Re: [oauth] SSL Gateway Service provider

2010-08-06 Thread Lukas Rosenstock
Interesting idea, don't know if that exists. But my question would be in
which scenarios an encrypted tunnel should be easier to configure compared
to installing an SSL certificate on the webserver itself?!

2010/7/30 Jake 

> Hello,
>
> Does anyone know of a service provider that offers SSL termination
> services that tie back to the application via secure tunnel instead of
> another SSL connection?  The idea is off load all the SSL work to the
> service provider and just connect back to the application via an
> encrypted tunnel to avoid supporting the SSL connection cycle on our
> infrastructure.  Akamai kind of has something but they connect back to
> the origin servers via SSL which kind of kills the idea.
>
> I have no idea if this exists but am curious.
>
> Thanks.
>
> --
> You received this message because you are subscribed to the Google Groups
> "OAuth" group.
> To post to this group, send email to oa...@googlegroups.com.
> To unsubscribe from this group, send email to
> oauth+unsubscr...@googlegroups.com .
> For more options, visit this group at
> http://groups.google.com/group/oauth?hl=en.
>
>


-- 
http://lukasrosenstock.net/

-- 
You received this message because you are subscribed to the Google Groups 
"OAuth" group.
To post to this group, send email to oa...@googlegroups.com.
To unsubscribe from this group, send email to 
oauth+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/oauth?hl=en.



Re: [oauth] OAuth design for API without users permission

2010-08-06 Thread Lukas Rosenstock
Hi Eric!

If there's no user authentication, you can use two-legged OAuth. That means
there's only consumer credentials but no token credentials.

If the application is not hosted somewhere but deployed and installed at
their user's, there's as far as I know no way to securely integrate consumer
credentials. Unfortunately I think it's difficult to give you advice
regarding key management, e.g. replacing compromised keys, without knowing
the exact circumstances.

Regards,
 Lukas Rosenstock

2010/7/30 Eric J. Smith 

> I am developing an API that will be used by users of my customers.
> Here is what the flow will look like:
>
> - User of my cloud based service creates an API key.
> - User embeds the API key into their own custom applications.
> - User deploys the application to their own end users.
> - The application talks to our API.
>
> I am looking for advice on how to secure this API. I see a few issues:
>
> - API key has to be embedded into the users application and is
> therefore vulnerable to being stolen and abused.
> - Once an API key is compromised, it can easily be disabled, but how
> will my users update their applications to use a new API key short of
> having to rebuild the application and redeploy.
>
> Does anyone have any ideas on how to design this?
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"OAuth" group.
To post to this group, send email to oa...@googlegroups.com.
To unsubscribe from this group, send email to 
oauth+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/oauth?hl=en.



Re: [oauth] Confused about the request token

2010-08-03 Thread Lukas Rosenstock
Hello!
To answer your question ... the OAuth Temporary Credentials, which means the
Request Token and Secret, are usually randomly generated by the Server in
the same way like the Token Credentials (Access Token and Secret) and sent
to the client.
The Client needs the oauth_token_secret only once: for the request in which
the Request Token is exchanged for an Access Token.

For the requests between Client and Server, the signature is generated as
follows:
1) Request for Temporary Credentials - signed with Client Credentials only.
2) Request for Token Credentials - signed with Temporary Credentials (this
is what you need the oauth_token_secret for).
3) Request for Resources - signed with Token Credentials.

Hope I could help.
Regards,
 Lukas Rosenstock

2010/7/28 KeefTM 

> So I am currently writing a SP, and I have a few questions. First, I
> am following the specs here: http://tools.ietf.org/html/rfc5849 Those
> are the correct specs to follow, right? Second, it seems that for the
> Temporary Credential Request, oauth_token and oauth_token_secret are
> randomly generated. Is this the case? If so then what does the Client
> do with the oauth_token_secret? Thanks!
>
> --
> You received this message because you are subscribed to the Google Groups
> "OAuth" group.
> To post to this group, send email to oa...@googlegroups.com.
> To unsubscribe from this group, send email to
> oauth+unsubscr...@googlegroups.com .
> For more options, visit this group at
> http://groups.google.com/group/oauth?hl=en.
>
>


-- 
http://lukasrosenstock.net/

-- 
You received this message because you are subscribed to the Google Groups 
"OAuth" group.
To post to this group, send email to oa...@googlegroups.com.
To unsubscribe from this group, send email to 
oauth+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/oauth?hl=en.



