Presumably at app registration time any scope specification is really a 
constraint on the scope values that can be requested in an authorization flow.

So ideally registration should accept rules for matching scopes, as opposed to 
actual scope values.

You can try to use scope values as their own matching rules. That is fine for a 
small set of "static" scopes. It starts to fail when there are a large number 
of scopes, or scopes that can include parameters (resource paths? email 
addresses?). You can try to patch those failures by allowing services to define 
service-specific special "wildcard" scope values that can only be used during 
registration (eg "read:*").

Alternatively, replace 'scope' in registration with 'scope_regex' that holds a 
regular expression that all scope values in an authorization flow must match.

--
James Manger
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to