If I understand you correct, then you could utilize the assertion flow as follows:

Put the generic token into the assertion parameter, set the scopes parameter to the scope(s) of the service your client wants to interact with and use the client credentials as described. If the AS supports such a token swap, then it should respond with a new access token applicable for the target services. Pre-Requisite: The original token must have been authorized for the target service (scope). How do you want to achieve that? Which flow do you want to obtain the first access token?

Alternatively, your client could also obtain all tokens required to access the target services in the initial authorization flow. Please take a look on the thread about multiple access tokens from one authorization flow (http://www.ietf.org/mail-archive/web/oauth/current/msg02688.html).

regards,
Torsten.

Am 02.06.2010 19:32, schrieb Lisa Dusseault:

I've been trying to understand the use case for the assertion flow (http://tools.ietf.org/html/draft-ietf-oauth-v2-05#section-3.10) . Conversely, I have a use case for bootstrapping, and I'm trying to understand if the assertion flow is the right flow for that use case.

The bootstrapping use case I have in mind is to allow a client to interact with a related set of services by bootstrapping from client secret to an access token, and then from that access token to other access tokens. For example, in a "login" interaction the client would get a generic access token. Later, to use various services -- access to personal data, access to friends' data, attempts to do uploads -- the client would ask the security token server for access to new resources by URI, and if access was granted, receive new access tokens which could be used on those services. The client secret is not reused very often, and policy is centralized.

This seems similar to other use cases being discussed and so it's possible my main point of confusion is trying to tie this to the assertion flow instead of something else.

The assertion flow has the right number of parties involved, and it could certainly be hacked/extended to do bootstrapping: instead of the client secret, the general session access token could be used, and the "assertion" field can contain anything including the URI of the service that the client now wants. However I wondered if something less generic could make this more interoperable.

Any thoughts?

Thanks,
Lisa


_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to