If it was, no one told me.

On 2011-08-11, at 12:41 PM, Anthony Nadalin wrote:

> Anonymity was certainly part of the design for WRAP
>  
> From: Eran Hammer-Lahav [mailto:e...@hueniverse.com] 
> Sent: Thursday, August 11, 2011 12:35 PM
> To: Anthony Nadalin; Dick Hardt
> Cc: OAuth WG (oauth@ietf.org)
> Subject: Re: [OAUTH-WG] Refresh Tokens
>  
> Section 1.5 already covers refresh tokens. There are many use cases for 
> refresh tokens. They are basically a protocol feature used to make 
> scalability and security more flexible. Anonymity was never part of their 
> design, and by the nature of this protocol, is more in the domain of the 
> resource server (based on what information it exposes via its API). In fact, 
> your email if the first such suggestion of anonymity.
>  
> EHL
>  
> From: Anthony Nadalin <tony...@microsoft.com>
> Date: Thu, 11 Aug 2011 11:15:28 -0700
> To: Dick Hardt <dick.ha...@gmail.com>
> Cc: "OAuth WG (oauth@ietf.org)" <oauth@ietf.org>
> Subject: Re: [OAUTH-WG] Refresh Tokens
>  
> Many reasons, but none are explained in the specification
>  
> From: Dick Hardt [mailto:dick.ha...@gmail.com] 
> Sent: Thursday, August 11, 2011 10:51 AM
> To: Anthony Nadalin
> Cc: OAuth WG (oauth@ietf.org)
> Subject: Re: [OAUTH-WG] Refresh Tokens
>  
> My recollection of refresh tokens was for security and revocation.
>  
> security: By having a short lived access token, a compromised access token 
> would limit the time an attacker would have access
>  
> revocation: if the access token is self contained, authorization can be 
> revoked by not issuing new access tokens. A resource does not need to query 
> the authorization server to see if the access token is valid.This simplifies 
> access token validation and makes it easier to scale and support multiple 
> authorization servers.  There is a window of time when an access token is 
> valid, but authorization is revoked. 
>  
>  
>  
> On 2011-08-11, at 10:40 AM, Anthony Nadalin wrote:
> 
> 
> 
> Nowhere in the specification is there explanation for refresh tokens, The 
> reason that the Refresh token was introduced was for anonymity. The scenario 
> is that a client asks the user for access. The user wants to grant the access 
> but not tell the client the user's identity. By issuing the refresh token as 
> an 'identifier' for the user (as well as other context data like the 
> resource) it's possible now to let the client get access without revealing 
> anything about the user. Recommend that the above explanation be included so 
> developers understand why the refresh tokens are there.
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>  

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to