Hi folks,

I currently use a proprietary token approach to provide authentication to a 
browser widget, and I wonder if OAuth could be used to replace it.

Here's how the system currently works:
  - website supports authenticated users (happens via username/password form)
  - website and widget provider have a shared secret
  - the website serves a page to the browser, containing an embed of a remote 
widget as well as a token that asserts the currently logged in user.  the 
widget takes this token and performs an ajax call to the widget provider 
server.  behold, the user is now logged in to the widget.

In trying to organize this into OAuth terms and roles, here is what I come up 
with:
  - resource owner: the user
  - resource server: widget provider (where the resource is generically "the 
ability to utilize the widget")
  - client: the webpage running in the browser
  - authorization server: the website

The website essentially serves up the client application and token in one 
shot, so the client never has to explicitly ask for a token.  However, the 
client would then take that token and use it to access a service.  The website 
and widget provider would share key material such that token validation is 
possible, but it's important to note that the two services are not owned and 
operated by the same people.

Does this seem right?  Normally when I think of OAuth, I think of a user 
giving a third-party service access to his personal stuff, but in the above 
flow 
I'm proposing that OAuth be used so that the user gains access to his own 
stuff.  In fact, there would be no way to access his stuff other than this 
approach, so it's not just about optional third-party access.  It's the direct 
and only access.

Would love confirmation that OAuth is appropriate for my needs, and if I have 
the roles right in that case.

Thanks,
Justin
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to