Re: [OAUTH-WG] oauth with command line clients

2017-06-19 Thread Justin Richer
While it does add a vector for user error, the codes aren’t long and cryptic. Most implementations are 6 or 8 characters, and it’s recommended that they be case insensitive and not have ambiguous characters (I vs 1, O vs 0). And they should be all low ASCII, even just a subset of uppercase lette

Re: [OAUTH-WG] oauth with command line clients

2017-06-17 Thread Bill Burke
I guess the auth code flow could be used with the command line tool using the OpenID Connect "display" parameter with a value of "command-line" or "text" or something when it makes its auth request. I could go the route of defining what "command-line" display value would mean in OIDC land. Aw

Re: [OAUTH-WG] oauth with command line clients

2017-06-12 Thread Bill Burke
On 6/12/17 12:20 PM, David Waite wrote: FYI, A few years ago I did a demonstration on OpenID Connect at Cloud Identity Summit using a collection of bash scripts and command-line utilities (nc, jq). I used the macOS system command ‘open’ to launch a browser, and netcat to field the response as

Re: [OAUTH-WG] oauth with command line clients

2017-06-12 Thread Dick Hardt
+1 to the device flow if you can't pop open a system browser. If you can pop open a system browser, then a more standard flow is a better CX. On Mon, Jun 12, 2017 at 11:34 AM, Phil Hunt wrote: > +1 > > The point of OAuth is to break away from using UID/Password (basic auth). > > > The device f

Re: [OAUTH-WG] oauth with command line clients

2017-06-12 Thread Phil Hunt
+1 The point of OAuth is to break away from using UID/Password (basic auth). The device flow is the best way to allow stronger authentication of the authorizing user while still allowing a limited input device (e.g. command line) to work. Phil Oracle Corporation, Identity Cloud Services

Re: [OAUTH-WG] oauth with command line clients

2017-06-12 Thread Justin Richer
I second the recommendation to use the device flow for this kind of system. The commandline client would print out a text string for the user to enter into their browser elsewhere. If you can pop up a system browser then it's even easier and you can just use the auth code flow, but it's a lot

Re: [OAUTH-WG] oauth with command line clients

2017-06-12 Thread David Waite
To: Aaron Parecki mailto:aa...@parecki.com>> > Cc: OAuth WG mailto:oauth@ietf.org>> > Subject: [EXTERNAL] Re: [OAUTH-WG] oauth with command line clients > > I've read about these techniques, but, its just not a good user experience. > I'm thinking more of something where

Re: [OAUTH-WG] oauth with command line clients

2017-06-12 Thread Hollenbeck, Scott
From: OAuth [mailto:oauth-boun...@ietf.org] On Behalf Of Bill Burke Sent: Monday, June 12, 2017 9:23 AM To: Aaron Parecki Cc: OAuth WG Subject: [EXTERNAL] Re: [OAUTH-WG] oauth with command line clients I've read about these techniques, but, its just not a good user experience. I'

Re: [OAUTH-WG] oauth with command line clients

2017-06-12 Thread Bill Burke
I've read about these techniques, but, its just not a good user experience. I'm thinking more of something where the command line console is the sole user agent and the auth server drives a plain text based interaction much like an HTTP Server drives interaction with HTML and the browser. Th

Re: [OAUTH-WG] oauth with command line clients

2017-06-11 Thread Aaron Parecki
I've seen this done a few ways: * The Device Flow: https://tools.ietf.org/html/draft-ietf-oauth-device-flow which is what you see on browserless devices like the Apple TV logging in to a cable provider from your phone. A short code is generated and displayed on the screen, you launch a browser on

[OAUTH-WG] oauth with command line clients

2017-06-11 Thread Bill Burke
Has anybody done any spec work around doing oauth from command line interfaces? We're looking for something where the auth server can generate text-based challenges that are rendered in the console window that query for simple text input over possibly multiple requests. I'm not talking about