Am 30.06.2011 18:39, schrieb Eran Hammer-Lahav:

This debate has been going on for 3 years. In OAuth 1.0 it was called token attributes. Someone just need to write a proposal. Last time I tried, no one wanted to implement any such mechanism.


we already did

regards,
Torsten.

EHL

*From:*Lodderstedt, Torsten [mailto:t.lodderst...@telekom.de]
*Sent:* Thursday, June 30, 2011 6:38 AM
*To:* Eran Hammer-Lahav; George Fletcher; oauth@ietf.org
*Subject:* AW: [OAUTH-WG] Resource Owner Password Credentials question/feedback

>Issuing a refresh token is more a function of the access grant duration than anything else.

Agreed. How shall the user influence this duration? There is no direct interaction between authz server and end-user.

>The client can always throw away tokens when it is done of if the user doesn't want to "stay connected", but issuing long term credentials is not >really something the client asks but the server decides (based on user approval and policy).

This is a waste of resources. Moreover, how do you explain the end-user if a long-term authorization shows up in his service providers account management screen for a certain client he never explicitly authorized for long-term access?

regards,

Torsten.

*Von:*Eran Hammer-Lahav [mailto:e...@hueniverse.com] <mailto:[mailto:e...@hueniverse.com]>
*Gesendet:* Donnerstag, 30. Juni 2011 10:48
*An:* Lodderstedt, Torsten; George Fletcher; oauth@ietf.org <mailto:oauth@ietf.org> *Betreff:* RE: [OAUTH-WG] Resource Owner Password Credentials question/feedback

Issuing a refresh token is more a function of the access grant duration than anything else. The client can always throw away tokens when it is done of if the user doesn't want to "stay connected", but issuing long term credentials is not really something the client asks but the server decides (based on user approval and policy).

EHL

*From:*oauth-boun...@ietf.org <mailto:oauth-boun...@ietf.org> [mailto:oauth-boun...@ietf.org] <mailto:[mailto:oauth-boun...@ietf.org]> *On Behalf Of *Lodderstedt, Torsten
*Sent:* Thursday, June 30, 2011 1:10 AM
*To:* George Fletcher; oauth@ietf.org <mailto:oauth@ietf.org>
*Subject:* Re: [OAUTH-WG] Resource Owner Password Credentials question/feedback

No exactly the topic but also related to this grant type

There is currently no parameter the client could use to explicitly request a refresh token. So server-policies based on user, client and scope are the only mean to decide whether a refresh token is issued or not. I consider this to limited as there might be the desire this control this per authorization process, i.e. I client could ask the user whether he/she wants to "stay connected" or "stay logged in". A parameter to pass this information to the authz server would be useful.

regards,

Torsten.

*Von:*George Fletcher [mailto:gffle...@aol.com] <mailto:[mailto:gffle...@aol.com]>
*Gesendet:* Dienstag, 28. Juni 2011 17:47
*An:* oauth@ietf.org <mailto:oauth@ietf.org>
*Betreff:* [OAUTH-WG] Resource Owner Password Credentials question/feedback

I'm working on spec'ing out a use of the Resource Owner Password Credentials flow and in trying to map out possible error cases, realized that there is no good error for the case that the resource owner's password credentials are invalid. Section 4.3 of draft 16 references section 5.2 for errors. The list of available errors in section 5.2 are...

    error
          REQUIRED.  A single error code from the following:
          invalid_request
                The request is missing a required parameter, includes an
                unsupported parameter or parameter value, repeats a
                parameter, includes multiple credentials, utilizes more
                than one mechanism for authenticating the client, or is
                otherwise malformed.
          invalid_client
                Client authentication failed (e.g. unknown client, no
                client credentials included, multiple client credentials
                included, or unsupported credentials type).  The
                authorization server MAY return an HTTP 401
                (Unauthorized) status code to indicate which HTTP
                authentication schemes are supported.  If the client
                attempted to authenticate via the "Authorization" request
                header field, the authorization server MUST respond with
                an HTTP 401 (Unauthorized) status code, and include the
                "WWW-Authenticate" response header field matching the
                authentication scheme used by the client.
          invalid_grant
                The provided authorization grant is invalid, expired,
                revoked, does not match the redirection URI used in the
                authorization request, or was issued to another client.
          unauthorized_client
                The authenticated client is not authorized to use this
                authorization grant type.
          unsupported_grant_type
                The authorization grant type is not supported by the
                authorization server.
          invalid_scope
                The requested scope is invalid, unknown, malformed, or
                exceeds the scope granted by the resource owner.
I'm wondering if others have chosen one of these values to represent the "invalid_credentials" use case.

Thanks,
George


_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to