I am confused. Why would you call the introspection endpoint if you were not 
expecting new information to be disclosed?

Phil

> On Dec 2, 2014, at 14:26, Richer, Justin P. <jric...@mitre.org> wrote:
> 
> I agree that there's some use in this (and in fact I've deployed a version 
> that uses a signed JWT to indicate its authorization server), but it should 
> remain outside the scope of this spec. It's a service discovery problem, it's 
> orthogonal. 
> 
>  -- Justin
> 
> 
>> On Dec 2, 2014, at 5:13 PM, John Bradley <ve7...@ve7jtb.com> wrote:
>> 
>> Yes,  but unless there is something new the introspection endpoint in UMA is 
>> tied to the resource.   
>> 
>> In some cases having the token indicate the introspection endpoint may be 
>> useful. 
>> 
>> John B. 
>> 
>> Sent from my iPhone
>> 
>> On Dec 2, 2014, at 10:02 PM, Eve Maler <e...@xmlgrrl.com> wrote:
>> 
>>> FWIW, UMA goes ahead and standardizes a good deal about the trust 
>>> establishment between the RS and the AS, and (of course) profiles and wraps 
>>> the token introspection spec as part of the resulting “authorization API” 
>>> that the AS presents to the RS. A big part of the motivation for this is to 
>>> support an n:n relationship between AS and RS entities.
>>> 
>>> EVe
>>> 
>>>> On 2 Dec 2014, at 12:14 PM, John Bradley <ve7...@ve7jtb.com> wrote:
>>>> 
>>>> Many of the proprietary introspection protocols in use return scope, role 
>>>> or other meta data for the RS to make its access policy decision on.
>>>> One of the reasons for using opaque tokens rather than JWT is to prevent 
>>>> leakage of that info.
>>>> 
>>>> Making authentication to the introspection endpoint a MUST if additional 
>>>> attributes are present is OK,  I might even be inclined to say that 
>>>> authentication of some sort is always required, but that might be going a 
>>>> bit far for some use cases.
>>>> 
>>>> We have a lot of proprietary ways to do this from IBM, Layer 7, Ping etc.  
>>>> It would be nice if we could standardize it.   Precluding other attributes 
>>>> would not be helpful for adoption.
>>>> 
>>>> 
>>>> One issue that we haven’t addressed in this spec is what happens if there 
>>>> are multiple AS for the RS and how it would decide what introspection 
>>>> endpoint to use.
>>>> Perhaps that needs to be a extension, leaving this for the simple case.
>>>> 
>>>> However having more than on e AS per RS is not as unusual as it once was 
>>>> in larger environments.
>>>> 
>>>> John B.
>>>> 
>>>> 
>>>>> On Dec 2, 2014, at 4:56 PM, Richer, Justin P. <jric...@mitre.org> wrote:
>>>>> 
>>>>> Agreed, which is why we've got space for the "sub" and "user_id" fields 
>>>>> but not anything else about the user, and we've got a privacy 
>>>>> considerations section for dealing with that. If you can help make the 
>>>>> wording on that section stronger, I'd appreciate it.
>>>>> 
>>>>>  -- Justin
>>>>> 
>>>>>> On Dec 2, 2014, at 2:25 PM, Bill Mills <wmills_92...@yahoo.com> wrote:
>>>>>> 
>>>>>> If introspection returns any other user data beyond what is strictly 
>>>>>> required to validate the token based solely on possession of the public 
>>>>>> part it would be a mistake.
>>>>>> 
>>>>>> 
>>>>>> On Tuesday, December 2, 2014 11:13 AM, "Richer, Justin P." 
>>>>>> <jric...@mitre.org> wrote:
>>>>>> 
>>>>>> 
>>>>>> That's all fine -- it's all going over TLS anyway (RS->AS) just like the 
>>>>>> original token fetch by the client (C->AS). Doesn't mean you need TLS 
>>>>>> *into* the RS (C->RS) with a good PoP token. 
>>>>>> 
>>>>>> Can you explain how this is related to "act on behalf of"? I don't see 
>>>>>> any connection.
>>>>>> 
>>>>>>  -- Justin
>>>>>> 
>>>>>>> On Dec 2, 2014, at 2:09 PM, Bill Mills <wmills_92...@yahoo.com> wrote:
>>>>>>> 
>>>>>>> Fetching the public key for a token might be fine, but what if the 
>>>>>>> introspection endpoint returns the symmetric key?  Data about the user? 
>>>>>>>  Where does this blur the line between this and "act on behalf of"?
>>>>>>> 
>>>>>>> 
>>>>>>> On Tuesday, December 2, 2014 11:05 AM, "Richer, Justin P." 
>>>>>>> <jric...@mitre.org> wrote:
>>>>>>> 
>>>>>>> 
>>>>>>> The call to introspection has a TLS requirement, but the call to the RS 
>>>>>>> wouldn't necessarily have that requirement. The signature and the token 
>>>>>>> identifier are two different things. The identifier doesn't do an 
>>>>>>> attacker any good on its own without the verifiable signature that's 
>>>>>>> associated with it and the request. What I'm saying is that you 
>>>>>>> introspect the identifier and get back something that lets you, the RS, 
>>>>>>> check the signature.
>>>>>>> 
>>>>>>>  -- Justin
>>>>>>> 
>>>>>>>> On Dec 2, 2014, at 1:40 PM, Bill Mills <wmills_92...@yahoo.com> wrote:
>>>>>>>> 
>>>>>>>> "However, I think it's very clear how PoP tokens would work. ..."
>>>>>>>> 
>>>>>>>> I don't know if that's true.  POP tokens (as yet to be fully defined) 
>>>>>>>> would then also have a TLS or transport security requirement unless 
>>>>>>>> there is token introspection client auth in play I think.  Otherwise I 
>>>>>>>> can as an attacker take that toklen and get info about it that might 
>>>>>>>> be useful, and I don't think that's what we want.
>>>>>>>> 
>>>>>>>> -bill
>>>>> 
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>> 
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>> 
>>> 
>>> Eve Maler                                  http://www.xmlgrrl.com/blog
>>> +1 425 345 6756                         http://www.twitter.com/xmlgrrl
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to