We have two separate discussions going on.  8-)

Phil

@independentid
www.independentid.com
phil.h...@oracle.com





On 2013-06-06, at 10:48 AM, Justin Richer wrote:

> I thought we were talking about the registration access token, not the 
> initial access token?
> 
>  -- Justin
> 
> On 06/06/2013 01:48 PM, Phil Hunt wrote:
>> This is why this to-MAY-to vs. to-MAH-to distinction around is the initial 
>> access token an authorization token is important.
>> 
>> The purpose for the initial access token is dramatically different then 
>> normal access tokens.  This is for "registration" and does not constitute 
>> authentication or authorization.
>> 
>> Therefore, in this case, I do not believe that defining access tokens in the 
>> broader sense makes this issue clearer.
>> 
>> Registration is a very specific process different than authorization.
>> 
>> This might be a good paper to look at so the group understands why I am 
>> differentiating authorization from what is happening with initial access:
>> http://tools.ietf.org/html/draft-hallambaker-httpauth-00
>> 
>> Phil
>> 
>> @independentid
>> www.independentid.com
>> phil.h...@oracle.com
>> 
>> 
>> 
>> 
>> 
>> On 2013-06-06, at 10:37 AM, Justin Richer wrote:
>> 
>>> Interoperability of the processing of OAuth tokens is a separate issue that 
>>> needs to be solved not just for registration. When it is solved in the 
>>> wider case, Registration as-is will inherit the solution.
>>> 
>>> So today, if you're using an Initial Access Token (which is optional), then 
>>> you're locked to whatever process you want to use to verify/validate that 
>>> token. Since it's just an OAuth token, you've got a number of things that 
>>> you can do (assertions, introspection, magic).
>>> 
>>> I'd rather we solve the *real* cross-domain issue in the wider case than 
>>> just try to cram something into registration.
>>> 
>>>  -- Justin
>>> 
>>> On 06/06/2013 01:33 PM, Phil Hunt wrote:
>>>> 
>>>> Phil
>>>> 
>>>> @independentid
>>>> www.independentid.com
>>>> phil.h...@oracle.com
>>>> 
>>>> 
>>>> 
>>>> 
>>>> 
>>>> On 2013-06-06, at 10:05 AM, Justin Richer wrote:
>>>> 
>>>>> 
>>>>> On 06/06/2013 11:20 AM, Phil Hunt wrote:
>>>>>> As I've said before the initial auth token should nothing to do with 
>>>>>> auth. It is simply an assertion given to the developer to distribute in 
>>>>>> order to pass on signed claims about the software. 
>>>>> 
>>>>> Phil, as I and several others have explained previously, that's not true 
>>>>> at all. It's a token that gives authorization to the registration 
>>>>> endpoint. The fact that you can use it as an assertion to pass along 
>>>>> signed claims is an artifact of it being an OAuth token and an OAuth 
>>>>> token is an opaque string. Please read through the dynamic registration 
>>>>> draft again -- it says absolutely nothing about assertions, signatures, 
>>>>> or claims with regard to this token.
>>>> It depends which case you are using.  If the developer is talking to a 
>>>> single deployment domain and obtains an initial access token and then 
>>>> ships it with all clients, then sure.  In this scenario, the contents are 
>>>> totally controlled by the local domain.
>>>> 
>>>> I agree. In this case, you don't care about inter-op. The whole 
>>>> environment is siloed.  But then, if this is your case, I'm not sure why 
>>>> this draft is at the IETF.
>>>> 
>>>> The interoperability case is where a third party generates that assertion 
>>>> and the deployment domain has to decide to accept it.  So you are a 
>>>> developer and you want to build a client for a Microsoft or Oracle app.  
>>>> You want to be able to ship that to your customers. You register with the 
>>>> appropriate publisher and they give you a signed assertion that can be 
>>>> used as the "Initial Access Token".    This token is then accepted by the 
>>>> deployment domain and then it decides if it trusts the signer or not.
>>>> 
>>>> ===> For this to work, the contents and format of that token MUST be 
