Ok.

So you want to request a cookie from both endpoints: the authorization endpoint 
and the token endpoint? How would that work? There is no response_type on the 
token endpoint.

EHL

From: Breno [mailto:breno.demedei...@gmail.com]
Sent: Thursday, February 17, 2011 9:30 PM
To: Eran Hammer-Lahav
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] Freedom of assembly for response_type


On Thu, Feb 17, 2011 at 7:31 PM, Eran Hammer-Lahav 
<e...@hueniverse.com<mailto:e...@hueniverse.com>> wrote:
So an implicit grant can produce just a cookie or both cookie and token, but 
not code?

Yes, cookies would be returned in the same context of access_tokens, either as 
the result of an implicit grant or resulting from an explicit exchange from a 
code-type grant.



EHL


From: Breno 
[mailto:breno.demedei...@gmail.com<mailto:breno.demedei...@gmail.com>]
Sent: Thursday, February 17, 2011 5:10 PM

To: Eran Hammer-Lahav
Cc: oauth@ietf.org<mailto:oauth@ietf.org>
Subject: Re: [OAUTH-WG] Freedom of assembly for response_type


On Thu, Feb 17, 2011 at 4:56 PM, Eran Hammer-Lahav 
<e...@hueniverse.com<mailto:e...@hueniverse.com>> wrote:
Is cookie exchanged for an access token? Authorization grants are not meant to 
be useful by themselves, only exchanged for an access token.

In this scenario, grants are exchanged for access tokens and/or cookies.


Can you request only a cookie? Or is it always with either a token or code?

The idea is that a grant can be exchanged for only a cookie in some cases.


EHL



From: Breno 
[mailto:breno.demedei...@gmail.com<mailto:breno.demedei...@gmail.com>]
Sent: Thursday, February 17, 2011 4:50 PM

To: Eran Hammer-Lahav
Cc: oauth@ietf.org<mailto:oauth@ietf.org>
Subject: Re: [OAUTH-WG] Freedom of assembly for response_type


On Thu, Feb 17, 2011 at 4:40 PM, Eran Hammer-Lahav 
<e...@hueniverse.com<mailto:e...@hueniverse.com>> wrote:
I am not questioning the use case, only how it fits within the OAuth framework.

I don't understand how such an extension is expected to work with the existing 
grant types. The response_type parameter is used to identify if the flow being 
used is for an implicit grant or authorization code. Are you suggesting a new 
grant type? Are you suggesting additional response parameters/headers (in the 
case of a cookie) with both grant types?

It's a separate grant type that can be combined with either of the previous 
types.



Without full requirements we can't design an extension point. Asking to make 
this parameter a free text field is not helpful.

The requirement is to allow another grant type, cookie.

- cookie can be used separately or in combination with code or token.

- if specified by itself or in combination with token, it's returned in the End 
User Authorization Response, in analogy/in addition to the access_token

- If specified in combination with code, it's returned in exchange for the 
code, in analogy with the access_token


EHL

From: Breno 
[mailto:breno.demedei...@gmail.com<mailto:breno.demedei...@gmail.com>]
Sent: Thursday, February 17, 2011 4:22 PM

To: Eran Hammer-Lahav
Cc: oauth@ietf.org<mailto:oauth@ietf.org>
Subject: Re: [OAUTH-WG] Freedom of assembly for response_type

The use case is very straightforward:

- SAML provides session management. Facebook Connect provides session 
management. Both use cookies. These are authentication protocols but common 
usages of both SAML and FB Connect imply authorization grants.
- OpenID2.0 does not provide session management. This has proven to reduce the 
value of OpenID and make it unsuitable for many scenarios.

We would like federation protocols based on OAuth2 to be high-value. We would 
rather that they not be be hacks built on top of OAuth2. That means that we 
need a first-order concept of cookie. A cookie can be refreshed independent of 
the grant associated with it. A cookie is something the client holds on to that 
identifies the user (i.e., it's for user-client authentication), but that the 
client is happy to outsource the management of 
security/crypto/logged-in/logged-out state to the server.

