That seems reasonable to me. We should make sure to distill this discussion 
into a "security considerations" section for that profile.

On Mar 10, 2010, at 8:55 AM, Dick Hardt wrote:

> +1
> 
> On 2010-03-10, at 8:51 AM, Allen Tom wrote:
> 
>> +1
>> 
>> I'd like to keep the existing username/password profile as it currently is,
>> with the understanding that Service Providers may add additional proprietary
>> parameters and secret sauce to authenticate the client.
>> 
>> Allen
>> 
>> 
>> On 3/9/10 9:32 PM, "Brian Eaton" <bea...@google.com> wrote:
>> 
>>> On Tue, Mar 9, 2010 at 12:02 PM, David Recordon <record...@gmail.com> wrote:
>>>> I'd rather support the client secret and document the hell out of the
>>>> security considerations for the profile.
>>> 
>>> Thinking out loud... what if we called it the "server you trust to use
>>> username and password profile" instead of the client app profile?
>>> 
>>> That would actually meet the xbox use case, as follows:
>>> 
>>> 1) Microsoft uses magic security sauce to authenticate the xbox to
>>> their servers.
>>>   This magic security sauce will be obscure, will probably change
>>> frequently, and is probably going to rely on hardware security
>>> modules.  It makes no sense to standardize this, because the goal is
>>> specifically to avoid interoperable implementations. =)
>>> 
>>> 2) Their servers hold the client secret, and use it to authenticate to
>>> whatever service they are using for password validation.
>>>   Note that they can actually change this secret, because it is
>>> stored server-side.
>>> 
>>> I'm sure that people are going to run off and use this profile to
>>> hard-code secrets in their iphone apps, and if the secrets are
>>> important they will be reverse-engineered and abused.  But that's what
>>> happens when you take a profile intended for one kind of deployment
>>> environment and use it in a very, very different environment.
>>> 
>>> (Also note that the user experience/completion rate for the
>>> browser-redirect flows on thick clients can actually be pretty good.
>>> We've done usability studies, and it works:
>>> http://sites.google.com/site/oauthgoog/UXFedLogin/desktopapps.  For
>>> trusted partners you can customize the login and approval screen as
>>> well.)
>>> 
>>> Cheers,
>>> Brian
>> 
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
> 
> -- 
> You received this message because you are subscribed to the Google Groups 
> "OAuth WRAP WG" group.
> To post to this group, send email to oauth-wrap...@googlegroups.com.
> To unsubscribe from this group, send email to 
> oauth-wrap-wg+unsubscr...@googlegroups.com.
> For more options, visit this group at 
> http://groups.google.com/group/oauth-wrap-wg?hl=en.
> 

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to