On Wed, May 11, 2011 at 11:32 AM, Breno <breno.demedei...@gmail.com> wrote:

>
>
> On Tue, May 10, 2011 at 4:43 PM, Lodderstedt, Torsten <
> t.lodderst...@telekom.de> wrote:
>
>> Hi Marius,
>>
>> wrt "auto-approval": how is the authorization server supposed to validated
>> the client's identity in a reliable way? Otherwise another application
>> (using the id of the legitimate client) could abuse the authorization
>> previously approved by the user as long as the session with the
>> authorization server is valid. The redirect_uri won't help for all kinds of
>> clients since a native app could use the correct redirect_uri and
>> nevertheless get access to the token.
>>
>
> A native app that can screen scrape the browser can probably also install a
> keylogger. It would be very difficult or impossible to protect against a
> malicious native app with access to shared OS resources.
>

By which I mean we should consider protection against apps with such
capabilities a non-goal for this protocol and not an impediment to enabling
of auto-approval modes.


>
>
>> regards,
>> Torsten.
>>
>> > -----Ursprüngliche Nachricht-----
>> > Von: Marius Scurtescu [mailto:mscurte...@google.com]
>> > Gesendet: Dienstag, 10. Mai 2011 21:15
>> > An: Doug Tangren
>> > Cc: oauth@ietf.org
>> > Betreff: Re: [OAUTH-WG] oauth2 implicit flow user experience
>> >
>> > On Tue, May 10, 2011 at 6:25 AM, Doug Tangren <d.tang...@gmail.com>
>> > wrote:
>> > > Hi,
>> > >
>> > > I'm implementing an authorization and resource server at worked based
>> > on the
>> > > oauth2 draft 15. A question arose about the user experience of users
>> > of an
>> > > implicit client flow.  I've set a one hour expiry on access tokens
>> > but now
>> > > the question is should the client be forced to re-prompt the user for
>> > > authorization when their receive an error response from the resource
>> > server
>> > > or when they refresh the page?
>> > >
>> > > I realize that some implementation details like this are mentioned as
>> > being
>> > > beyond the scope of the spec but I wanted to get a general sense of
>> > what the
>> > > authors and implementors thoughts about how it would actually be used
>> > and
>> > > what is the expected user experience.
>> > >
>> > > I also realize that from a server's perspective, without a client
>> > secret,
>> > > authorization code, or other prior evidence of who a request is
>> > coming from
>> > > that there is little way for a server to be permissive about allowing
>> > for
>> > > the refreshing of an access token in an implicit flow. Has there been
>> > any
>> > > conversation around possible alternatives that would permit users of
>> > the
>> > > implicit flow to have the same user experience as the authorization
>> > code
>> > > flow?
>> >
>> > This question was raised a few times on this list. The only solution I
>> > am aware of is for the authorization server to support auto-approvals
>> > and an immediate mode,
>> >
>> > Auto-approval means that the server will not show the approval page if
>> > the same user/scopes/client have already been approved. So as long as
>> > the user has an active session the client can get new access tokens in
>> > a hidden iframe.
>> >
>> > If the user session times out then the request in the iframe will
>> > hang, the frame will be redirected to a login page. To prevent this
>> > the client must be able to tell authorization server that it wants an
>> > immediate type request, no UI whatsoever should be shown and if
>> > auto-approval is not possible, or not active session, then just return
>> > an error. The client then can popup a window and start a regular
>> > request, so the user can login and/or approve.
>> >
>> > Auto-approvals are up to the server to support, no support from the
>> > protocol is required. You probably want to support this only for the
>> > implicit flow. Immediate mode needs a special request parameter and
>> > also a special error code. There is no extension that defines these,
>> > the suggestion was that this should go into the OpenID Connect spec,
>> > together with a username hint parameter.
>> >
>> > Hope this helps,
>> > Marius
>> > _______________________________________________
>> > OAuth mailing list
>> > OAuth@ietf.org
>> > https://www.ietf.org/mailman/listinfo/oauth
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
>
>
>
> --
> Breno de Medeiros
>
>


-- 
Breno de Medeiros
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to