The cookie is produced and returned by the server, in combination with a grant, 
but it can be refreshed independently.

This is a solid and proven use case, and is of fundamental value to many 
planned OAuth2 implementations.

On Thu, Feb 17, 2011 at 4:12 PM, Eran Hammer-Lahav 
<e...@hueniverse.com<mailto:e...@hueniverse.com>> wrote:
You need to define how this proposed extension works with the overall 
architecture.

This is not just an endpoint people can bastardize (I am not suggesting *you* 
are) as they see fit. It must fit with the overall model which is that this 
endpoint returns either an access token or an authorization grant. An 
authorization grant has to be exchanged for an access token.

If you are going to return something else, instead or in addition to the 
token/code options, you need to explain how it fits within the model. I am 
opposed to an open-ended extension point that is not consistent (and 
restricted) to the model we spent a year to define and refine. The token+code 
response type was well defined (it was the use case that wasn't).

To move this forward, you need to come up with specific requirements, not just 
making something extensible without understanding what it is you are trying to 
extend. That's like the OAuth 1.0 utterly broken oauth_version parameter and 
the long confusion it created later on.

EHL

From: Breno 
[mailto:breno.demedei...@gmail.com<mailto:breno.demedei...@gmail.com>]
Sent: Thursday, February 17, 2011 1:58 PM
To: Eran Hammer-Lahav
Cc: oauth@ietf.org<mailto:oauth@ietf.org>
Subject: Re: [OAUTH-WG] Freedom of assembly for response_type


On Thu, Feb 17, 2011 at 1:51 PM, Eran Hammer-Lahav 
<e...@hueniverse.com<mailto:e...@hueniverse.com>> wrote:
The best approach (at this point) is to leave the spec unchanged. However, 
another spec can update the definition of the response_type parameter, 
including defining a registry or other methods for extensibility.

We can define this now, and it will not have any impact on existing code, but I 
am leery of adding yet another extensibility vector without sufficient 
requirement. I also think that adding extension parameters can handle this 
cleanly.

The spec, as currently written does not imply that the only possible values are 
'code' and 'token'. The only concern is that libraries may implement such 
restriction and make extending this behavior different.

I do not think that extension parameters can handle this cleanly. In 
particular, if the response_type is neither code nor token.


EHL

From: oauth-boun...@ietf.org<mailto:oauth-boun...@ietf.org> 
[mailto:oauth-boun...@ietf.org<mailto:oauth-boun...@ietf.org>] On Behalf Of 
Breno
Sent: Thursday, February 17, 2011 10:30 AM
To: oauth@ietf.org<mailto:oauth@ietf.org>
Subject: [OAUTH-WG] Freedom of assembly for response_type

- Problem 1: Several WG participants are working on deploying a federated 
signon protocol based on OAuth2 (aka OpenIDConnect) and would like to return an 
additional 'session cookie' together with the auth_token. Or sometimes return 
only a cookie as the result of authorization, since cookies will likely have 
shorter lifetimes than access tokens, for security and usability reasons, and 
require more frequent refresh requirements. In any case, there aremultiple 
reasons for making the cookie separate from the auth_token, including both 
security and flexibility of deployment. However, there is no way to express 
this except adding an arbitrary extension parameter (to effectively express a 
different response type).

- Problem 2: Codification of code_and_token created controversy as there was 
not enough traction among participants to put it in the core. However, it is 
entirely possible that deployment experience will lead players to revisit this 
topic.


- Proposed solution:

1. Allow response_type to be a space separated list of arbitrary strings

E.g.:

response_type=code
response_type=token
response_type=code+token
response_type=cookie
response_type=code+cookie
response_type=token+cookie
response_type=foo+bar

Would all be syntactically valid responses from the perspective of OAuth2.0 
Core response_type values.


2. Define behaviors in the core only for values 'code' and 'token'. Allow 
extensions to define what do with 'code+token' or with any other values or 
combinations of values.

--
Breno de Medeiros



--
Breno de Medeiros



--
Breno de Medeiros



--
Breno de Medeiros



--
Breno de Medeiros



--
Breno de Medeiros
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to