Re: [oauth] Enterprise usage question: Role based access and scope parameter

2010-07-07 Thread Lukas Rosenstock
"scope" is about the permissions that a client application is
requesting. But if those permissions are inherently bound to the users
becaus the users have certain roles, the Access Token requested for a
user can be bound to those roles by the Authorization server. I don't
feel there's a requirement to use "scope" at all.

If, however, you want client applications to specifically state for
which role they're requesting access, there's nothing to prevent you
from implementing the scheme suggested. The specification doesn't
state any format of scopes and neither does it say anything on how the
scope values are converted into actual access privileges.

Regards,
 Lukas Rosenstock

2010/7/6 wjgerritsen :
> Hi,
>
> I am playing with the idea of using role names in the scope parameter
> (of RequestToken endpoint) for authorizing to our platform. It will
> work somehow like this: A user has a number of roles: e.g. SalesRep,
> Employee, Manager. To each role a consistent privilege set is
> assigned, so the user would also be able to use (part of) the
> functionality of the platform with only one role.
>
> Then the token would be bound to a certain role (e.g. SalesRep), such
> that the consumer app cannot excercise all privileges of the user, but
> only those limited to the assigned scope, which is a role. Upon app
> registration, it will be made clear which roles are liable for the
> scope parameter.
>
> Any comments?
>
> regards,
> Willem Jan
>
> --
> You received this message because you are subscribed to the Google Groups 
> "OAuth" group.
> To post to this group, send email to oa...@googlegroups.com.
> To unsubscribe from this group, send email to 
> oauth+unsubscr...@googlegroups.com.
> For more options, visit this group at 
> http://groups.google.com/group/oauth?hl=en.
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"OAuth" group.
To post to this group, send email to oa...@googlegroups.com.
To unsubscribe from this group, send email to 
oauth+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/oauth?hl=en.



Re: [oauth] Need to clarify whether it has way to take Accesstoken without hitting browsers

2010-06-05 Thread Lukas Rosenstock
Twitter has a mechanism to exchange user credentials into access
tokens without browser involvement, but they only provide this on
request for developers who can justify not being able to use a browser
in their applications.
Please check Twitter's developer pages!

2010/6/2 Anusha Ruwanpathirana :
> We need to get Accesstokens of  twitter for users by using our
> application , without hitting Authorization URL. Here, first time we
> can give user’s user name, password with consumer key and consumer
> secret. But, our requirement is need to take authorized Accesstokens
> by programmatically, without browser involvement. In this way, is it
> possible to take authorized Accesstokens?
>
> --
> You received this message because you are subscribed to the Google Groups 
> "OAuth" group.
> To post to this group, send email to oa...@googlegroups.com.
> To unsubscribe from this group, send email to 
> oauth+unsubscr...@googlegroups.com.
> For more options, visit this group at 
> http://groups.google.com/group/oauth?hl=en.
>
>



-- 
http://lukasrosenstock.net/

-- 
You received this message because you are subscribed to the Google Groups 
"OAuth" group.
To post to this group, send email to oa...@googlegroups.com.
To unsubscribe from this group, send email to 
oauth+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/oauth?hl=en.



Re: [oauth] Getting the user name

2010-05-21 Thread Lukas Rosenstock
OpenID Connect (http://openidconnect.com/) is an alternative version of
OpenID build on OAuth. It considers this use case as well and returns a user
identifier which can be used to get username etc. in a standardized manner
via OAuth.

Regards,
 Lukas

2010/5/20 Leah Culver 

> Many APIs have an endpoint solely for getting information about the
> authenticated user. I think Twitter's is account/verify_credentials...
>
> Leah
>
>
> On May 16, 2010, at 5:36 PM, "Richer, Justin P." 
> wrote:
>
>  Nothing exists for this specifically in OAuth, partially because not all
>> APIs have a notion of a "username". However, I think that it makes sense to
>> have a notion of per-instance metadata attached to a token. For example, if
>> a user has two instances of a thick client, both of those will have tokens
>> in the server end, but since they'll both have the same client ID there's no
>> way to tell them apart. Username could be one of these kinds of per-instance
>> meta ields. I floated this idea on the list a while back and never got
>> traction on it.
>>
>> -- justin
>>
>
-- 
http://lukasrosenstock.net/

-- 
You received this message because you are subscribed to the Google Groups 
"OAuth" group.
To post to this group, send email to oa...@googlegroups.com.
To unsubscribe from this group, send email to 
oauth+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/oauth?hl=en.



