+1

The chosen solution should account for this.  

Phil

On 2013-08-20, at 2:34, Torsten Lodderstedt <tors...@lodderstedt.net> wrote:

> Hi Phil,
> 
> I agree, the client may also present a client_id obtained from another 
> "source". But: the AS must be able to associate a policy with this particular 
> id. This typically requires a provisioning of the client id before the actual 
> OAuth interaction takes place. Otherwise the AS does not have any information 
> regarding the client id in the code flow at authz endpoint.
> 
> This needs to be taken into account.
> 
> regards,
> Torsten.
> 
> Am 20.08.2013 um 08:12 schrieb Phil Hunt <phil.h...@oracle.com>:
> 
>> Sorry i see my message still isn't that clear.  I am saying there is no 
>> requirement that a client directly obtain a client_id from the as service 
>> provider. It is merely an assumption that has been made by dyn reg based on 
>> typical use patterns to date. 
>> 
>> It could be reasonable for a client to generate it's own guid or more 
>> likely, use an assertion signed by a party the service provider trusts. 
>> 
>> Phil
>> 
>> On 2013-08-19, at 22:53, Phil Hunt <phil.h...@oracle.com> wrote:
>> 
>>> See below
>>> 
>>> Phil
>>> 
>>> On 2013-08-19, at 22:34, Torsten Lodderstedt <tors...@lodderstedt.net> 
>>> wrote:
>>> 
>>>> Hi Phil,
>>>> 
>>>> 
>>>> 
>>>> 
>>>>> The assumption that client id must be issued by the sp seems wrong to
>>>>> me in many cases-- including oidc. 6749 does not make this restriction
>>>>> at all.
>>>> 
>>>> What do you mean? Grant type code requires a client_id in order to 
>>>> identify the client at the AS's authz endpoint. Based on this data, the AS 
>>>> chooses the authz policy and validates the redirect_uri.
>>> 
>>> [ph] yes. But i am referring to the fact that the client does not have to 
>>> obtain it from the as. It merely has to present one that is accepted. 
>>> 
>>> Iow a federated assertion might solve the issue. 
>>>> 
>>>>> 
>>>>> Given this, a statement approach may be sufficient for many clients. No
>>>>> need for long term credential mgmt or records.
>>>> 
>>>> Perhaps for clients using the token endpoint only.
>>> 
>>> [Ph] Actually I was also thinking of javascript clients. 
>>>> 
>>>> regards,
>>>> Torsten.
>>>> 
>>>>> 
>>>>> Phil
>>>>> 
>>>>> On 2013-08-19, at 16:33, Eve Maler <e...@xmlgrrl.com> wrote:
>>>>> 
>>>>>> Hi folks-- Just a reminder that the first draft the UMA group
>>>>> submitted on May 1, 2011 contained extensive requirements and use cases
>>>>> related to UMA's various needs for dynamic client registration:
>>>>>> 
>>>>>> http://tools.ietf.org/html/draft-hardjono-oauth-dynreg-00
>>>>>> 
>>>>>> When there was interest to pick up this draft as a WG work item, it
>>>>> was recommended that we excise this content so that the doc wouldn't be
>>>>> so specific to our particular usage of OAuth.
>>>>>> 
>>>>>> I point this out just to show that the need for dynamic client
>>>>> registration isn't limited to OpenID Connect, and that some specific
>>>>> use cases have already been floated here.
>>>>>> 
>>>>>> FWIW,
>>>>>> 
>>>>>> Eve
>>>>>> 
>>>>>> On 19 Aug 2013, at 8:31 AM, Justin Richer <jric...@mitre.org> wrote:
>>>>>> 
>>>>>>> All of this is a good argument to do both, which is what I've been
>>>>> saying all along.
>>>>>>> 
>>>>>>> -- Justin
>>>>>>> 
>>>>>>> On 08/19/2013 11:33 AM, Phil Hunt wrote:
>>>>>>>> I do not recall agreement in charter discussions to solving a
>>>>> specific case.
>>>>>>>> 
>>>>>>>> I recall more than one in the re-chartering discussion said dyn reg
>>>>> needed major changes to solve their use cases.
>>>>>>>> 
>>>>>>>> Phil
>>>>>>>> 
>>>>>>>> On 2013-08-19, at 8:18, Justin Richer <jric...@mitre.org> wrote:
>>>>>>>> 
>>>>>>>>> Tony, I completely disagree. The proposals that I've seen have
>>>>> different means and different end states, and they make different
>>>>> assumptions about the relationship between entities and the
>>>>> capabilities of all players.
