Hi Phil,

You would send the client's credential to the authz endpoint, so it would go 
through the browser and would be exposed to other parties.

I agree with George and others. This is a topic different from dyn reg and 
should be handled independently. 

I personally consider assertions as means to client authentication an 
interesting option we should further evaluate. But this would be an evolution 
to OAuth itself.

regards,
Torsten.



Phil Hunt <phil.h...@oracle.com> schrieb:
>You can pass anything as a client_id.  It just has to be accepted.
>That's the point of us writing a draft here isn't it?
>
>Phil
>
>@independentid
>www.independentid.com
>phil.h...@oracle.com
>
>
>
>
>
>
>
>On 2013-08-28, at 9:45 AM, John Bradley <ve7...@ve7jtb.com> wrote:
>
>> That is my concern as well, sending an assertion to the authorization
>endpoint requires a extension of OAuth to add another parameter or
>placing it in the client_id which you can do now with the dynamic reg
>spec if the AS wants to. 
>> 
>> Holding up client registration for something that will require an
>extension to OAuth is overdoing it.   We need something for the OAuth
>spec we have now without requiring clients implement the assertion flow
>and other extensions.
>> 
>> John B.
>> 
>> On 2013-08-28, at 12:39 PM, Justin Richer <jric...@mitre.org> wrote:
>> 
>>> The initial_access_token doesn't assume that it's from the local
>domain. It merely assumes that the authorization server accepts the
>token, which would be true in the UMA case due to the federation. It
>could also be the exact same kinds of mechanisms that the software
>statement would use to achieve federation.
>>> 
>>> I still don't see how an auth server is going to know about a
>client's configuration state with the assertion swap method, since
>there's no defined mechanism for sending a JWT assertion to the
>authorization endpoint. 
>>> 
>>>  -- Justin
>>> 
>>> On 08/28/2013 12:35 PM, Phil Hunt wrote:
>>>> George,
>>>> 
>>>> It would be reasonable for a client to submit an assertion, and
>obtain its own client assertion in return.  This is very close to what
>is happening per 2.1, 2.2 of
>http://tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-06
>>>> 
>>>> In this case, the Software Statement is an authorization that is
>exchanged for a client assertion in return. Then the clients
>authenticate per section 2.2 of the JWT spec.
>>>> 
>>>> Regarding initial_access_token.  This does have some of the
>characteristics I am speaking of. But it is unspecified and the
>assumption is that it is issued by the local domain.  This doesn't work
>in the UMA case because that's more like a federated model. Thus the
>specified software statement works because the AS can approve the
>client software based on name, and/or developer, and/or publisher --
>whatever trust requires.
>>>> 
>>>> Phil
>>>> 
>>>> @independentid
>>>> www.independentid.com
>>>> phil.h...@oracle.com
>>>> 
>>>> 
>>>> 
>>>> 
>>>> 
>>>> 
>>>> 
>>>> On 2013-08-28, at 9:29 AM, George Fletcher <gffle...@aol.com>
>wrote:
>>>> 
>>>>> I can't say I understand what you mean by a simple assertion
>swap... but if you are wanting to use a client_assertion flow instead
>of the code flow then that's something completely different. If you are
>saying that you want the client_id to represent an "instance" in a
>stateless way using an "assertion" then that's already possible today.
>>>>> 
>>>>> George
>>>>> 
>>>>> On 8/28/13 12:23 PM, Phil Hunt wrote:
>>>>>> George
>>>>>> 
>>>>>> That case can be solved with a simple assertion swap. We just
>have to profile it. 
>>>>>> 
>>>>>> Phil
>>>>>> 
>>>>>> On 2013-08-28, at 9:20, George Fletcher <gffle...@aol.com> wrote:
>>>>>> 
>>>>>>> 
>>>>>>> On 8/28/13 12:02 PM, Phil Hunt wrote:
>>>>>>>> Please define the all in one case. I think this is the edge
>case and is in fact rare. 
>>>>>>>> 
>>>>>>>> I agree, in many cases step 1 can be made by simply approving a
>class of software. But then step 2 is simplified. 
>>>>>>>> 
>>>>>>>> Dyn reg assumes every registration of an instance is unique
>which too me is a very extreme 
>>>>>>> If you have a mobile app that needs to do the code flow... which
>requires a client_secret in order to retrieve the access token and
>refresh token, how does the app do this without per app instance
>registration? 
>>>>>>> 
>>>>>>> I'd argue that almost all user facing mobile apps will want the
>above flow and that's not a small, rare edge case.
>>>>>>> 
>>>>>>> Thanks,
>>>>>>> George
>>>>>>>> position. 
>>>>>>>> 
>>>>>>>> Phil
>>>>>>>> 
>>>>>>>> On 2013-08-28, at 8:41, Justin Richer <jric...@mitre.org>
>wrote:
>>>>>>>> 
>>>>>>>>> Except for the cases where you want step 1 to happen in band.
>To me, that is a vitally and fundamentally important use case that we
>can't disregard, and we must have a solution that can accommodate that.
>The notions of "publisher" and "product" fade very quickly once you get
>outside of the software vendor world.
>>>>>>>>> 
>>>>>>>>> This is, of course, not to stand in the way of other solutions
