Yes. A client could pass the software statement *directly* as its client credential. Which is one of the *simple* solutions. 8-)
The other case is where the client instance needs its own credential as George indicates. In that case it could swap the statement for a unique client assertion. Phil @independentid www.independentid.com phil.h...@oracle.com On 2013-08-28, at 9:38 AM, Sergey Beryozkin <sberyoz...@gmail.com> wrote: > On 28/08/13 17:33, George Fletcher wrote: >> So I understand that you'd rather that OAuth doesn't require a >> client_secret and that's fine. However, I don't think we should impose >> that thinking on the rest of the world who have already implemented it >> and have it working and scaling without issues. If the core of this >> discussion is around replacing client_id and client_secret with a >> client_assertion then lets have that discussion separately and not bury >> it in the dynamic registration discussion. >> >> Could you not profile OAuth2 to support a flow that allows for retrieval >> of access and refresh tokens using code + client_assertion? Doesn't seem >> like that hard a profile and then the rest of this could fall out pretty >> easily. >> > That is already supported AFAIK, something like > > grant_type=authorization_code > &code=12345678 > &client_assertion_type=urn%3Aietf%3Aparams%3Aoauth%3Aclient-assertion-type%3Asaml2-bearer > &client_assertion=Base64UrlEncoded-SAML2-Bearer-Assertion > > probably the same works with JWT > > Sergey > > >> Thanks, >> George >> >> On 8/28/13 12:28 PM, Anthony Nadalin wrote: >>> >>> I do think that this is the rare-edge use case, we would not want >>> require client-secret, we already have that mess today with OAuth and >>> trying not to continue the proliferation, we solve this today with our >>> STS and assertion swaps/transformations, it scales, performs and we >>> don’t have the management debacle this specification creates >>> >>> *From:*oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] *On >>> Behalf Of *George Fletcher >>> *Sent:* Wednesday, August 28, 2013 9:21 AM >>> *To:* Phil Hunt >>> *Cc:* oauth mailing list >>> *Subject:* Re: [OAUTH-WG] Dynamic Client Registration Conference Call: >>> Wed 28 Aug, 2pm PDT: Conference Bridge Details >>> >>> On 8/28/13 12:02 PM, Phil Hunt wrote: >>> >>> Please define the all in one case. I think this is the edge case and is >>> in fact rare. >>> >>> >>> >>> I agree, in many cases step 1 can be made by simply approving a class of >>> software. But then step 2 is simplified. >>> >>> >>> >>> Dyn reg assumes every registration of an instance is unique which too me >>> is a very extreme >>> >>> If you have a mobile app that needs to do the code flow... which >>> requires a client_secret in order to retrieve the access token and >>> refresh token, how does the app do this without per app instance >>> registration? >>> >>> I'd argue that almost all user facing mobile apps will want the above >>> flow and that's not a small, rare edge case. >>> >>> Thanks, >>> George >>> >>> position. >>> >>> >>> >>> Phil >>> >>> >>> >>> On 2013-08-28, at 8:41, Justin Richer<jric...@mitre.org> >>> <mailto:jric...@mitre.org> wrote: >>> >>> >>> >>> Except for the cases where you want step 1 to happen in band. To me, >>> that is a vitally and fundamentally important use case that we can't >>> disregard, and we must have a solution that can accommodate that. The >>> notions of "publisher" and "product" fade very quickly once you get outside >>> of the software vendor world. >>> >>> >>> >>> This is, of course, not to stand in the way of other solutions or >>> approaches (such as something assertion based like you're after). It's not >>> a one-or-the-other proposition, especially when there are mutually >>> exclusive aspects of each. >>> >>> >>> >>> Therefore I once again call for the WG to finish the current dynamic >>> registration spec *AND* pursue the assertion based process that Phil's >>> talking about. They're not mutually exclusive, let's please stop talking >>> about them like they are. >>> >>> >>> >>> -- Justin >>> >>> >>> >>> On 08/28/2013 11:17 AM, Phil Hunt wrote: >>> >>> Sorry. I meant also to say i think there are 2 registration steps >>> >>> 1. Software registration/approval. This often happens out of >>> band. But in this step policy is defined that approves software for use. >>> Many of the reg params are known here. >>> >>> >>> >>> Federation techniques come into play as trust approvals can be >>> based on developer, product or even publisher. >>> >>> >>> >>> 2. Each instance associates in a stateless way. Only clients >>> that need credential rotation need more. >>> >>> >>> >>> Phil >>> >>> >>> >>> On 2013-08-28, at 8:04, Phil Hunt<phil.h...