I was having a discussion last week regarding different uses of OAuth 
(initially around using OAuth as a binding for SAML messages) and in the 
discussion worked through the following use case.

A "client" or user-agent wants to authenticate a user to the user's IdP. 
Doing so requires signing and ideally a "proof-of-possession" mechanism 
of the user's credentials. There have already been proposals of using 
the OAuth signing mechanism with an API that passes the loginid/password 
over SSL.

What is different about this proposal, is that the loginid is specified 
as the access token value and the password is specified as the access 
token secret. This way, the password is used to sign the request but 
never traverses the connection. Use of the consumer token and secret is 
optional but works fine with the current OAuth signature mechanism.

In prinicple, OAuth is trying to keep the user from giving their 
credentials to any service other than their identity provider. However, 
in the case of a "client" wanting to authenticate the user to the user's 
identity provider (potentially where no browser exists), this seems like 
a much better mechanism than passing the credentials on the wire.

Thoughts?

Thanks,
George


--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"OAuth" group.
To post to this group, send email to oauth@googlegroups.com
To unsubscribe from this group, send email to oauth+unsubscr...@googlegroups.com
For more options, visit this group at http://groups.google.com/group/oauth?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to