Hi Jerome, 

you raise a good and important point. 

A core part of the OAuth specification is to obtain the consent of the resource 
owner. If you look at Section 1.3 of 
http://tools.ietf.org/html/draft-ietf-oauth-v2-31 you see the different 
authorization grants that are supported. Except for the client credential 
authorization grant every other grant type requires a protocol exchange to 
obtain the permission from the resource owner.

The threats document discusses the importance of the consent mechanism in more 
detail. 

However, the actual screen (and the importance of the UI representation) is not 
standardized. Most standardization organizations do not standardize the 
look-and-feel of the actual permission screen. Having said that I believe it is 
a very important aspect of every identity management protocol and there is 
research available. Maybe someone should put a page with a few links together 
to illustrate the current state of the art and the best current practice. 

Ciao
Hannes

On Aug 3, 2012, at 12:07 AM, Jérôme LELEU wrote:

> Hi,
> 
> In the OAuth 2.0 spec, I don't see any mention of the "Allow / disallow" 
> screen (just after the user is logged in). However, most of the OAuth 
> providers I know (Facebook, Google, Twitter...) have such a "allow / 
> disallow" screen.
> 
> Did I miss something in the spec ?
> 
> What are the security concerns about not having such "Allow / disallow" 
> screen ?
> 
> Thanks.
> Best regards,
> Jérôme
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to