let's not this disagreement over the need & relevance of a4c be
conflated with the age-old blurriness between authz & authn - in no way
are the two related
paul
On 6/13/14, 7:50 PM, John Bradley wrote:
To be precise SAML, Connect, and a4c provide Assertion-based
authentication of a claimant, by a Verifier (IdP) to a relying party
(RP) when the RP and the Verifier are not collocated ( i.e., they are
connected across a shared network) SP-800-63 sec 9
Typically we call this authentication (authn) though that may just be
a bad habit picked form SAML and other protocols use of the term.
It is true that people make horrible mistakes by ignoring the OAuth
security considerations and inappropriately use OAuth directly for
inferring that the presenter of the code or access token is the
resource owner identified by the resource.
I had sort of hoped that broad support and adoption of OpenID Connect
would help guide people in the correct direction.
If there is a need for a simpler IdP profile that is not interoperable
across IdP (Not Dynamic) the question is if developers will be more
motivated to use a profile of a larger standard as a starting point,
or something presented as a limited authentication extension to OAuth 2.
Clearly nothing will stop some people from rolling there own
authentication. The question is what solution will get the best traction.
My fear is that if developers see this as two competing standards they
will use that as justification to do there own thing rather than
choose one.
At the end of the day what the profile looks like will likely be the
same based on the use case. The question is where will it be done
and what do the politics look like to developers.
That is the short term question.
John B.
On Jun 13, 2014, at 7:15 PM, Phil Hunt <phil.h...@oracle.com
<mailto:phil.h...@oracle.com>> wrote:
I think this is a false argument. What we desire to do or not do is
not always the WG's choice.
It's not me asking an authentication enhancement. The issue is
whether to address improper authentication in the wild. Several of us
all blogged about this a while a go and the problem with improper use
of 6749 for authentication continues to grow.
Would it be better if we thought about this as the authentication "bug"?
I'm not sure everyone is on the same page regarding the term
"authentication". In none of the scenarios discussed are we talking
about "performing" authentication. We are talking about passing the
authentication context from the AS in a non-opaque form to the client
where the client is the audience of that information.
The authentication term is especially confusing because what
developers *think* they are doing is authentication. It is not.
Phil
@independentid
www.independentid.com <http://www.independentid.com/>
phil.h...@oracle.com <mailto:phil.h...@oracle.com>
On Jun 13, 2014, at 2:34 PM, Anil Saldhana <anil.saldh...@redhat.com
<mailto:anil.saldh...@redhat.com>> wrote:
Brian - I agree. We should neither overload nor extend the WG
charter to include any aspect of SSO or authentication.
I am hoping Prateek/Phil's feedback on OIDC can be addressed by OIDC.
From John's email, it seemed like a path forward is a Deployment
Profile at OIDC. Hopefully everybody will be happy with that.
On 06/13/2014 04:23 PM, Brian Campbell wrote:
I agree that, at this point, debating the details of a4c is
premature. SSO/authentication are not part of the WG charter and,
as I've said before, I'd object to changing the charter to include
it. Other than a small but vocal minority, I think it's fair to say
that that's also been the prevailing sentiment of this group.
On Fri, Jun 13, 2014 at 1:43 PM, John Bradley <ve7...@ve7jtb.com
<mailto:ve7...@ve7jtb.com>> wrote:
Hi Anil,
There are a number of profile efforts being looked at in the
OIDF. The Mobile Network operators lead by the GSMA are
starting profile work on a standard profile that will be
supported by mobile operators globally, that includes looking
at how a Client/RP/SP can register there client once for use
across multiple IdP AS, as well as standardized LoA and
user-info schema extensions.
Torsten Lodderstedt is the chair of that effort and can chime in.
I suspect that a Basic IdP for SSO profile is significantly
less ambitious than that and could be done in the current
Connect WG.
If there is interest from the members to start it. The main
time blocking factor might be getting a new grant_type spec
approved in the the OAuth WG if we wanted to support that.
The IdP profile is simple they can publish a discovery document
saying they only support that that limited feature set, that
way they would also be compatible with existing connect clients.
{
"scopes_supported": ["openid"],
"response_types_supported":["code"],
"response_modes_supported":["query"],
"grant_types_supported":["authorization_code",
"code_id_token_only"],
"acr_values_supported":["2","3"]
}
They don't need to publish one if they don't intend to be
discoverable to clients but knowing what the path forward to
supporting generic client is helpful I think.