>or approaches (such as something assertion based like you're after).
>It's not a one-or-the-other proposition, especially when there are
>mutually exclusive aspects of each.
>>>>>>>>> 
>>>>>>>>> Therefore I once again call for the WG to finish the current
>dynamic registration spec *AND* pursue the assertion based process that
>Phil's talking about. They're not mutually exclusive, let's please stop
>talking about them like they are.
>>>>>>>>> 
>>>>>>>>> -- Justin
>>>>>>>>> 
>>>>>>>>> On 08/28/2013 11:17 AM, Phil Hunt wrote:
>>>>>>>>>> Sorry. I meant also to say i think there are 2 registration
>steps.
>>>>>>>>>> 
>>>>>>>>>> 1. Software registration/approval. This often happens out of
>band. But in this step policy is defined that approves software for
>use. Many of the reg params are known here.
>>>>>>>>>> 
>>>>>>>>>> Federation techniques come into play as trust approvals can
>be based on developer, product or even publisher.
>>>>>>>>>> 
>>>>>>>>>> 2. Each instance associates in a stateless way. Only clients
>that need credential rotation need more.
>>>>>>>>>> 
>>>>>>>>>> Phil
>>>>>>>>>> 
>>>>>>>>>> On 2013-08-28, at 8:04, Phil Hunt <phil.h...@oracle.com>
>wrote:
>>>>>>>>>> 
>>>>>>>>>>> I have a conflict I cannot get out of for 2pacific.
>>>>>>>>>>> 
>>>>>>>>>>> I think a certificate based approach is going to simplify
>exchanges in all cases. I encourage the group to explore the concept on
>the call.
>>>>>>>>>>> 
>>>>>>>>>>> I am not sure breaking dyn reg up helps. It creates yet
>another option. I would like to explore how federation concept in
>software statements can help with facilitating association and making
>many reg stateless.
>>>>>>>>>>> 
>>>>>>>>>>> Phil
>>>>>>>>>>> 
>>>>>>>>>>> On 2013-08-28, at 5:43, "Tschofenig, Hannes (NSN -
>FI/Espoo)" <hannes.tschofe...@nsn.com> wrote:
>>>>>>>>>>> 
>>>>>>>>>>>> Here are the conference bridge / Webex details for the call
>today.
>>>>>>>>>>>> We are going to complete the use case discussions from last
>time (Phil wasn't able to walk through all slides). Justin was also
>able to work out a strawman proposal based on the discussions last week
>and we will have a look at it to see whether this is a suitable
>compromise. Here is Justin's mail, in case you have missed it:
>http://www.ietf.org/mail-archive/web/oauth/current/msg12036.html
>>>>>>>>>>>> 
>>>>>>>>>>>> Phil, please feel free to make adjustments to your slides
>given the Justin's recent proposal.
>>>>>>>>>>>> 
>>>>>>>>>>>> Topic: OAuth Dynamic Client Registration
>>>>>>>>>>>> Date: Wednesday, August 28, 2013
>>>>>>>>>>>> Time: 2:00 pm, Pacific Daylight Time (San Francisco,
>GMT-07:00)
>>>>>>>>>>>> Meeting Number: 703 230 586
>>>>>>>>>>>> Meeting Password: oauth
>>>>>>>>>>>> 
>>>>>>>>>>>> -------------------------------------------------------
>>>>>>>>>>>> To join the online meeting
>>>>>>>>>>>> -------------------------------------------------------
>>>>>>>>>>>> 1. Go to
>https://nsn.webex.com/nsn/j.php?ED=269567657&UID=0&PW=NNTI1ZWQzMDJk&RT=MiM0
>>>>>>>>>>>> 2. Enter your name and email address.
>>>>>>>>>>>> 3. Enter the meeting password: oauth
>>>>>>>>>>>> 4. Click "Join Now".
>>>>>>>>>>>> 
>>>>>>>>>>>> To view in other time zones or languages, please click the
>link:
>>>>>>>>>>>>
>https://nsn.webex.com/nsn/j.php?ED=269567657&UID=0&PW=NNTI1ZWQzMDJk&ORT=MiM0
>>>>>>>>>>>> 
>>>>>>>>>>>> To add this meeting to your calendar program (for example
>Microsoft Outlook), click this link:
>>>>>>>>>>>>
>https://nsn.webex.com/nsn/j.php?ED=269567657&UID=0&ICS=MI&LD=1&RD=2&ST=1&SHA2=C6-AjLGvhdYjmpVdx75M6UsAwrNLMsequ5n95Gyv1R8=&RT=MiM0
>>>>>>>>>>>> 
>>>>>>>>>>>> -------------------------------------------------------
>>>>>>>>>>>> To join the teleconference only
>>>>>>>>>>>> -------------------------------------------------------
>>>>>>>>>>>> Global dial-in Numbers:
>http://www.nokiasiemensnetworks.com/nvc
>>>>>>>>>>>> Conference Code: 944 910 5485
>>>>>>>>>>>> 
>>>>>>>>>>>> 
>>>>>>>>>>>> _______________________________________________
>>>>>>>>>>>> OAuth mailing list
>>>>>>>>>>>> OAuth@ietf.org
>>>>>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>>>>>> _______________________________________________
>>>>>>>>>>> OAuth mailing list
>>>>>>>>>>> OAuth@ietf.org
>>>>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>>>>> _______________________________________________
>>>>>>>>>> OAuth mailing list
>>>>>>>>>> OAuth@ietf.org
>>>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>>> _______________________________________________
>>>>>>>> OAuth mailing list
>>>>>>>> OAuth@ietf.org
>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>>> 
>>>>>>>> 
>>>>>>> 
>>>>>>> -- 
>>>>>>> <XeC>
>>>>> 
>>>>> -- 
>>>>> <XeC.png>
>>>> 
>>> 
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>> 
>
>
>
>------------------------------------------------------------------------
>
>_______________________________________________
>OAuth mailing list
>OAuth@ietf.org
>https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to