In my opionion, your proposal offers an interesting (and simplified) approach to user authentication and attribute providing.

I have some questions/comments regarding its usage of OAuth 2.0:

1) In your proposal there are two services providing user data, the OAuth authorization server and the user data service. Why this redundancy? Wouldn't the user data service suffice?

2) The usage of the standard parameter "scope" to indicate the "openid mode" of the OAuth AS surprises me. In my understanding, a client uses this parameter to request permissions to be bound to tokens. So it controls what a client is entitled to do when accessing a protected resource using such a token. In the context of OpenId connect, the "scope" parameter additionally controls whether the AS responds with additional response parameters (user_id, signature, issued_at) to the client. It appears to me you packed two features into one parameter. Why not split it? What about using another parameter, say "openid_mode", to activate the extended behavior of the OAuth authorization server? Then, the scope parameter could exclusively be used to determine the permissions of the client on the user data service. For example, the set of attributes accessible to the client could be requested that way. 3) Why is a signature needed to protect the access token response from the server? The proposal says:

"The client SHOULD then verify the signature. Doing so confirms the binding between the given access token and user identifier in addition to the response coming from the expected server."

Since HTTPS is a MUST on the token endpoint, the authorization server is authenticated during HTTPS handshake. So what is the extra security gain here? Or is it just needed in user agent flow? The respective FAQ also did not explain the reason to me.

regards,
Torsten.

David Recordon schrieb:
The past few months I've had a bunch of one on one conversations with a lot of different people – including many of folks on this list – about ways to build a future version of OpenID on top of OAuth 2.0. Back in March when I wrote a draft of OAuth 2.0 I mentioned it as one of my future goals as well (http://daveman692.livejournal.com/349384.html).

Basically moving us to where there's a true technology stack of TCP/IP -> HTTP -> SSL -> OAuth 2.0 -> OpenID -> (all sorts of awesome APIs). Not just modernizing the technology, but also focusing on solving a few of the key "product" issues we hear time and time again.

I took the past few days to write down a lot of these ideas and glue them together. Talked with Chris Messina who thought it was an interesting idea and decided to dub it "OpenID Connect" (see http://factoryjoe.com/blog/2010/01/04/openid-connect/). And thanks to Eran Hammer-Lahav and Joseph Smarr for some help writing bits of it!

So, a modest proposal that I hope gets the conversation going again. http://openidconnect.com/

--David
------------------------------------------------------------------------

_______________________________________________
specs mailing list
[email protected]
http://lists.openid.net/mailman/listinfo/openid-specs

_______________________________________________
specs mailing list
[email protected]
http://lists.openid.net/mailman/listinfo/openid-specs

Reply via email to