Hi Tony, not sure I understand your point.

Are you saying that we (the proposers of the new WG) *technically* needn't account for feedback such as Torsten's in this review cycle?

Paul

On 7/2/13 1:03 PM, Anthony Nadalin wrote:

Since this is slated to be an OpenID WG, it's what the WG wants to do.

*From:*[email protected] [mailto:[email protected]] *On Behalf Of *Torsten Lodderstedt
*Sent:* Tuesday, July 2, 2013 9:53 AM
*To:* Paul Madsen
*Cc:* John Bradley; [email protected]; [email protected]
*Subject:* Re: Native application SSO Working Group

Hi Paul,

got it :-) Would it make sense to add this assumption to the charter?

Does this mean:
- a single AZA manages access to multiple authz servers?
- an app needs to be able to register its authz server/idp at the AZA?

Thanks,
Torsten.



Paul Madsen <[email protected] <mailto:[email protected]>> schrieb:

    Hi Torsten, wrt the possibility of an id_token being used against
    a 'home' IdP, the current model is that it would be the AZA that
    would perform this exchange, not the native app itself - this
    because the overarching assumption being that the AZA should do as
    much of the heavy lifting as possible - and thereby simplify life
    for the native apps.

    But that is separate I think from the use case of an native app
    wanting to consume an id_token directly (for access control,
    customization etc) and so i will look at charter to make sure this
    scenario is supported.

    paul

    On 7/2/13 11:31 AM, Torsten Lodderstedt wrote:

        Hi,

        I agree with Nat on this use case. Another one is that the app
        wants to use the id_token as credential on its "home" IDP
        (probably via JWT bearer token profile). This is more or less
        3rd party login for apps.

        regards,
        Torsten.



        Nat Sakimura <[email protected]> <mailto:[email protected]>
        schrieb:

            Yes. If the app wants the identity information to evaluate
            its own access control, then it would probably want to
            know about the user identity (i.e., set of attributes
            related to the entity), and id_token is the right thing.

            When I was talking to some law enforcement people in EU,
            they were talking similar things. Right now, we do not
            have any location data defined in the claims, but we may
            also want to do so in such cases.

            Nat

            2013/7/3 Paul Madsen <[email protected]
            <mailto:[email protected]>>

                Hi Nat, the current AZA model does not preclude an
                access token being formatted as an id_token.

                I believe Torsten was conjecturing that there was
                potential value in an id_token being delivered to a
                native app in addition to an access token (whether
                formatted as id_token or not)

                Regards

                paul

                On 7/2/13 10:53 AM, Nat Sakimura wrote:

                    I actually do see some utility in the access token
                    in the format of ID Token.

                    It can give appropriate audience restriction etc.

                    2013/7/2 Paul Madsen <[email protected]
                    <mailto:[email protected]>>

                        Hi Torsten, the current model is that the
                        Authorization Agent (AZA) may itself obtain an
                        id_token and use it to obtain an access token,
                        but that only access tokens would be 'handed
                        over' by the AZA to its constituent native apps.

                        Are you proposing that there may be value in
                        allowing the AZA to also hand over id_tokens
                        (suitably targeted) as well?

                        paul

                        On 7/1/13 1:38 PM, Torsten Lodderstedt wrote:

                            Hi John,

                            I interpreted the text of the charter the
                            other way around, so a client would be
                            able to use an(y) id_token (as a
                            credential) to obtain an access token. I'm
                            fine if the mechanism is intended to
                            support id_token issuance.

                            regards,
                            Torsten.

                             Am 01.07.2013 15:06, schrieb John Bradley:

                                Hi Torsten,

                                In point 3 the charter talks about
                                using id_tokens to get access tokens.

                                So it is imagined that the mechanism
                                would issue id_tokens likely along the
                                lines that Google is doing for the
                                play store by having a 3rd party as an
                                audience and using "azp" to indicate
the client the token was issued to. We don't want to be too specific on
                                the solution in the charter.

                                If you think something needs to be
                                added let me know.

                                John B.

                                On 2013-07-01, at 2:17 AM, Torsten
                                Lodderstedt <[email protected]
                                <mailto:[email protected]>> wrote:



                                    Hi,

                                    it would be great to have such a
                                    mechanism across platforms!

                                    I'm wondering whether the
                                    mechanism should issue id tokens
                                    as well. Right now it seems to
                                    focus on access tokens.

                                    Regards,
                                    Torsten.



                                    John Bradley <[email protected]
                                    <mailto:[email protected]>> schrieb:

                                        The enclosed Work Group Charter is 
being sent to the Specs Council for review in anticipation of chartering the 
Group.

                                        It is best have this activity under the 
foundation IPR as soon as possible.

                                        Regards

                                        John B.

                                        
------------------------------------------------------------------------

                                        specs mailing list

                                        [email protected]  
<mailto:[email protected]>

                                        
http://lists.openid.net/mailman/listinfo/openid-specs




                            _______________________________________________

                            specs mailing list

                            [email protected]  
<mailto:[email protected]>

                            
http://lists.openid.net/mailman/listinfo/openid-specs


                        _______________________________________________
                        specs mailing list
                        [email protected]
                        <mailto:[email protected]>
                        http://lists.openid.net/mailman/listinfo/openid-specs



-- Nat Sakimura (=nat)

                    Chairman, OpenID Foundation
                    http://nat.sakimura.org/
                    @_nat_en



-- Nat Sakimura (=nat)

            Chairman, OpenID Foundation
            http://nat.sakimura.org/
            @_nat_en



_______________________________________________
specs mailing list
[email protected]
http://lists.openid.net/mailman/listinfo/openid-specs

_______________________________________________
specs mailing list
[email protected]
http://lists.openid.net/mailman/listinfo/openid-specs

Reply via email to