@oracle.com> >>> <mailto:phil.h...@oracle.com> wrote: >>> >>> >>> >>> I have a conflict I cannot get out of for 2pacific. >>> >>> >>> >>> I think a certificate based approach is going to simplify >>> exchanges in all cases. I encourage the group to explore the concept on the >>> call. >>> >>> >>> >>> I am not sure breaking dyn reg up helps. It creates yet >>> another option. I would like to explore how federation concept in software >>> statements can help with facilitating association and making many reg >>> stateless. >>> >>> >>> >>> Phil >>> >>> >>> >>> On 2013-08-28, at 5:43, "Tschofenig, Hannes (NSN - >>> FI/Espoo)"<hannes.tschofe...@nsn.com> <mailto:hannes.tschofe...@nsn.com> >>> wrote: >>> >>> >>> >>> Here are the conference bridge / Webex details for the >>> call today. >>> >>> We are going to complete the use case discussions from >>> last time (Phil wasn't able to walk through all slides). Justin was also >>> able to work out a strawman proposal based on the discussions last week and >>> we will have a look at it to see whether this is a suitable compromise. >>> Here is Justin's mail, in case you have missed >>> it:http://www.ietf.org/mail-archive/web/oauth/current/msg12036.html >>> >>> >>> >>> Phil, please feel free to make adjustments to your >>> slides given the Justin's recent proposal. >>> >>> >>> >>> Topic: OAuth Dynamic Client Registration >>> >>> Date: Wednesday, August 28, 2013 >>> >>> Time: 2:00 pm, Pacific Daylight Time (San Francisco, >>> GMT-07:00) >>> >>> Meeting Number: 703 230 586 >>> >>> Meeting Password: oauth >>> >>> >>> >>> ------------------------------------------------------- >>> >>> To join the online meeting >>> >>> ------------------------------------------------------- >>> >>> 1. Go >>> tohttps://nsn.webex.com/nsn/j.php?ED=269567657&UID=0&PW=NNTI1ZWQzMDJk&RT=MiM0 >>> >>> 2. Enter your name and email address. >>> >>> 3. Enter the meeting password: oauth >>> >>> 4. Click "Join Now". >>> >>> >>> >>> To view in other time zones or languages, please click >>> the link: >>> >>> >>> https://nsn.webex.com/nsn/j.php?ED=269567657&UID=0&PW=NNTI1ZWQzMDJk&ORT=MiM0 >>> >>> >>> >>> To add this meeting to your calendar program (for >>> example Microsoft Outlook), click this link: >>> >>> >>> https://nsn.webex.com/nsn/j.php?ED=269567657&UID=0&ICS=MI&LD=1&RD=2&ST=1&SHA2=C6-AjLGvhdYjmpVdx75M6UsAwrNLMsequ5n95Gyv1R8=&RT=MiM0 >>> >>> >>> >>> ------------------------------------------------------- >>> >>> To join the teleconference only >>> >>> ------------------------------------------------------- >>> >>> Global dial-in >>> Numbers:http://www.nokiasiemensnetworks.com/nvc >>> >>> Conference Code: 944 910 5485 >>> >>> >>> >>> >>> >>> _______________________________________________ >>> >>> OAuth mailing list >>> >>> OAuth@ietf.org <mailto:OAuth@ietf.org> >>> >>> https://www.ietf.org/mailman/listinfo/oauth >>> >>> _______________________________________________ >>> >>> OAuth mailing list >>> >>> OAuth@ietf.org <mailto:OAuth@ietf.org> >>> >>> https://www.ietf.org/mailman/listinfo/oauth >>> >>> _______________________________________________ >>> >>> OAuth mailing list >>> >>> OAuth@ietf.org <mailto:OAuth@ietf.org> >>> >>> https://www.ietf.org/mailman/listinfo/oauth >>> >>> >>> >>> _______________________________________________ >>> >>> OAuth mailing list >>> >>> OAuth@ietf.org <mailto:OAuth@ietf.org> >>> >>> https://www.ietf.org/mailman/listinfo/oauth >>> >>> >>> >>> >>> >>> -- >>> George Fletcher <http://connect.me/gffletch> >>> >> >> -- >> George Fletcher <http://connect.me/gffletch> >> >> >> _______________________________________________ >> OAuth mailing list >> OAuth@ietf.org >> https://www.ietf.org/mailman/listinfo/oauth >> > > > -- > Sergey Beryozkin > > Talend Community Coders > http://coders.talend.com/ > > Blog: http://sberyozkin.blogspot.com > _______________________________________________ > OAuth mailing list > OAuth@ietf.org > https://www.ietf.org/mailman/listinfo/oauth _______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth