Brian,

Thank you for your reply and the explanation about the URI vs. an opaque value 
(still wondering though about the privacy leaks but perhaps less important in 
the world of OAuth).

I believe that the document would benefit if you could add some more 
examples/use cases in section 1. Up to the authors.

Regards

-éric

From: Brian Campbell <bcampb...@pingidentity.com>
Date: Tuesday, 3 September 2019 at 21:29
To: Eric Vyncke <evyn...@cisco.com>
Cc: The IESG <i...@ietf.org>, "draft-ietf-oauth-resource-indicat...@ietf.org" 
<draft-ietf-oauth-resource-indicat...@ietf.org>, oauth <oauth@ietf.org>, 
"oauth-cha...@ietf.org" <oauth-cha...@ietf.org>
Subject: Re: [OAUTH-WG] Éric Vyncke's No Objection on 
draft-ietf-oauth-resource-indicators-05: (with COMMENT)

Thank you, Éric, for the review and ballot position.


On Mon, Sep 2, 2019 at 3:40 AM Éric Vyncke via Datatracker 
<nore...@ietf.org<mailto:nore...@ietf.org>> wrote:
Éric Vyncke has entered the following ballot position for
draft-ietf-oauth-resource-indicators-05: No Objection
----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

Thank you for the hard work put into this easy to read document.

Thanks, I'm happy to hear that you found it readable.


== COMMENTS ==

-- Section 1 --
"has uncovered a need, in some circumstances" (and similar sentences in section
1), it is rather vague for a standard track document... Please add some facts
and data, this could be a companion document about requirements/use cases.

Sec 1 is intended to be a general (though not vague) introduction with some 
explanation about what an authorization server might be able to accomplish with 
an understanding of the location/identity of the protected resource for which 
the client is requesting an access token. Which effectively boils down to being 
able to produce the token appropriate for the indicated resource (including the 
type of token, if and how it's encrypted, what information is contained or 
referenced, to whom it is audience restricted). I've no doubt that the writing 
could stand to be improved (which is always the case with content I've written) 
but those are the use cases and I don't have more specific facts or data.



-- Section 2 --
It is rather a question of mine, why does the resource need to be a URI (which
usually bears some visible semantics) rather than an opaque string known only
by the resource owner/server ? This is similar to Mirja's comment about privacy.

The motivation behind the draft is largely to facilitate this explicit signal 
to the authorization server (AS) about the location or identity of the 
protected resource for which the client is requesting an access token. For the 
reasons previously mentioned. Something that's opaque to the AS would negate 
the ability of the AS to do most of that stuff (admittedly not all but most).



CONFIDENTIALITY NOTICE: This email may contain confidential and privileged 
material for the sole use of the intended recipient(s). Any review, use, 
distribution or disclosure by others is strictly prohibited.  If you have 
received this communication in error, please notify the sender immediately by 
e-mail and delete the message and any file attachments from your computer. 
Thank you.
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to