Re: [oauth] Getting the user name

2010-05-16 Thread Lukas Rosenstock
Hi!
Twitter returns the screenname and user id with almost any API call, and
also along with the Access Token.
For other services you have to check which API call can give you an account
name. There is no standardized way in OAuth to do this.
Regards,
 Lukas

PS: Anyone thinks this should be standardized?!

2010/5/11 hank williams 

> I am an Oauth Noob, and so I have a basic question.
>
> My company is intending to support Twitter, Google apps, and Yahoo apps
> access via Oauth.
>
> I know that part of the purpose of Oauth is to prevent the application
> developer from seeing the account name/password. But I am wondering if it is
> indeed the goal to keep the account name from the application developer. We
> would like to support a users ability to access multiple accounts on the
> same service. For example through our service the user could access two
> google accounts because they have two separate gmail accounts. For a proper
> user interface we need to be able to request, from within a given API, a
> call of the type "what is the username for this account". This will allow us
> to provide a UI that has choices for which account the user wants to be able
> to use.
>
> I have just been looking at the twitter API and I do not see a "what is the
> username for this account" call, and so I thought I would ask here if I am
> somehow barking up the wrong philosophical tree, and if not if anyone knows
> how to make such calls for twitter, yahoo and google.
>
> Thanks,
> Hank.
>
> --
> blog: whydoeseverythingsuck.com
>
> --
> You received this message because you are subscribed to the Google Groups
> "OAuth" group.
> To post to this group, send email to oa...@googlegroups.com.
> To unsubscribe from this group, send email to
> oauth+unsubscr...@googlegroups.com .
> For more options, visit this group at
> http://groups.google.com/group/oauth?hl=en.
>



-- 
http://lukasrosenstock.net/

-- 
You received this message because you are subscribed to the Google Groups 
"OAuth" group.
To post to this group, send email to oa...@googlegroups.com.
To unsubscribe from this group, send email to 
oauth+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/oauth?hl=en.



Re: [oauth] oauth_callback parameter not sent to getsatisfaction

2010-04-26 Thread Lukas Rosenstock
Hi!
Just to clarify: The protocol knows two ways for sending the OAuth callback,
one is along with the request token; and the other is by attaching it to the
URL. The former (1.0a) is recommended and was introduced after security
issues had been known about the latter (1.0).

Regards,
 Lukas

2010/4/26 k42b3 

> hi,
>
>
>  However GetSatisfaction requires that
>> oauth_callback=http://mysite.com/myresource be sent along with the
>> authorization url
>>
>
> As you mentioned the callback url must be send when you obtain the
> "Temporary Credentials". You can set the callback to "oob" but then you have
> to provide the url in anotherway to GetSatisfaction.
>
>
>  Unfortunately since my callback url is different at different entry
>> points
>>
>
> Then you probably must use the oauth_callback param. I dont know the API of
> GetSatisfaction but if its not according to the specification you should
> probably contact them.
>
> best regards
>
>
> --
> You received this message because you are subscribed to the Google Groups
> "OAuth" group.
> To post to this group, send email to oa...@googlegroups.com.
> To unsubscribe from this group, send email to
> oauth+unsubscr...@googlegroups.com .
> For more options, visit this group at
> http://groups.google.com/group/oauth?hl=en.
>
>


-- 
http://lukasrosenstock.net/

-- 
You received this message because you are subscribed to the Google Groups 
"OAuth" group.
To post to this group, send email to oa...@googlegroups.com.
To unsubscribe from this group, send email to 
oauth+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/oauth?hl=en.



Re: [oauth] HTTP PUT request format

2010-04-18 Thread Lukas Rosenstock
Hi!
The correct way would be to use the HTTP "Authorization" header.
Both methods which you have mentioned are basically fallbacks for that
semantically correct "Authorization" header.

If you can't use that, however, I would say 1) is better than 2) because as
per the specification the signature in the body implies a
application/x-www-form-urlencoded content type which usually is not the case
if you use PUT.

OAuth libraries should handle that as well.

