FYI. I have posted a new version of the flows on my blog showing the new 
terminology as discussed here.  Feedback appreciated.
http://independentidentity.blogspot.com/2011/03/oauth-flows-extended.html

Phil
phil.h...@oracle.com

On 2011-03-19, at 11:37 AM, Anil Saldhana wrote:

> I agree.  "2 party oauth", "3 party oauth"  tells  what it is, rather than
> "3 legged oauth".
> 
> On 03/18/2011 07:20 PM, Eran Hammer-Lahav wrote:
>> The legs terminology is just plain awful. I prefer parties, roles, anything 
>> else.
>> 
>> EHL
>> 
>>> -----Original Message-----
>>> From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf
>>> Of Phillip Hunt
>>> Sent: Friday, March 18, 2011 5:07 PM
>>> To: David Primmer
>>> Cc: OAuth WG
>>> Subject: Re: [OAUTH-WG] Flowchart for legs of OAuth
>>> 
>>> I agree with what you are saying. We were having trouble understanding legs
>>> too, so I came up with the diagram. The diagram does show the parties
>>> aspect. But I remain uncomfortable about the terminology.
>>> 
>>> Phil
>>> 
>>> Sent from my phone.
>>> 
>>> On 2011-03-18, at 15:55, David Primmer<prim...@google.com>  wrote:
>>> 
>>>> Hi Phil,
>>>> 
>>>> I actually think this rephrasing of the rule of thumb is not really
>>>> helpful based on how the word "legs" has been used in my experience of
>>>> discussing and teaching OAuth. I actually tried to be pretty explicit
>>>> about this topic in a talk I did at Google I/O last year because we
>>>> have lots of questions about 2 versus 3 legged OAuth since the launch
>>>> of the Google Apps Marketplace.
>>>> http://www.youtube.com/watch?v=0L_dEOjhADQ. I speak about 17mins
>>> in.
>>>> We have traditionally used the terms two legged OAuth and three legged
>>>> OAuth to describe the trust relationships involved in the grant. I
>>>> think your interpretation is very different and not a common way to
>>>> use the terms 'legs' in relation to OAuth and will simply confuse
>>>> people. 2LO involves a client authenticating itself to a server. 3LO
>>>> involves those two previous actors, plus a user/resource owner who
>>>> delegates permissions to the client. In everyday use, 2LO is 'server
>>>> to server' auth with out of band permissions and user identity and 3LO
>>>> involves an individual grant where the user's grant is identified by a
>>>> token given to the client and passed to the server on access. Another
>>>> way to look at it is 2LO is just HTTP request signing.
>>>> 
>>>> davep
>>>> 
>>>> On Mon, Feb 21, 2011 at 4:45 PM, Phil Hunt<phil.h...@oracle.com>  wrote:
>>>>> FYI. I published a blog post with a flow-chart explaining the legs of 
>>>>> OAuth.
>>>>> http://independentidentity.blogspot.com/2011/02/does-oauth-have-
>>> legs.
>>>>> html
>>>>> 
>>>>> Please let me know if any corrections should be made, or for that matter,
>>> any improvements!
>>>>> Phil
>>>>> phil.h...@oracle.com
>>>>> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to