It sounds like we want to return a list of available access tokens “aud” values 
from AS config discovery endpoint (and also via oauth-meta too?), doesn’t it?

and RS config discovery endpoint will return acceptable access token “iss” 
values, a list of every RS endpoints, required scopes per endpoint etc.
(it would be another thread though)

Thanks,
Nov

> On Feb 26, 2016, at 13:08, Nat Sakimura <sakim...@gmail.com> wrote:
> 
> I will include the origin in the next rev. 
> 
> For http header v.s JSON, shall I bring the JSON back in? 
> 2016年2月26日(金) 13:05 Manger, James <james.h.man...@team.telstra.com 
> <mailto:james.h.man...@team.telstra.com>>:
> You are right, George, that making the AS track /v2/… or /v3/… in RS paths is 
> likely to be brittle — but tracking RS web origins is not too onerous.
> 
>  
> 
> PoP has some nice security advantages over bearer tokens or passwords. 
> However, it should still be possible to use the latter fairly safely — but it 
> does require the issuer of credentials to indicate where they can be used.
> 
>  
> 
> --
> 
> James Manger
> 
>  
> 
>  
> 
>  
> 
> From: OAuth [mailto:oauth-boun...@ietf.org <mailto:oauth-boun...@ietf.org>] 
> On Behalf Of George Fletcher
> Sent: Friday, 26 February 2016 2:28 AM
> To: Vladimir Dzhuvinov <vladi...@connect2id.com 
> <mailto:vladi...@connect2id.com>>; oauth@ietf.org <mailto:oauth@ietf.org>
> 
> Subject: Re: [OAUTH-WG] OAuth 2.0 Discovery Location
> 
>  
> 
> That said, I'm not against the AS informing the client that the token can be 
> used at the MailResource, ContactResource and MessagingResource to help the 
> client know not to send the token to a BlogResource. However, identifying the 
> actual endpoint seems overly complex when what is really trying to be 
> protected is a token from being used where it shouldn't be (which is solved 
> by Pop)
> 
> Thanks,
> George
> 
> On 2/25/16 10:25 AM, George Fletcher wrote:
> 
> Interesting... this is not at all my current experience:) If a RS goes from 
> v2 of it's API to v3 and that RS uses the current standard of putting a "v2" 
> or"v3" in it's API path... then a token issued for v2 of the API can not be 
> sent to v3 of the API, because v3 wasn't wasn't registered/deployed when the 
> token was issued. 
> 
> The constant management of scopes to URI endpoints seems like a complexity 
> that will quickly get out of hand.
> 
> Thanks,
> George
> 
> On 2/25/16 2:22 AM, Vladimir Dzhuvinov wrote:
> 
>  
> 
> On 25/02/16 09:02, Manger, James wrote:
> 
> I'm concerned that forcing the AS to know about all RS's endpoints that will 
> accept it's tokens creates a very brittle deployment architecture
> The AS is issuing temporary credentials (access_tokens) to clients but 
> doesn’t know where those credentials will work? That’s broken.
>  
> An AS should absolutely indicate where an access_token can be used. 
> draft-sakimura-oauth-meta suggests indicating this with 1 or more “ruri” 
> (resource URI) values in an HTTP Link header. A better approach would be 
> including a list of web origins in the token response beside the access_token 
> field.
> +1 
> 
> This will appear more consistent with the current experience, and OAuth does 
> allow the token response JSON object to be extended with additional members 
> (as it's done in OpenID Connect already).
> 
> Cheers,
> Vladimir
> 
> 
> 
> --
> James Manger
>  
> From: OAuth [mailto:oauth-boun...@ietf.org <mailto:oauth-boun...@ietf.org>] 
> On Behalf Of George Fletcher
> Sent: Thursday, 25 February 2016 6:17 AM
> To: Phil Hunt <phil.h...@oracle.com> <mailto:phil.h...@oracle.com>; Nat 
> Sakimura <sakim...@gmail.com> <mailto:sakim...@gmail.com>
> Cc: <oauth@ietf.org> <mailto:oauth@ietf.org> <oauth@ietf.org> 
> <mailto:oauth@ietf.org>
> Subject: Re: [OAUTH-WG] OAuth 2.0 Discovery Location
>  
> I'm concerned that forcing the AS to know about all RS's endpoints that will 
> accept it's tokens creates a very brittle deployment architecture. What if a 
> RS moves to a new endpoint? All clients would be required to get new tokens 
> (if I understand correctly). And the RS move would have to coordinate with 
> the AS to make sure all the timing is perfect in the switch over of endpoints.
>  
> I suspect a common deployment architecture today is that each RS requires one 
> or more scopes to access it's resources. The client then asks the user to 
> authorize a token with a requested list of scopes. The client can then send 
> the token to the appropriate RS endpoint. The RS will not authorize access 
> unless the token has the required scopes.
>  
> If the concern is that the client may accidentally send the token to a "bad" 
> RS which will then replay the token, then I'd rather use a PoP mechanism 
> because the point is that you want to ensure the correct client is presenting 
> the token. Trying to ensure the client doesn't send the token to the wrong 
> endpoint seems fraught with problems.
>  
> Thanks,
> George
> 
> 
> 
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org <mailto:OAuth@ietf.org>
> https://www.ietf.org/mailman/listinfo/oauth 
> <https://www.ietf.org/mailman/listinfo/oauth>
> 
> 
> 
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org <mailto:OAuth@ietf.org>
> https://www.ietf.org/mailman/listinfo/oauth 
> <https://www.ietf.org/mailman/listinfo/oauth>
> 
> 
> 
> 
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org <mailto:OAuth@ietf.org>
> https://www.ietf.org/mailman/listinfo/oauth 
> <https://www.ietf.org/mailman/listinfo/oauth>
>  
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org <mailto:OAuth@ietf.org>
> https://www.ietf.org/mailman/listinfo/oauth 
> <https://www.ietf.org/mailman/listinfo/oauth>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to