the last few IETF meetings about this work, but a large part of the motivation of this work is because *currently* people are bending over backwards to provide a native user experience for their first party apps and doing so in a

[OAUTH-WG] Re: Call for adoption - First Party Apps

2024-09-10 Thread Dick Hardt
I agree with you that how we a 1P AS authenticates the user needs to be carefully examined. You may be correct that how it is done needs to be revised. My point is that many deployments are 1P deployments, and the protocol can be simpler for those use cases, which is the objective of the draft fro

[OAUTH-WG] Re: Call for adoption - First Party Apps

2024-09-10 Thread Neil Madden
I know that apps that accept credentials directly are common place. But the direction of travel has so far been to discourage that: eg deprecating ROPC, requiring use of an external vs embedded user-agent etc. (Sorry, I misremembered: it’s BCP 212 that requires this, not the security BCP — and it h

[OAUTH-WG] Re: Call for adoption - First Party Apps

2024-09-10 Thread Dick Hardt
Neil Users input credentials directly into apps all the time in OAuth -- it is at the AS. There are many deployments that use OAuth where the AS and RS are the same party. The objective of this draft (as I understand it) is to provide a simplified OAuth flow for this use case. The BCP does not ad

[OAUTH-WG] Re: Call for adoption - First Party Apps

2024-09-10 Thread Neil Madden
The draft is motivated by allowing native apps to provide a login journey for OAuth rather than using the browser. This encourages people to input credentials directly into apps, which (a) directly contradicts the advice in the security BCP, and (b) opens up users to significantly more attack vecto

[OAUTH-WG] Re: Call for adoption - First Party Apps

2024-09-09 Thread Pieter Kasselman
I, as an author, support adoption of this draft. From: Rifaat Shekh-Yusef Sent: Tuesday 3 September 2024 11:47 To: oauth Subject: [OAUTH-WG] Call for adoption - First Party Apps All, As per the discussion in Vancouver, this is a call for adoption for the First Party Apps draft: https://datatr

[OAUTH-WG] Re: Call for adoption - First Party Apps

2024-09-05 Thread Tim Cappalli
IMO, we're getting very off topic here. The WebAuthn text is not part of the draft being called for adoption. On Thu, Sep 5, 2024 at 2:15 AM Neil Madden wrote: > On 5 Sep 2024, at 05:45, David Waite wrote: > > > >  > > > >> On Sep 4, 2024, at 4:27 PM, Neil Madden > wrote: > >> > >>> On 4 Sep

[OAUTH-WG] Re: Call for adoption - First Party Apps

2024-09-04 Thread Neil Madden
On 5 Sep 2024, at 05:45, David Waite wrote: > >  > >> On Sep 4, 2024, at 4:27 PM, Neil Madden wrote: >> >>> On 4 Sep 2024, at 22:48, Watson Ladd wrote: >>> >>> I can always grab the cookie jar off the user browser if I have that >>> level of access. >> >> USB access is not privileged, but

[OAUTH-WG] Re: Call for adoption - First Party Apps

2024-09-04 Thread David Waite
> On Sep 4, 2024, at 4:27 PM, Neil Madden wrote: > > On 4 Sep 2024, at 22:48, Watson Ladd wrote: >> >> I can always grab the cookie jar off the user browser if I have that >> level of access. > > USB access is not privileged, but that’s beside the point. > > Put another way, the phishing-r

[OAUTH-WG] Re: Call for adoption - First Party Apps

2024-09-04 Thread Neil Madden
On 4 Sep 2024, at 22:48, Watson Ladd wrote: > > On Wed, Sep 4, 2024 at 2:46 PM Neil Madden wrote: >> >> >> >> On 4 Sep 2024, at 21:31, Tim Cappalli wrote: >> >>  >>> >>> Thanks, that’s good to know. Does it preserve phishing resistance? Ie the >>> app cannot spoof the rpId? >> >> >> T

[OAUTH-WG] Re: Call for adoption - First Party Apps

2024-09-04 Thread Aaron Parecki
A native UI does not rule out WebAuthn/FIDO, in fact we have an in-progress branch of the draft that shows how you could support passkeys with this spec: https://github.com/aaronpk/oauth-first-party-apps/pull/93 While there isn't an RFC for authenticating first-party apps, there is plenty of prece

[OAUTH-WG] Re: Call for adoption - First Party Apps

2024-09-04 Thread Neil Madden
I am a bit skeptical about this one. I’m not convinced we should be recommending native UI until/unless we have a really good story around authenticating first-party apps. Without such a story, I don’t think this should be adopted. Unless I’m mistaken, a native UI also rules out WebAuthn/FIDO-b

[OAUTH-WG] Re: Call for adoption - First Party Apps

2024-09-04 Thread Aaron Parecki
I, as an author of this draft, unsurprisingly support adoption. Aaron On Tue, Sep 3, 2024 at 3:47 AM Rifaat Shekh-Yusef wrote: > All, > > As per the discussion in Vancouver, this is a call for adoption for the > First Party Apps draft: > https://datatracker.ietf.org/doc/draft-parecki-oauth-fir

[OAUTH-WG] Re: Call for adoption - First Party Apps

2024-09-04 Thread Joseph Heenan
Hi I strongly support adoption. Joseph > On 3 Sep 2024, at 11:46, Rifaat Shekh-Yusef wrote: > > All, > > As per the discussion in Vancouver, this is a call for adoption for the First > Party Apps draft: > https://datatracker.ietf.org/doc/draft-parecki-oauth-first-party-apps/ > > Please, re

[OAUTH-WG] Re: Call for adoption - First Party Apps

2024-09-04 Thread Daniel Fett
+1 Am 04.09.24 um 15:30 schrieb David Brossard: I support adoption On Tue, Sep 3, 2024 at 4:03 AM Dick Hardt wrote: I support adoption. On Tue, Sep 3, 2024 at 11:47 AM Rifaat Shekh-Yusef wrote: All, As per the discussion in Vancouver, this is a call for

[OAUTH-WG] Re: Call for adoption - First Party Apps

2024-09-04 Thread David Brossard
I support adoption On Tue, Sep 3, 2024 at 4:03 AM Dick Hardt wrote: > I support adoption. > > On Tue, Sep 3, 2024 at 11:47 AM Rifaat Shekh-Yusef < > rifaat.s.i...@gmail.com> wrote: > >> All, >> >> As per the discussion in Vancouver, this is a call for adoption for the >> First Party Apps draft:

[OAUTH-WG] Re: Call for adoption - First Party Apps

2024-09-03 Thread Dick Hardt
I support adoption. On Tue, Sep 3, 2024 at 11:47 AM Rifaat Shekh-Yusef wrote: > All, > > As per the discussion in Vancouver, this is a call for adoption for the > First Party Apps draft: > https://datatracker.ietf.org/doc/draft-parecki-oauth-first-party-apps/ > > Please, reply on the mailing lis