Thanks Dick. OIDF is also trying to write a white paper why in-app browser for this purpose is a bad idea.
=nat via iPhone 2015/05/09 4:28、Dick Hardt <dick.ha...@gmail.com> のメッセージ: > Glad to know I was not missing something. > > I explained all the logic in my first response to the reviewer. Next response > was to comply with 10.6 > > I have filed an appeal. Will keep list updated. > > Aaron: the LinkedIn API claw back really sucks. Facebook turned down APIs > earlier than v2 last month, and now there is little profile data from them. > Getting data out of the silos has gotten much tougher. > > >> On Fri, May 8, 2015 at 7:46 PM, Joost van Dijk <vandijk.jo...@gmail.com> >> wrote: >> This is indeed very bad news. Not just because we are developing apps that >> use the same approach, but also because we have declared in-app browsers to >> be Bad Practice when used for authentication because of the reasons you >> described. >> >> Furthermore, it just won't work. Our OAuth authorization server >> authenticates to an identity federation where very diverse authentication >> methods are used, such as TLS client authentication. An app won't have >> access to the private key needed to authenticate when using an in-app >> browser: you really need to open the platform browser for this to work. >> >> Cheers, >> >> -- >> Joost >> >>> On 08 May 2015, at 18:21, Dick Hardt <dick.ha...@gmail.com> wrote: >>> >>> I have an app that is was submitted to TestFlight that was rejected for >>> opening up Safari for getting authorization from Google or LinkedIn. >>> >>> Apple wants me to load the Google or LinkedIn page with an in-app browser >>> to comply with >>> >>> 10.6 - Apple and our customers place a high value on simple, refined, >>> creative, well thought through interfaces. They take more work but are >>> worth it. Apple sets a high bar. If your user interface is complex or less >>> than very good, it may be rejected >>> >>> I'm thinking this is crazy >>> >>> The user experience is better bouncing to Safari as it: >>> >>> 1) clearly signals to the user that they are providing their credentials to >>> Google or LinkedIn >>> >>> 2) Google and LinkedIn can pre-fill the username if they have previously >>> used the browser at either site >>> >>> 3) If they Safari has their credentials, Safari can fill them in at Google >>> / LinkedIn >>> >>> From a security point of view, the in-app webview has >>> >>> 1) NO signal to the user they are providing their credentials to LinkedIn >>> or Google. >>> >>> 2) Looks like a new browser instance to LinkedIn and Google rather than an >>> already known device. >>> >>> I'm surprised Apple is taking this stance. Am I missing something? >>> >>> -- Dick >>> >>> -- >>> You received this message because you are subscribed to the Google Groups >>> "OAuth" group. >>> To unsubscribe from this group and stop receiving emails from it, send an >>> email to oauth+unsubscr...@googlegroups.com. >>> For more options, visit https://groups.google.com/d/optout. >> >> -- >> You received this message because you are subscribed to the Google Groups >> "OAuth" group. >> To unsubscribe from this group and stop receiving emails from it, send an >> email to oauth+unsubscr...@googlegroups.com. >> For more options, visit https://groups.google.com/d/optout. > > -- > You received this message because you are subscribed to the Google Groups > "OAuth" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to oauth+unsubscr...@googlegroups.com. > For more options, visit https://groups.google.com/d/optout. -- You received this message because you are subscribed to the Google Groups "OAuth" group. To unsubscribe from this group and stop receiving emails from it, send an email to oauth+unsubscr...@googlegroups.com. For more options, visit https://groups.google.com/d/optout.