Maybe I'm getting confused over the terminology.  Connect speaks of a client 
talking to a CheckID endpoint or UserInfo endpoint.  Is the RS acting as the 
client in this case?

I'm actually looking at your famous PDF diagrams Justin, and it looks like the 
client is in all cases the same client.  E.g. the client that asks for the 
access token is the same client performs the UserInfo request or CheckID 
request.  In my mind, I want the client to get the access-token and present it 
to the RS, and then I want the RS to perform the UserInfo request or CheckID 
request.  

So if you're telling me that the RS is acting as the client, and the RS can 
perform the UserInfo request or CheckID request, then I get it.  But it wasn't 
obvious from the spec.  


Tx!
adam




-----Original Message-----
From: Richer, Justin P. [mailto:jric...@mitre.org] 
Sent: Friday, June 01, 2012 10:00 AM
To: Manger, James H
Cc: Lewis Adam-CAL022; oauth@ietf.org
Subject: Re: [OAUTH-WG] Inter-domain AS/RS communication (revisited)

More specifically, OpenID Connect with the addition of reusing the access_token 
provided by the AS to get at other API services. This capability is explicitly 
encouraged in Connect since it directly re-uses the OAuth2 infrastructure and 
tokens to do the identity protocol.

 -- Justin

On Jun 1, 2012, at 10:33 AM, Manger, James H wrote:

> Adam,
> 
> You are describing OpenID Connect.
> 
> --
> James Manger
> 
> ----- Reply message -----
> From: "Lewis Adam-CAL022" <adam.le...@motorolasolutions.com>
> Date: Sat, Jun 2, 2012 12:00 am
> Subject: [OAUTH-WG] Inter-domain AS/RS communication (revisited)
> To: "oauth@ietf.org" <oauth@ietf.org>
> 
> Hi all,
> 
> I've asked about the lack of standardization of the AS-RS interface in the 
> past, but I have a new twist on my question.  What is the viability of 
> performing user "authentication" using OAuth with an RS in domain-1, and a 
> whole bunch of AS's in different domains (assuming that the RS and AS is of 
> the same implementation)?
> 
>            RS (domain-1)
> 
> AS-1     AS-2     AS-3     AS-4     AS-5     AS-6     AS-n
> 
> Let me explain a bit further.  I have a RS in domain-1 which exposes an API, 
> which is accessed by a native client, with users from (for example) 12 
> different domains.  (Note: both the RS and native clients are of the same 
> vendor implementation).  Each of the 12 user domains has an AS, of the same 
> implementation as the RS in domain-1.  I'm thinking that native client users 
> from domain X should be able to authenticate to the AS in their home domain 
> using some primary authentication means, obtain an unstructured access-token, 
> and present that access-token to the RS in domain-1.  Because they are all of 
> the same implementation, the RS in domain-1 should be able to make a RESTful 
> API call to the AS in domain X to obtain a JSON structure, containing among 
> other things, the user's name, and possibly other attributes.  Hence 
> secondary authentication has been realized.
> 
> This seems to work, but is this within the spirit of OAuth, or have I gone 
> off into LaLa land?  We have looked at using the SAML bearer assertion 
> profile for OAuth, but we do a lot over wireless links, many of which are 
> bandwidth anemic, and the overhead of obtaining the SAML assertion and 
> sending it are making me a bit squeamish.  OAuth is attractive because of its 
> light weight-ness.  Is the usage I'm proposing of OAuth (above) something 
> that would be within the overall spirit of the OAuth framework?
> 
> Tx!
> adam
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth






_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to