>>>> defined.   Otherwise how could we ensure a Microsoft signed assertion 
>>>> would be accepted by a PingIdentity OAuth server?  Or any other 
>>>> combination of implementations from different vendors/communities?
>>>> 
>>>>> 
>>>>>> 
>>>>>> Bearer or not bearer is a distraction. The fact that the contents and 
>>>>>> format of this token is out of scope leaves a HUGE interop gap. 
>>>>> 
>>>>> The fact that some of us (myself included) are *using* this token to 
>>>>> carry this kind of information is out of scope for the basic registration 
>>>>> spec. I completely agree that there's value in defining this stuff, but 
>>>>> as a separate and complementary spec from registration.
>>>> 
>>>> [PH] I was reacting to John Bradley's assertion that the spec was narrowly 
>>>> defined with interop in mind. Yet this mechanism is a key factor being 
>>>> used to share information about the software.
>>>> 
>>>>> 
>>>>>> 
>>>>>> Finally never-mind bearer bias, how are  client credentials rotated 
>>>>>> interoperably if the only thing rotated is client_secret?
>>>>> 
>>>>> *any* parameter on the client, including the registration_access_token 
>>>>> and any extension parameters, can be rotated on any call to the Read or 
>>>>> Update methods (except for client_id). So if you've got another mechanism 
>>>>> for doing client authentication, you can rotate that, too.
>>>>> 
>>>>>> 
>>>>>> I would say the spec only works for client secrets and/or all-in-one 
>>>>>> domain where there is no interop. 
>>>>> 
>>>>> Considering I've personally used it across domains and without client 
>>>>> secrets (using jwks_uri to register public keys), I have to empirically 
>>>>> disagree with that statement.
>>>>> 
>>>>>  -- Justin
>>>>> 
>>>>>> 
>>>>>> Phil
>>>>>> 
>>>>>> On 2013-06-06, at 1:53, John Bradley <ve7...@ve7jtb.com> wrote:
>>>>>> 
>>>>>>> There are a couple of reasons.    
>>>>>>> 
>>>>>>> One criticism Hannes and others make of OAuth specs is they are not 
>>>>>>> tightly profiled enough to be interoperable without further out of band 
>>>>>>> configuration and profiling.
>>>>>>> 
>>>>>>> Making registration work with minimal ambiguity was a priority for 
>>>>>>> Connect and that has carried over.
>>>>>>> 
>>>>>>> I am not opposed to having this extended at some point in the future, 
>>>>>>> once we have a second token type.   The new token type should be 
>>>>>>> available to do updates as well.
>>>>>>> 
>>>>>>> The problem is that starting down the HoK route potentially requires a 
>>>>>>> registered client that may need to be registered to do the 
>>>>>>> registration.  
>>>>>>> I think that is best left to another spec to sort out the possible 
>>>>>>> turtles.
>>>>>>> 
>>>>>>> So the default needs to be bearer tokens unless registration is 
>>>>>>> extended by another profile.
>>>>>>> 
>>>>>>> John B.
>>>>>>> On 2013-06-06, at 10:15 AM, "Tschofenig, Hannes (NSN - FI/Espoo)" 
>>>>>>> <hannes.tschofe...@nsn.com> wrote:
>>>>>>> 
>>>>>>>> Because bearer tokens have a stable RFC-numbered spec and are widely 
>>>>>>>> implemented and the registration flow as documented seems like it 
>>>>>>>> should work?  -T
>>>>>>>>  
>>>>>>>> That’s the answer for why there is support for bearer tokens but it is 
>>>>>>>> not the answer to why that’s the only supported mechanism.
>>>>>>>> If we want to support stronger security mechanisms (which the group 
>>>>>>>> has decided to work on already) then we need to have a story on how to 
>>>>>>>> support the other mechanisms as well .
>>>>>>>> _______________________________________________
>>>>>>>> OAuth mailing list
>>>>>>>> OAuth@ietf.org
>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>> 
>>>>>>> _______________________________________________
>>>>>>> OAuth mailing list
>>>>>>> OAuth@ietf.org
>>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>> 
>>>>>> 
>>>>>> _______________________________________________
>>>>>> OAuth mailing list
>>>>>> OAuth@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>> 
>>>> 
>>> 
>> 
> 

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to