Everything exists now other than the new grant_type exists now.
The work would mostly be putting together the examples based on
supporting a minimal flow.
Now I should point out that there are people who believe that
the default flow should be implicit with the "id_token"
response_type and intend to support that.
Phil's draft concentrates on only one use case. Having a IdP
deployment profile for it is not a problem, but it will not be
for every IdP. That is one of the reasons why discovery and
registration are important features of Connect.
John B.
On Jun 13, 2014, at 1:26 PM, Anil Saldhana
<anil.saldh...@redhat.com <mailto:anil.saldh...@redhat.com>> wrote:
> On 06/12/2014 04:18 PM, John Bradley wrote:
>> All but a handful of OAuth WG participants participated in
developing OpenID Connect.
>>
>> Yes some companies chose not to participate for whatever
reasons and have not committed to the mutual non assert IPR
agreement, and that is unfortunate, but not a reason to start
again from scratch.
>>
>> Changing the OIDF IPR policy of totally open specifications
based on non asserts is also not a option.
>>
>> I have made comments on the current draft of a4c.
>>
>> I think a profile of Connect introducing a grant_type
returning only an id_token would be simpler than trying to do
this as a separate spec.
>> I do note that you can do effectively the same thing now by
using a code response_type and a scope of openID. This
doesn't result in any extra user consent other than consenting
to login to the RP the first time (though that consent can be
given in advance out of band in a enterprise scenario.
>>
>> When developing Connect we debated having a token endpoint
response with only a id_token but decided that it was not in
the spirit of being a OAuth 2 profile. So we decided to return
a access token even if the user info endpoint contains no
claims other then sub. People almost always want more claims as
they roll out a real deployment. It is easy to add them if you
have designed to be able to talk to a RS.
>> OAuth without a RS is a touch not OAuth.
>>
>> a4c also completely ignores modern development environments
like node.js where the client is in the user agent, that OAuth
2 and Connect support.
>>
>> By the time the OAuth WG is done with a4c it will likely be
a similar size as Connect if it addresses the same use cases.
>>
>> I still don't see the problem with having a deployment
profile of Connect that can meet 100% of the current stated use
case for a4c.
> John - I am not fully familiar with the processes of OIDC.
How much of an effort is it to get the deployment profile of
OIDC connect rolling?
>
>>
>> I expect that the people here involved in Connect will form
there own opinions on comments regarding the number of
participants and the quantity of the work and review.
>>
>> Regards
>> John B.
>>
>>
>>
>>
>> On Jun 12, 2014, at 4:38 PM, Hans Zandbelt
<hzandb...@pingidentity.com
<mailto:hzandb...@pingidentity.com>> wrote:
>>
>>> +1, after implementing OIDC I will support the claim that
any SSO protocol with a minimal set of required features
smaller than OIDC is insecure and any protocol with similar
features but with different parameter names is just creating
confusion and will increase chances of non-interoperable and
insecure implementations
>>>
>>> Hans.
>>>
>>> On 6/12/14, 9:50 PM, Bill Burke wrote:
>>>>
>>>> On 6/12/2014 12:49 PM, Prateek Mishra wrote:
>>>>> The OpenID Connect 2.0 COre specification alone is 86
pages. It has
>>>>> received review from maybe a dozen engineers within the
OpenID community.
>>>>>
>>>> The OpenID Connect spec is 86 pages because it pretty much
rehashes the
>>>> OAuth2 spec walking through each flow and how Open ID
Connect expands on
>>>> that flow. A4c looks like a subset of this work minus
some additional
>>>> claims and, IMO, is incomplete compared to OIDC.
>>>>
>>>> FWIW, add 5 Red Hat engineers to the "dozen" of reviewers. We
>>>> originally were creating our own oauth2 extension using
JWT, but found
>>>> that any feature we wanted to define already existed in
OpenID Connect.
>>>> These guys have done great work. Aren't many of you
here authors of
>>>> this spec and/or the same companies?!? I think your
energies are better
>>>> focused on lobbying OIDC to join the IETF and this WG.
>>>>
>>>>
>>>>
>
_______________________________________________
OAuth mailing list
OAuth@ietf.org <mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth