Call me asap to discuss what this means. 512-770-3800
Jerry Louis Leyendecker, Living Soul

On Tue, Jan 26, 2021, 2:02 PM <oauth-requ...@ietf.org> wrote:

> Send OAuth mailing list submissions to
>         oauth@ietf.org
>
> To subscribe or unsubscribe via the World Wide Web, visit
>         https://www.ietf.org/mailman/listinfo/oauth
> or, via email, send a message with subject or body 'help' to
>         oauth-requ...@ietf.org
>
> You can reach the person managing the list at
>         oauth-ow...@ietf.org
>
> When replying, please edit your Subject line so it is more specific
> than "Re: Contents of OAuth digest..."
>
>
> Today's Topics:
>
>    1. Re: November Interim meeting on WebID/IsLoggedIn followup
>       (Sam Goto)
>    2. Last Call: <draft-ietf-oauth-access-token-jwt-11.txt> (JSON
>       Web Token (JWT) Profile for OAuth 2.0 Access Tokens) to Proposed
>       Standard (The IESG)
>
>
> ----------------------------------------------------------------------
>
> Message: 1
> Date: Mon, 25 Jan 2021 15:09:33 -0800
> From: Sam Goto <g...@google.com>
> To: Vittorio Bertocci <vittorio.bertocci=40auth0....@dmarc.ietf.org>
> Cc: "oauth@ietf.org" <oauth@ietf.org>
> Subject: Re: [OAUTH-WG] November Interim meeting on WebID/IsLoggedIn
>         followup
> Message-ID:
>         <CAMtUnc6hOz74NQwAuPbMYBaq-gSr48h0iGPs8oAVcDggQ9E=
> u...@mail.gmail.com>
> Content-Type: text/plain; charset="utf-8"
>
> On Fri, Jan 22, 2021 at 11:30 AM Vittorio Bertocci <vittorio.bertocci=
> 40auth0....@dmarc.ietf.org> wrote:
>
> > Dear all,
> >
> > This is a followup on the actions we agreed upon during the November
> > interim meeting in November (notes in
> >
> https://datatracker.ietf.org/meeting/interim-2020-oauth-12/materials/minutes-interim-2020-oauth-12-202011021200-00
> ).
> > Apologies for the delay.
> >
> > The TL;DR is that we decided it might be useful to put together a
> document
> > that describes the identity scenarios relying on current browser features
> > and that we?d like to preserve.
> >
> > Such document should help grounding discussions with browser vendors by
> > making it easy to pinpoint how specific changes might impair
> functionality
> > in important scenarios, and what functionality we are trying to preserve
> > (in case the new browser feature can offer alternate path to the same
> > outcomes).
> >
> >
> >
> > Tackling on all the possible scenarios is too big a task for George and
> > myself alone, hence we devised a proposed mechanism to generate and
> > maintain that list collaboratively.
> >
> > You can find a framing proposal in
> >
> https://datatracker.ietf.org/doc/html/draft-bertocci-identity-in-browser-00
> ,
> > and the github repo workspace https://github.com/IDBrowserUseCases/docs.
> > Thanks to Daniel and Torsten for their help on figuring out how to use
> > mmark to write internet drafts.
> >
> >
> >
> > We do have a list of candidate scenarios, but before going too deep in it
> > we wanted to give the group the chance to take a look at the model and
> get
> > your feedback before we charge down that path. This is a pretty unusual
> > collaboration model and getting it to work might be tricky.
> >
> > Please let us know what you think!
> >
>
> Thanks Vittorio for kicking this off and I just wanted to stop by and say
> that this seems like a wonderful starting point. I read your introduction
> (which I think has done a great job in capturing the intent), your
> template, and your initial test use case and I think this is a great
> starting point.
>
> More specifically:
>
> - I really like how you are positioning this effort.
