Justin,

This is my primary objection! We can't keep it straight. Their should be no 
such thing as a registrstion access token!  Just the token the client obtains 
to update its profile through the normal token request process. 

Phil

On 2013-05-31, at 10:55, Justin Richer <jric...@mitre.org> wrote:

> Which token are you referring to here?
> 
> If it's the Initial Registration Token, then you could get that through the 
> normal token server no problem. (The lifecycle writeups don't call this out 
> explicitly but I would be willing to do so.) Or you could get it elsewhere. 
> Doesn't matter, just like it doesn't matter with any other OAuth2 protected 
> resource.
> 
> If it's the Registration Access Token, then having the token come from the 
> token endpoint would require a lot more work and complexity on behalf of both 
> of the client and server. Either you end up with public clients getting 
> secrets they shouldn't need or with granting clients access to the 
> client_credentials flow when they shouldn't actually have it. Plus it adds 
> extra round trips which don't buy you anything.
> 
>  -- Justin
> 
> On 05/31/2013 10:15 AM, Phil Hunt wrote:
>> The preference is to have the access token for registration issued by the 
>> normal token server rather then by the registration endpoint. 
>> 
>> In the current draft it is obtained through a unique process and must 
>> outlive the client. 
>> 
>> Phil
>> 
>> On 2013-05-30, at 19:47, "Richer, Justin P." <jric...@mitre.org> wrote:
>> 
>>> I don't understand any of the comments below -- it already *is* an OAuth2 
>>> protected resource without any special handling. Your access tokens can be 
>>> short-lived, long-lived, federated, structured, random blobs ... totally 
>>> doesn't matter. They are access tokens being used to access a normal 
>>> protected resource. Full stop.
>>> 
>>> Anything else is out of scope. The lifecycle discussions at the beginning 
>>> are merely examples of some ways you *could* use it and are non-normative 
>>> and non-exhaustive.
>>> 
>>> You seem to be asking for something that's already in the draft.
>>> 
>>>  -- Justin
>>> 
>>> From: Phil Hunt [phil.h...@oracle.com]
>>> Sent: Thursday, May 30, 2013 7:31 PM
>>> To: Richer, Justin P.
>>> Cc: John Bradley; oauth@ietf.org WG
>>> Subject: Re: [OAUTH-WG] review comments on draft-ietf-oauth-dyn-reg-11.txt
>>> 
>>> 
>>> 
>>> Phil
>>> 
>>> On 2013-05-30, at 16:11, "Richer, Justin P." <jric...@mitre.org> wrote:
>>> 
>>>> Comments inline, marked by [JR].
>>>> 
>>>> From: Phil Hunt [phil.h...@oracle.com]
>>>> Sent: Thursday, May 30, 2013 5:25 PM
>>>> To: Richer, Justin P.
>>>> Cc: John Bradley; oauth@ietf.org WG
>>>> Subject: Re: [OAUTH-WG] review comments on draft-ietf-oauth-dyn-reg-11.txt
>>>> 
>>>> See below.
>>>> Phil
>>>> 
>>>> @independentid
>>>> www.independentid.com
>>>> phil.h...@oracle.com
>>>> 
>>>> 
>>>> 
>>>> 
>>>> 
>>>> On 2013-05-30, at 2:09 PM, Justin Richer wrote:
>>>> 
>>>>> OK, I think see part of the hang up. I have not seen the scenario that 
>>>>> you describe, where you trade a 3rd party token for a "local" token. I 
>>>>> have seen where access tokens are federated directly at the PR. 
>>>>> (Introspection lets you do some good things with that pattern.) But 
>>>>> that's neither here nor there, as you can already do what you're asking 
>>>>> for and I think I can clear things up:
>>>>> 
>>>>> In your case, the "3rd party bearer assertion" is simply *not* the 
>>>>> Initial Registration Token. It's an assertion that can be used to *get* 
>>>>> an Initial Registration Token. The token that you get from the Token 
>>>>> Endpoint, in your case, would be "local" from your own AS. Your 
>>>>> registration endpoint would look at this token on the way in, know how to 
>>>>> validate it, do whatever else it wants to with it, and process the        
>>>>>                          registration. Then it would issue a Registration 
>>>>> Access Token that to the registering client to use at the RESTful         
>>>>>                         endpoint. Incidentally, that token would also be 
>>>>> "local", just like before.
>>>> 
>>>>> How you (the client/developer) get the actual Initial Registration Token 
>>>>> is completely and forever out of scope for the Dynamic Registration spec.
>>>> 
>>>> [PH]  Yes, the issuance of the third party bearer assertion token token 
>>>> would be out of scope of this spec.
>>>> 
>>>> If however the group decides to except federated direct access tokens as 
>>>> registration *access* tokens, then I think we have to define federation 
>>>> for access tokens first.   For me, I think this is something that should 
>>>> be discussed in a different charter.
>>>> 
>>>> [JR] It's an access token, plain and simple. The draft doesn't care -- and 
>>>> shouldn't care -- if it's federated or not. I agree, and have been arguing 
>>>> all along, that if you have a use case for federated access tokens, you 
>>>> need to define the mechanisms for such tokens, and that registration is 
>>>> *not* the place for that definition. It's orthogonal but they can be used 
>>>> together. Let's define them separately but in a compatible way.
>>> [ph] thats not the impression i get from the draft. As i mentioned earlier 
>>> using access token for registration is clearer. 
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to