Forgot reply all.

Phil

Begin forwarded message:

> From: Phil Hunt <phil.h...@oracle.com>
> Date: 30 July, 2013 17:25:46 GMT+02:00
> To: "Richer, Justin P." <jric...@mitre.org>
> Subject: Re: [OAUTH-WG] New Version Notification for 
> draft-hunt-oauth-v2-user-a4c-00.txt
> 
> The whole point is authn only. Many do not want or need the userinfo 
> endpoint. 
> 
> Phil
> 
> On 2013-07-30, at 17:17, "Richer, Justin P." <jric...@mitre.org> wrote:
> 
>> What do you mean? You absolutely can implement a compliant OIDC server 
>> nearly as simply as this. The things that you're missing I think are 
>> necessary for basic interoperable functionality, and are things that other 
>> folks using OAuth for authentication have also implemented. Namely:
>> 
>>  - Signing the ID token (OIDC specifies the RS256 flavor of JWS, which is 
>> easy to do with JWT). Without a signed and verifiable ID token or 
>> equivalent, you're asking for all kinds of token injection problems.
>>  - Session management requests (max auth age, auth time)
>>  - Not fall over with other parameters that you don't support (display, 
>> prompt, etc).
>> 
>> See here for more information:
>> 
>>   http://openid.net/specs/openid-connect-messages-1_0.html#ServerMTI
>> 
>> Additionally, something that's really important to support is the User Info 
>> Endpoint, so you can actually get user profile information beyond just the 
>> simple "someone was here" claim -- this was the real value of Facebook 
>> Connect from an RP's perspective. Some people will probably want to use SCIM 
>> for this, too, and that's fine.
>> 
>>  -- Justin
>> 
>> On Jul 30, 2013, at 10:54 AM, Phil Hunt <phil.h...@oracle.com>
>>  wrote:
>> 
>>> The oidc specs do not allow this simple an implementation. The spec members 
>>> have not shown interest in making changes as they say they are too far down 
>>> the road.
>>> 
>>> I have tried to make my draft as close as possible to oidc but maybe it 
>>> shouldn't be clarity wise. I am interested in what the group feels is 
>>> clearest. 
>>> 
>>> From an ietf perspective the concern is improper use of the 6749 for authn. 
>>> Is this a bug or gap we need to address?
>>> 
>>> Phil
>>> 
>>> On 2013-07-30, at 16:46, "Richer, Justin P." <jric...@mitre.org> wrote:
>>> 
>>>> From what I read, you've defined something that uses an OAuth 2 code flow 
>>>> to get an extra token which is specified as a JWT. You named it 
>>>> "session_token" instead of "id_token", and you've left off the User 
>>>> Information Endpoint -- but other than that, this is exactly the Basic 
>>>> Client for OpenID Connect. In other words, if you change the names on 
>>>> things you've got OIDC, but without the capabilities to go beyond a very 
>>>> basic "hey there's a user here" claim. This is the same place that OpenID 
>>>> 2.0 started, and it was very, very quickly extended with SREG, AX, PAPE, 
>>>> and others for it to be useful in the real world of distributed logins. 
>>>> You've also left out discovery and registration which are required for 
>>>> distributed deployments, but I'm guessing that those would be modular 
>>>> components that could be added in (like they are in OIDC). 
>>>> 
>>>> I've heard complaints that OIDC is complicated, but it's really not. Yes, 
>>>> I agree that the giant stack of documents is intimidating and in my 
>>>> opinion it's a bit of a mess with Messages and Standard split up (but I 
>>>> lost that argument years ago). However, at the core, you've got an OAuth2 
>>>> authorization server that spits out access tokens and id tokens. The id 
>>>> token is a JWT with some known claims (iss, sub, etc) and is issued along 
>>>> side the access token, and its audience is the *client* and not the 
>>>> *protected resource*. The access token is a regular old access token and 
>>>> its format is undefined (so you can use it with an existing OAuth2 server 
>>>> setup, like we have), and it can be used at the User Info Endpoint to get 
>>>> profile information about the user who authenticated. It could also be 
>>>> used for other services if your AS/IdP protects multiple things.
>>>> 
>>>> So I guess what I'm missing is what's the value proposition in this spec 
>>>> when we have something that can do this already? And this doesn't seem to 
>>>> do anything different (apart from syntax changes)?
>>>> 
>>>>  -- Justin
>>>> 
>>>> On Jul 29, 2013, at 4:14 AM, Phil Hunt <phil.h...@oracle.com> wrote:
>>>> 
>>>>> FYI.  I have been noticing a substantial number of sites acting as OAuth 
>>>>> Clients using OAuth to authenticate users.
>>>>> 
>>>>> I know several of us have blogged on the issue over the past year so I 
>>>>> won't re-hash it here.  In short, many of us recommended OIDC as the 
>>>>> correct methodology.
>>>>> 
>>>>> Never-the-less, I've spoken with a number of service providers who 
>>>>> indicate they are not ready to make the jump to OIDC, yet they agree 
>>>>> there is a desire to support authentication only (where as OIDC does 
>>>>> IDP-like services).
>>>>> 
>>>>> This draft is intended as a minimum authentication only specification.  
>>>>> I've tried to make it as compatible as possible with OIDC.
>>>>> 
>>>>> For now, I've just posted to keep track of the issue so we can address at 
>>>>> the next re-chartering.
>>>>> 
>>>>> Happy to answer questions and discuss. 
>>>>> 
>>>>> Phil
>>>>> 
>>>>> @independentid
>>>>> www.independentid.com
>>>>> phil.h...@oracle.com
>>>>> 
>>>>> 
>>>>> 
>>>>> 
>>>>> 
>>>>> Begin forwarded message:
>>>>> 
>>>>>> From: internet-dra...@ietf.org
>>>>>> Subject: New Version Notification for draft-hunt-oauth-v2-user-a4c-00.txt
>>>>>> Date: 29 July, 2013 9:49:41 AM GMT+02:00
>>>>>> To: Phil Hunt <phil.h...@yahoo.com>, Phil Hunt <n...@ietfa.amsl.com>,  
>>>>>> Phil Hunt <>
>>>>>> 
>>>>>> 
>>>>>> A new version of I-D, draft-hunt-oauth-v2-user-a4c-00.txt
>>>>>> has been successfully submitted by Phil Hunt and posted to the
>>>>>> IETF repository.
>>>>>> 
>>>>>> Filename: draft-hunt-oauth-v2-user-a4c
>>>>>> Revision: 00
>>>>>> Title: OAuth 2.0 User Authentication For Client
>>>>>> Creation date: 2013-07-29
>>>>>> Group: Individual Submission
>>>>>> Number of pages: 9
>>>>>> URL:             
>>>>>> http://www.ietf.org/internet-drafts/draft-hunt-oauth-v2-user-a4c-00.txt
>>>>>> Status:          
>>>>>> http://datatracker.ietf.org/doc/draft-hunt-oauth-v2-user-a4c
>>>>>> Htmlized:        
>>>>>> http://tools.ietf.org/html/draft-hunt-oauth-v2-user-a4c-00
>>>>>> 
>>>>>> 
>>>>>> Abstract:
>>>>>>   This specification defines a new OAuth2 endpoint that enables user
>>>>>>   authentication session information to be shared with client
>>>>>>   applications.
>>>>>> 
>>>>>> 
>>>>>> 
>>>>>> 
>>>>>> Please note that it may take a couple of minutes from the time of 
>>>>>> submission
>>>>>> until the htmlized version and diff are available at tools.ietf.org.
>>>>>> 
>>>>>> The IETF Secretariat
>>>>> 
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>> 
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to