+1 #1

On Feb 3, 2011, at 3:21 PM, Brian Campbell wrote:

> Also #1
> 
> On Thu, Feb 3, 2011 at 1:47 PM, Justin Hart <jh...@photobucket.com> wrote:
>> #1, which is nice to support the OAuth2 scheme as previously discussed
>> (Hunt, etc) as a legacy type (can be specified in a migration spec).
>> ----
>> -- Justin Hart
>> -- jh...@photobucket.com
>> 
>> 
>> 
>> 
>> 
>> On Feb 3, 2011, at 1:34 AM, Eran Hammer-Lahav wrote:
>> 
>> After a long back-and-forth, I think it is time to present a few options and
>> have people express their preferences.
>> 
>> These are the options mentioned so far and their +/-:
>> 
>> 1. Descriptive, non-OAuth-specific scheme names (Bearer, MAC)
>> 
>> Each token type gets its own name (which does not include the word ‘oauth’
>> in it), as well as a matching HTTP authentication scheme if a new one is
>> being defined.
>> 
>> Benefits:
>> 
>> - works cleanly with the HTTP authentication framework by simply defining
>> new methods or reusing existing ones.
>> - schemes can be used outside the OAuth authorization flow (e.g. 2-legged
>> OAuth 1.0 use cases).
>> - all schemes are presented equally without giving any a preferred
>> treatment.
>> - built-in discovery using 401 challenge header for which schemes are
>> supported (with their respective information).
>> 
>> Downsides:
>> 
>> - potential creation of many new HTTP authentication schemes which has been
>> stable for a long time.
>> 
>> 2. Single OAuth2 scheme with sub-schemes
>> 
>> Define a single authentication scheme for all token types with some
>> attribute used to detect which scheme is actually being used.
>> 
>> Benefits:
>> 
>> - single scheme, reuse of the 1.0 pattern.
>> 
>> Downsides:
>> 
>> - requires a new registry for authentication header parameters.
>> - schemes are not easily reusable outside OAuth.
>> - existing frameworks usually switch on scheme name, not on sub scheme,
>> which will cause difficulty in some deployments.
>> - potential to produce a very complicated scheme once many sub schemes are
>> added.
>> - requires its own discovery method for which schemes are supported.
>> 
>> 3. Name prefix (e.g. oauth2_bearer)
>> 
>> Benefits:
>> 
>> - makes the protocol a bit easier to newbies since it will look all
>> inclusive (authorization and authentication).
>> 
>> Downsides:
>> 
>> - makes reuse outside OAuth awkward without any technical benefit.
>> 
>> 4. OAuth2 for bearer, MAC for mac
>> 
>> Name the bearer token ‘OAuth2’ and everything else gets a different name
>> (with or without OAuth in it).
>> 
>> Benefits:
>> 
>> - Matches current draft.
>> 
>> Downsides:
>> 
>> - Elevates bearer token to the preferred token type, instead of promoting
>> comparison of the various token types available.
>> - Creates a very odd usage where the authorization server issues an access
>> token of type ‘OAuth2’ which is non-descriptive and very confusing (since
>> there are other token types).
>> - Uses the name OAuth2 which stands for authorization in an authentication
>> flow, continuing the confusion about what OAuth is (an authorization
>> protocol).
>> 
>> ---
>> 
>> Please reply with your preference by 2/10. As always, please provide
>> feedback on the options and analysis.
>> 
>> EHL
>> 
>> 
>> <ATT00001..txt>
>> 
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>> 
>> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to