On Tue, Dec 17, 2019 at 09:12:26PM +0000, Richard Backman, Annabelle wrote:
> > That's a pretty strong statement :)
> 
> One I should’ve clarified. 😃 I don’t mean that the one-RS-per-AT model is not 
> used at all, just that it is not universal and comes with real, practical 
> tradeoffs that may not be appropriate for all use cases. Consequently, we 
> should not design fundamental specs that mandate its adoption.
> 
> 
> > …knowledge of that level isn't necessary.
> 
> Either the RS and AS have a shared understanding of that level, or the RS is 
> trusting the AS to decide what “AuthenticatedClient” means, and set it 
> accordingly. The latter requires that the RS only supports ASes that have a 
> shared (or substantially similar) understanding of what that level is, which 
> is unlikely outside of a closed system. In that case, there isn’t a lot of 
> value in providing a standard claim, as the closed system could just as 
> easily define a proprietary one.

Talk of the different potential levels of authentication calls to mind RFC
8485's "Vectors of Trust" idiom, though, IIUC, it would require some
adaptation to be useful here.

-Ben

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to