Hi,

On 30/11/12 06:48, Torsten Lodderstedt wrote:
Hi,

it might be reasonable in some cases to revoke the old access token (if
the AS actually supports access token revocation). However, I can
imagine situations in clustered systems where access tokens are acquired
from from the same refresh token and used independently by different
nodes or modules. In this case, revocation on refresh would not be desired.

Note: In this case one would probably not use refresh token rotation.

What I'm understanding is that there are many subtleties with the way refresh grant can be used in different scenarios. I hope in time there will be more specific recommendations about the refresh grants and specifically about the expectations of the clients with respect to using such grants. For the moment "use it when AT has expired" is the most straightforward case with the predictable outcome and thus the code which use the grant for these purposes is portable. The other uses of the grant (with or without the optional scope) have the application-specific outcome - so hopefully in time more of these application specific uses will make it into the spec level text - IMHO it will help users or developers like myself :-)

Thanks
Sergey


regards,
Torsten.



Sergey Beryozkin <sberyoz...@gmail.com> schrieb:

    Apologies for a noise on it, however I'd like to get some more
    clarifications on it.

    What I thought first about the refresh grant was that a client would use
    it for getting a new access token back after it gets a 401 back from PR.

    Next after seeing the comments from others it became obvious the refresh
    grant can be used to pro-actively refresh the existing token when the
    client realizes - this is what I'm really going to ask about.

    I also learned about the fact a refresh grant can effectively be used to
    clone the existing token - I'd like to avoid talking about this case in
    this thread, even I got it wrong with the term 'clone' :-)

    So, as far as the refresh token grant is concerned, the grant which is
    'supported' by the core spec, what are the expectations of the client
    which request to refresh a
    still valid access token ?

    I got a bit confused by the feedback that it may be per-AS specific.
    If it were the expectation then I'd not see the difference between the
    core spec "refresh_token" grant and "a.b.c" custom grant.

    It seems reasonable that if the client does decide to be proactive and
    use a refresh grant without using any optional scopes, and specifically
    with the main and only purpose to refresh the access token which may get
    expired shortly, it should predictably get a new access token with a new
    time lease...

    And which means the old token must've gone by now and effectively
    revoked. This exactly what the client means, get me a new refreshed
    token...

    I've checked the token revocation grant. It's obviously a good idea to
    let the client directly interact with the endpoint and remove whatever
    token it want to remove. However, a refresh token request (without a
    scope
    parameter) should have the same side-effect

    Does it make any sense at all ?

    Thanks, Sergey

    ------------------------------------------------------------------------

    OAuth mailing list
    OAuth@ietf.org
    https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to