I apologize for not participating in much of the discussion around this -
I've been otherwise occupied this week with a myriad of other priorities at
work.

I would, however, like to voice my support in favor of the version of the
text that Mike proposed.


On Fri, Jan 18, 2013 at 3:59 PM, Mike Jones <michael.jo...@microsoft.com>wrote:

> To make the proposed changes concrete, I've made them in a proposed draft
> 10 (attached).  This contains no normative changes from draft 9.  People
> should look at Section 1.1 (Interoperability Considerations) and review the
> new text there.  The only other change was renaming "Principal" to
> "Subject" to align terminology with the SAML and JWT specs, as discussed on
> the list.
>
> I will wait for OK from one of the chairs or Stephen before checking this
> in.
>
>                                 -- Mike
>
> -----Original Message-----
> From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of
> Mike Jones
> Sent: Friday, January 18, 2013 2:31 PM
> To: Stephen Farrell; Tschofenig, Hannes (NSN - FI/Espoo)
> Cc: oauth@ietf.org
> Subject: Re: [OAUTH-WG] Assertion Draft: Text about Interoperability --
> Today
>
> I can't agree with proceeding with Hannes' rewrite of the interoperability
> text, as editorially, it reads like it is apologizing for a defect in the
> specification, whereas it is an intentional feature of the specification
> that the syntax and verification rules of some fields is intentionally left
> open for profiles to specify (even while the semantics of them is defined
> by the Assertions spec).  I propose that instead, we go with the revised
> version at the end of this message, which I believe incorporates Hannes'
> ideas while keeping the editorial tone positive.
>
> Second, I believe that we should proceed with the non-normative
> terminology change of "Principal" to "Subject", which was proposed in
> http://www.ietf.org/mail-archive/web/oauth/current/msg10530.html and
> supported by Justin and Torsten, with no one opposed.  This should go into
> the version being discussed on the telechat (as well as the
> interoperability text).
>
> Finally, I believe that it would be beneficial to all to have the
> Assertions and SAML Profile specs be discussed on the same telechat, as
> both are useful for understanding the other.  Frankly, I think they should
> go to the IETF Editor together as "related specifications", with the goal
> being consecutively numbered RFCs referencing one another.  Is there any
> reason we can't schedule both for the February 7th telechat?  (I don't
> actually understand how they failed to proceed in lock-step in the first
> place.  Chairs - any insights?)
>
> ====
>
> Interoperability Considerations
>
> This specification defines a framework for using assertions with OAuth
> 2.0. However, as an abstract framework in which the data formats used for
> representing many values are not defined, on its own, this specification is
> not sufficient to produce interoperable implementations.
>
> Two other specifications that profile this framework for specific
> assertion have been developed:  one ([I-D.ietf-oauth-saml2-bearer]) uses
> SAML 2.0-based assertions and the other ([I-D.ietf-oauth-jwt-bearer]) uses
> JSON Web Tokens (JWTs).  These two instantiations of this framework specify
> additional details about the assertion encoding and processing rules for
> using those kinds of assertions with OAuth 2.0.
>
> However, even when profiled for specific assertion types, additional
> profiling for specific use cases will be required to achieve full
> interoperability.  Deployments for particular trust frameworks, circles of
> trust, or other uses cases will need to agree among the participants on the
> kinds of values to be used for some abstract fields defined by this
> specification.  For example the values of Issuer, Subject, and Audience
> fields might be URLs, URIs, fully qualified domain names, OAuth client IDs,
> IP addresses, or other values, depending upon the requirements of the
> particular use case.  The verification rules for some values will also be
> use case specific.
>
> This framework was designed with the clear expectation that additional
> specifications will define prescriptive profiles and extensions necessary
> to achieve full web-scale interoperability for particular use cases.
>
> ====
>
>                                 Thanks all,
>                                 -- Mike
>
> -----Original Message-----
> From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of
> Stephen Farrell
> Sent: Friday, January 18, 2013 9:47 AM
> To: Tschofenig, Hannes (NSN - FI/Espoo)
> Cc: oauth@ietf.org
> Subject: Re: [OAUTH-WG] Assertion Draft: Text about Interoperability --
> Today
>
>
> Hiya,
>
> So I'll take the lack of further discussion about this an meaning that the
> wg want this to shoot ahead. I'll put this in as an RFC editor note for the
> draft.
>
> Cheers,
> S.
>
> On 01/18/2013 12:04 PM, Tschofenig, Hannes (NSN - FI/Espoo) wrote:
> > Hi all,
> >
> > As you have seen on the list (see
> > http://www.ietf.org/mail-archive/web/oauth/current/msg10526.html) I
> > had a chat with Mike about how to address my comment for the assertion
> > draft and Mike kindly provided his text proposal (see
> > http://www.ietf.org/mail-archive/web/oauth/current/msg10529.html). I
> > have used his text as input and extended it a bit. Here is the updated
> > text.
> >
> > ----
> >
> > Operational Considerations and Interoperability Expectations
> >
> > This specification defines a framework for using assertions with OAuth
> > 2.0. However, as an abstract framework on its own, this specification
> > is not sufficient to produce interoperable implementations. Two other
> > specifications that instantiate this framework have been developed,
> > one uses SAML 2.0-based assertions and is described in
> > [I-D.ietf-oauth-saml2-bearer] and the second builds on JSON Web Tokens
> > (JWTs) and can be found in [I-D.ietf-oauth-jwt-bearer]. These two
> > instantiations provide additional details about the assertion encoding
> > and processing rules for those interested to implement and deploy
> > assertions with OAuth 2.0.
> >
> > However, even with these instance documents an interoperable
> > implementation is not possible since for a specific deployment
> > environment (within a trust framework or circle of trust, as it is
> > sometimes called) agreements about acceptable values for various
> > fields in the specification have to be agreed upon. For example, the
> > audience field needs to be populated by the entity that generates the
> > assertion with a specific value and that value may hold identifiers of
> > different types (for example, a URL, an IP address, an FQDN) and the
> > entity receiving and verifying the assertion must compare the value in
> > the audience field with other information it may obtain from the
> > request and/or with locally available information. Since the abstract
> > framework nor the instance documents provide sufficient information
> > about the syntax, the semantic and the comparison operation of the
> > audience field additional profiling in further specifications is
> > needed for an interoperable implementation. This additional profiling
> > is not only needed for the audience field but also for other fields as
> well.
> >
> > This framework was designed with the expectation that additional
> > specifications will fill this gap for deployment-specific environments.
> >
> > ----
> >
> > You have the choice:
> >
> > 1. take this as-is if you want the assertion draft
> > (draft-ietf-oauth-assertions ) on the Jan 24 IESG telechat. There is
> > no normative text in the writeup; it is rather a clarification.
> >
> > 2. discuss it if need be, and draft-ietf-oauth-assertions will be on
> > the Feb 7
> >    telechat (if the discussion is done by Feb 1)
> >
> > 1 or 2 needs to be chosen today.
> >
> >
> > Ciao
> > Hannes
> >
> > PS: FYI - draft-ietf-oauth-saml2-bearer and
> > draft-ietf-oauth-jwt-bearer are not yet on the telechat agenda.
> >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
> >
> >
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to