> - I really like the section on scoping
> <
> https://datatracker.ietf.org/doc/html/draft-bertocci-identity-in-browser-00#section-1.1
> >,
> primarily on what not to cover: any scenario not currently in mainstream. I
> know this is an over categorization, and I don't believe this was your
> intent, but just for clarification, we would welcome scenarios under
> "consumers" , "EDU" in addition to "enterprises" (I get the irony of the
> section above "classifying most other cases as enterprise use cases hence
> solvable by exceptions and local business policies" -- point taken).
> - The template
> <
> https://datatracker.ietf.org/doc/html/draft-bertocci-identity-in-browser-00#section-4
> >
> LGTM. There is a chance it will evolve as we write more and we read more,
> but this is a good starting point. Here are a few ways that I think this
> could evolve:
>   - perhaps a section with "Possible
> technologies/announcements/APIs/features that may pose a risk to this
> scenario" would be constructive to indicate "X (use case) breaks with Y
> (browser API)".
>   - I have a sense that we would want to extend/break down "Privacy
> Considerations". One way to make this more concrete, is possibly to
> cross-reference one of the privacy threat models (e.g. ours is here:
> Privacy
> Threat Model
> <https://github.com/WICG/WebID/blob/master/privacy_threat_model.md>) so
> that we can collect something like "X (use case) conflicts with Y (privacy
> threat)". Cross-referencing the threat model will also be useful in giving
> you a sense of the threats we are set to address too.
>
> I'll be watching the repository and looking forward to hearing from you,
>
> Thanks again,
>
> Sam
>
>
> >
> > Cheers
> >
> > G&V
> >
> >
> >
> >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
> >
> -------------- next part --------------
> An HTML attachment was scrubbed...
> URL: <
> https://mailarchive.ietf.org/arch/browse/oauth/attachments/20210125/f7ca7c74/attachment.htm
> >
>
> ------------------------------
>
> Message: 2
> Date: Tue, 26 Jan 2021 07:20:20 -0800
> From: The IESG <iesg-secret...@ietf.org>
> To: "IETF-Announce" <ietf-annou...@ietf.org>
> Cc: Hannes Tschofenig <hannes.tschofe...@arm.com>,
>         draft-ietf-oauth-access-token-...@ietf.org,
> hannes.tschofe...@arm.com,
>         oauth-cha...@ietf.org, oauth@ietf.org, r...@cert.org
> Subject: [OAUTH-WG] Last Call:
>         <draft-ietf-oauth-access-token-jwt-11.txt> (JSON Web Token (JWT)
>         Profile for OAuth 2.0 Access Tokens) to Proposed Standard
> Message-ID: <161167442045.17170.14968771117405387...@ietfa.amsl.com>
> Content-Type: text/plain; charset="utf-8"
>
>
> The IESG has received a request from the Web Authorization Protocol WG
> (oauth) to consider the following document: - 'JSON Web Token (JWT) Profile
> for OAuth 2.0 Access Tokens'
>   <draft-ietf-oauth-access-token-jwt-11.txt> as Proposed Standard
>
> The IESG plans to make a decision in the next few weeks, and solicits final
> comments on this action. Please send substantive comments to the
> last-c...@ietf.org mailing lists by 2021-02-09. Exceptionally, comments
> may
> be sent to i...@ietf.org instead. In either case, please retain the
> beginning
> of the Subject line to allow automated sorting.
>
> Abstract
>
>
>    This specification defines a profile for issuing OAuth 2.0 access
>    tokens in JSON web token (JWT) format.  Authorization servers and
>    resource servers from different vendors can leverage this profile to
>    issue and consume access tokens in interoperable manner.
>
>
>
>
> The file can be obtained via
> https://datatracker.ietf.org/doc/draft-ietf-oauth-access-token-jwt/
>
>
>
> No IPR declarations have been submitted directly on this I-D.
>
>
>
>
>
>
>
> ------------------------------
>
> Subject: Digest Footer
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>
> ------------------------------
>
> End of OAuth Digest, Vol 147, Issue 13
> **************************************
>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to