>>>>>>>>> 
>>>>>>>>> -- Justin
>>>>>>>>> 
>>>>>>>>> On 08/19/2013 11:15 AM, Anthony Nadalin wrote:
>>>>>>>>>> There are proposals out there that are trying to solve the same
>>>>> problem, but in different ways, so I would not say that they are trying
>>>>> to solve different use cases. I do think that we need to make sure that
>>>>> whatever proposal we select it needs to have a wide range of use cases
>>>>> it solves, not just a single use case as the more solutions this group
>>>>> produces the more confused folks will be
>>>>>>>>>> 
>>>>>>>>>> -----Original Message-----
>>>>>>>>>> From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On
>>>>> Behalf Of Justin Richer
>>>>>>>>>> Sent: Monday, August 19, 2013 7:27 AM
>>>>>>>>>> To: Phil Hunt
>>>>>>>>>> Cc: oauth mailing list
>>>>>>>>>> Subject: Re: [OAUTH-WG] Dynamic Client Registration Conference
>>>>> Call: Thu 22 Aug, 2pm PDT
>>>>>>>>>> 
>>>>>>>>>> I agree that dynamic registration isn't needed to solve *all* of
>>>>> the different use cases. It solves its set of specific problems (and
>>>>> does so well, if you ask me), but there are and will always be things
>>>>> that it won't work for, and that's fine. That's why I've suggested
>>>>> under a separate thread that the other drafts go forward separately and
>>>>> that DynReg not be hung up on them. We're fundamentally solving
>>>>> different use cases, and there is no magic solution that will solve all
>>>>> the problems at once.
>>>>>>>>>> 
>>>>>>>>>> -- Justin
>>>>>>>>>> 
>>>>>>>>>> On 08/18/2013 08:15 PM, Phil Hunt wrote:
>>>>>>>>>>> I think we should start by reviewing use cases taxonomy.
>>>>>>>>>>> 
>>>>>>>>>>> Then a discussion on any client_id assumptions and actual
>>>>> requirements for each client case. Why is registration needed for each
>>>>> case?
>>>>>>>>>>> 
>>>>>>>>>>> The statement can solve some complication but should be put in
>>>>> context of use cases.
>>>>>>>>>>> 
>>>>>>>>>>> Phil
>>>>>>>>>>> 
>>>>>>>>>>> On 2013-08-18, at 15:01, Hannes Tschofenig
>>>>> <hannes.tschofe...@gmx.net> wrote:
>>>>>>>>>>> 
>>>>>>>>>>>> -----BEGIN PGP SIGNED MESSAGE-----
>>>>>>>>>>>> Hash: SHA512
>>>>>>>>>>>> 
>>>>>>>>>>>> - -----BEGIN PGP SIGNED MESSAGE-----
>>>>>>>>>>>> Hash: SHA512
>>>>>>>>>>>> 
>>>>>>>>>>>> Based on your feedback via the poll let us start with August
>>>>> 22nd with the first conference call. I will distribute the conference
>>>>> call details on Tuesday.
>>>>>>>>>>>> 
>>>>>>>>>>>> Let us talk about the agenda. There were several items brought
>>>>> up in
>>>>>>>>>>>> discussions, namely
>>>>>>>>>>>> 
>>>>>>>>>>>> * Software assertions / software statements
>>>>>>>>>>>> 
>>>>>>>>>>>> We briefly discussed this topic at the IETF OAuth session but
>>>>> we may need more time to understand the implications for the current
>>>>> dynamic client registration document:
>>>>> http://www.ietf.org/proceedings/87/slides/slides-87-oauth-2.pptx
>>>>>>>>>>>> 
>>>>>>>>>>>> * SCIM vs. current dynamic client registration approach for
>>>>>>>>>>>> interacting with the client configuration endpoint
>>>>>>>>>>>> 
>>>>>>>>>>>> In the past we said that it would be fine to have a profile
>>>>> defined in SCIM to provide the dynamic client registration for those
>>>>> who implement SCIM and want to manage clients also using SCIM. It
>>>>> might, however, be useful to compare the two approaches in detail to
>>>>> see what the differences are.
>>>>>>>>>>>> 
>>>>>>>>>>>> * Interactions with the client registration endpoint
>>>>>>>>>>>> 
>>>>>>>>>>>> Justin added some "life cycle" description to the document to
>>>>> motivate some of the design decisions. Maybe we need to discuss those
>>>>> in more detail and add further text.
