+1 to the device flow if you can't pop open a system browser.

If you can pop open a system browser, then a more standard flow is a better
CX.


On Mon, Jun 12, 2017 at 11:34 AM, Phil Hunt <phil.h...@oracle.com> wrote:

> +1
>
> The point of OAuth is to break away from using UID/Password (basic auth).
>
>
> The device flow is the best way to allow stronger authentication of the
> authorizing user while still allowing a limited input device (e.g. command
> line) to work.
>
> Phil
>
> Oracle Corporation, Identity Cloud Services Architect & Standards
> @independentid
> www.independentid.com
> phil.h...@oracle.com
>
> On Jun 12, 2017, at 11:22 AM, Justin Richer <jric...@mit.edu> wrote:
>
> I second the recommendation to use the device flow for this kind of
> system. The commandline client would print out a text string for the user
> to enter into their browser elsewhere.
>
> If you can pop up a system browser then it's even easier and you can just
> use the auth code flow, but it's a lot to assume that a commandline app can
> have that kind of capability available to it. Printing out a string? That's
> easy and universal. That's why I say go with the device flow.
>
> The thing is, at the end of the day, you need the user to authenticate to
> the AS if you're going to get delegated access from them. That's really the
> whole point of the OAuth protocol, after all. So you can either do that in
> a local browser of some kind (like popping a system browser), on another
> device (with the device flow), or you can be evil and use the
> username/password grant and just steal the user's credentials yourself. If
> it's not clear, I don't recommend that, basically ever.
>
>  -- Justin
>
> On 6/11/2017 11:58 PM, Aaron Parecki wrote:
>
> I've seen this done a few ways:
>
> * The Device Flow: https://tools.ietf.org/html/draft-ietf-oauth-device-
> flow
> <https://urldefense.proofpoint.com/v2/url?u=https-3A__tools.ietf.org_html_draft-2Dietf-2Doauth-2Ddevice-2Dflow&d=DwMDaQ&c=RoP1YumCXCgaWHvlZYR8PQcxBKCX5YTpkKY057SbK10&r=JBm5biRrKugCH0FkITSeGJxPEivzjWwlNKe4C_lLIGk&m=j2jP9OSVjttUWWQMazHXMhLBvLqfXsFJB6GEOh_Mv9k&s=gWeHcqrhQt-ijJ5-UXHxML5rMtR05GjKVyxqZBEeQAM&e=>
> which is what you see on browserless devices like the Apple TV logging in
> to a cable provider from your phone. A short code is generated and
> displayed on the screen, you launch a browser on your phone and enter the
> code. This would work just as well from the command line on the same
> device.
> * I've also seen apps use the authorization flow, by displaying the
> authorization URL on the command line prompt and instructing the user to
> open it in a browser. The redirect URI is a hosted web page that displays
> the authorization code and instructs the user to paste it back at the
> terminal.
> * The command line app can launch an HTTP server on localhost and use that
> as the redirect URL for the authorization code flow. This option ends up
> being the most seamless since it works like a traditional flow without any
> special instructions to the user.
>
> ----
> Aaron Parecki
> aaronparecki.com
> <https://urldefense.proofpoint.com/v2/url?u=http-3A__aaronparecki.com&d=DwMDaQ&c=RoP1YumCXCgaWHvlZYR8PQcxBKCX5YTpkKY057SbK10&r=JBm5biRrKugCH0FkITSeGJxPEivzjWwlNKe4C_lLIGk&m=j2jP9OSVjttUWWQMazHXMhLBvLqfXsFJB6GEOh_Mv9k&s=Zn85klv9a00I3Uo74zgqAelgrFUFQc72PdFwg4gkECQ&e=>
> @aaronpk
> <https://urldefense.proofpoint.com/v2/url?u=http-3A__twitter.com_aaronpk&d=DwMDaQ&c=RoP1YumCXCgaWHvlZYR8PQcxBKCX5YTpkKY057SbK10&r=JBm5biRrKugCH0FkITSeGJxPEivzjWwlNKe4C_lLIGk&m=j2jP9OSVjttUWWQMazHXMhLBvLqfXsFJB6GEOh_Mv9k&s=g5RjhR9W1VYt00S4dV0t9ijZ4gC4HE93waQ_t7mUzUs&e=>
>
>
> On Sun, Jun 11, 2017 at 8:52 PM, Bill Burke <bbu...@redhat.com> wrote:
>
>> Has anybody done any spec work around doing oauth from command line
>> interfaces?  We're looking for something where the auth server can generate
>> text-based challenges that are rendered in the console window that query
>> for simple text input over possibly multiple requests.  I'm not talking
>> about Resource Owner or Client Credentials grant.  The command line client
>> may not know the credential types required for a successful token request.
>> It would be easy to write a simple protocol, but I'd rather just do
>> something around any existing internet draft or rfc that somebody has put
>> some thought into.  Hope I'm making sense here.
>>
>> Thanks,
>>
>> Bill Burke
>>
>> Red Hat
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>> <https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ietf.org_mailman_listinfo_oauth&d=DwMDaQ&c=RoP1YumCXCgaWHvlZYR8PQcxBKCX5YTpkKY057SbK10&r=JBm5biRrKugCH0FkITSeGJxPEivzjWwlNKe4C_lLIGk&m=j2jP9OSVjttUWWQMazHXMhLBvLqfXsFJB6GEOh_Mv9k&s=eodAcEm9pUWInxQkdRWT7sN0sZWWlo8oCtmgdjHY6oI&e=>
>>
>
>
>
> _______________________________________________
> OAuth mailing listOAuth@ietf.orghttps://www.ietf.org/mailman/listinfo/oauth 
> <https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ietf.org_mailman_listinfo_oauth&d=DwMDaQ&c=RoP1YumCXCgaWHvlZYR8PQcxBKCX5YTpkKY057SbK10&r=JBm5biRrKugCH0FkITSeGJxPEivzjWwlNKe4C_lLIGk&m=j2jP9OSVjttUWWQMazHXMhLBvLqfXsFJB6GEOh_Mv9k&s=eodAcEm9pUWInxQkdRWT7sN0sZWWlo8oCtmgdjHY6oI&e=>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://urldefense.proofpoint.com/v2/url?u=https-3A__www.
> ietf.org_mailman_listinfo_oauth&d=DwICAg&c=RoP1YumCXCgaWHvlZYR8PQcxBKCX5Y
> TpkKY057SbK10&r=JBm5biRrKugCH0FkITSeGJxPEivzjWwlNKe4C_lLIGk&m=
> j2jP9OSVjttUWWQMazHXMhLBvLqfXsFJB6GEOh_Mv9k&s=
> eodAcEm9pUWInxQkdRWT7sN0sZWWlo8oCtmgdjHY6oI&e=
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>


-- 
Subscribe to the HARDTWARE <http://hardtware.com/> mail list to learn about
projects I am working on!
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to