>>>>>>>>>>>> Additional text could come from the NIST Blue Button / Green
>>>>> Button usage.
>>>>>>>>>>>> 
>>>>>>>>>>>> * Aspects that allow servers to store less / no state
>>>>>>>>>>>> 
>>>>>>>>>>>> - - From the discussions on the list it was not clear whether
>>>>> this is actually accomplishable with the current version of OAuth. We
>>>>> could explore this new requirement and try to get a better
>>>>> understanding how much this relates to dynamic client registration and
>>>>> to what extend it requires changes to the core spec.
>>>>>>>>>>>> 
>>>>>>>>>>>> 
>>>>>>>>>>>> What would you like to start with? Other topics you would like
>>>>> to bring up?
>>>>>>>>>>>> - -----BEGIN PGP SIGNATURE-----
>>>>>>>>>>>> Version: GnuPG/MacGPG2 v2.0.19 (Darwin)
>>>>>>>>>>>> Comment: GPGTools - http://gpgtools.org
>>>>> iQEcBAEBCgAGBQJSEULvAAoJEGhJURNOOiAtttEH/Aogg8Q/R/L9/mzU05IQbnze
>>>>> AdXB1ZvySkV3jZT4I5shmP7hQr6mc6P6UdvyOrSjrvPlBHen55/oa5z7Cwchd1dk
>>>>> dcDUEavbodjnm9SrOs0nKaTvdeZimFSBkGMrfhoTYLXpymP24F9PZgwUXdOcFocF
>>>>> OiCs3qDajYaA395DCg5+4mOLQQgDnmy4drlgj2NPv1nMBRDBubzgAhJccwF2BLN9
>>>>> IW7MAwTEu7vYT/gwIFzriPkui7gYpf8sAqsnzf/z7FtXbsP8imgOKUlQxzZzeSSP
>>>>> QEb6+syyMD9Gt6wxQfWzyl5T0bYLP6DQ+ldZR8yGKCwb+2k3LN6Q8bIpj4mIERI=
>>>>>>>>>>>> =tkGT
>>>>>>>>>>>> - -----END PGP SIGNATURE-----
>>>>>>>>>>>> -----BEGIN PGP SIGNATURE-----
>>>>>>>>>>>> Version: GnuPG/MacGPG2 v2.0.19 (Darwin)
>>>>>>>>>>>> Comment: GPGTools - http://gpgtools.org
>>>>> iQEcBAEBCgAGBQJSEUQfAAoJEGhJURNOOiAt8wkIAI3xgdsWuOB36KLiMLRUG+Zb
>>>>> RvYqV+rOH80m7YVJcdOLjQJcpPqOIBdzq/yuNiAaF1uFJCqBn97ZQ/NLXLNGcg8x
>>>>> wI/Laz7kP2U4B2trBTMtAf2wsY9uYw4Eh+eOEDKGF6cmkEzrzrlw4q/Sfu6vy181
>>>>> VI+kqwzZ+iYX4iL3NYPlkg3rwF4OZ1v3T08Erg2SPrbmNd1TRfJJU8HrYFEJQo1q
>>>>> p0RiLjcFFDCEZs0gDr9zliCXllV7J9h2ttqLq8+xwPATDuO6buQdFS9vZQ8t1u36
>>>>> a0FIuy3NM8PQbblC3B5WumUjW4kntLV09ytYV8h6S8C/dgFwMqzAwEAeNx1exyE=
>>>>>>>>>>>> =3qNI
>>>>>>>>>>>> -----END PGP SIGNATURE-----
>>>>>>>>>>>> _______________________________________________
>>>>>>>>>>>> OAuth mailing list
>>>>>>>>>>>> OAuth@ietf.org
>>>>>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>>>>>> _______________________________________________
>>>>>>>>>>> OAuth mailing list
>>>>>>>>>>> OAuth@ietf.org
>>>>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>>>>> _______________________________________________
>>>>>>>>>> OAuth mailing list
>>>>>>>>>> OAuth@ietf.org
>>>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>> 
>>>>>>> _______________________________________________
>>>>>>> OAuth mailing list
>>>>>>> OAuth@ietf.org
>>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>> 
>>>>>> 
>>>>>> Eve Maler                                 
>>>>> http://www.xmlgrrl.com/blog
>>>>>> +1 425 345 6756                        
>>>>> http://www.twitter.com/xmlgrrl
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to