Regards,
 Lukas Rosenstock

2010/4/16 AriB 

>
> Hi,
>
> when sending HTTP POST or PUT requests with Oauth, which is the right
> request format, 1) or 2)?
>
> Thanks in advance,
>
> AB
>
> 1)
>
> PUT
>
> http://www.mycompany.com:8080/blahblah?oauth_signature_method=HMAC-SHA1&oauth_token=blahblah&oauth_consumer_key=blahblah&oauth_timestamp=1271415739&oauth_nonce=14979237328487&oauth_version=1.0&oauth_signature=BZ5yz0cPta7Qs2PPzVD%2F6aDG6Gk%3D
>
> POST data:
> myrequestbodyhere
>
> [no cookies]
>
> Request Headers:
> Connection: keep-alive
> Content-Type: application/x-www-form-urlencoded; charset=UTF-8
> Content-Length: 10
>
> 2)
>
> PUT http://www.mycompany.com:8080/blahblah
>
> POST data:
> oauth_signature_method=HMAC-
>
> SHA1&oauth_token=blahblah&oauth_consumer_key=blahblah&oauth_timestamp=1271415739&oauth_nonce=14979237328487&oauth_version=1.0&oauth_signature=BZ5yz0cPta7Qs2PPzVD
> %2F6aDG6Gk%3D
>
> myrequestbodyhere
>
> [no cookies]
>
> Request Headers:
> Connection: keep-alive
> Content-Type: application/x-www-form-urlencoded; charset=UTF-8
> Content-Length: 10
>
> --
> You received this message because you are subscribed to the Google Groups
> "OAuth" group.
> To post to this group, send email to oa...@googlegroups.com.
> To unsubscribe from this group, send email to
> oauth+unsubscr...@googlegroups.com .
> For more options, visit this group at
> http://groups.google.com/group/oauth?hl=en.
>
>


-- 
http://lukasrosenstock.net/

-- 
You received this message because you are subscribed to the Google Groups 
"OAuth" group.
To post to this group, send email to oa...@googlegroups.com.
To unsubscribe from this group, send email to 
oauth+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/oauth?hl=en.



Re: [oauth] Google oAuth Access Token Longevity

2010-04-12 Thread Lukas Rosenstock
The specification does not guide or limit the provider in implementing their
own security policies and that includes the lifetime of tokens. Some
providers may limit it intentionally to let users re-confirm that they still
want to provide the access (or simply users should be logged on to their
 site on the browser) and others don't set any expiry, like Twitter which
keeps tokens alive unless someone revokes them.

Lukas

2010/3/26 Gary Young 

> I'm building an oAuth app that integrates with Contacts, and Gmail and
> everything is working correctly, except that the oAuth access tokens
> that I'm generating seem to only last 1 day.
>
> I was under the impression that oAuth access tokens should last
> indefinitely as long as they are not revoked by the user or my
> application.
>
> Can someone shed some light on this?
>
> Thanks!
>
> Gary
>
> webnexsys.com
>
> --
> You received this message because you are subscribed to the Google Groups
> "OAuth" group.
> To post to this group, send email to oa...@googlegroups.com.
> To unsubscribe from this group, send email to
> oauth+unsubscr...@googlegroups.com .
> For more options, visit this group at
> http://groups.google.com/group/oauth?hl=en.
>
>


-- 
http://lukasrosenstock.net/

-- 
You received this message because you are subscribed to the Google Groups 
"OAuth" group.
To post to this group, send email to oa...@googlegroups.com.
To unsubscribe from this group, send email to 
oauth+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/oauth?hl=en.



Re: [oauth] Updating my Twitter status programmatically.

2010-03-23 Thread Lukas Rosenstock
Hi!
As far as I know Twitter does not allow 2-legged OAuth. That means, apart
from the Consumer Key and Secret that you have already registered, you need
an Access Token and Secret as well.
Now, you may have to do the following things:
1) Fetch a request token and secret from Twitter. This request will be
signed with your Consumer Key and secret.
2) Open the Twitter login page (Authorize URL) with ?oauth_token= and the
request token you got in the first step.
3) Fetch an access token from Twitter by exchanging your request token and
secret for an access token and secret.
Any OAuth library will assist in this.
This process you will have to perform only once.

After that, you can hardcode your Access Token and Secret along with your
Consumer Key and Secret in your application. Your script can forget about
the OAuth flow and just needs to generate the appropriate signature.
As long as you don't manually go to your Twitter account and unauthorize
your own application, your Access Token and Secret will be valid for
posting.

Regards,
 Lukas

2010/3/23 grantcv1 

> I want to programmatically log into twitter periodically and update my
> status. This will happen a few times a day from my server without any
> user interaction. In order to do this, I need my server-based app to
> authenticate itself with twitter using my login credentials.
>
> It seems I have two choices. First, I can take the easy route and use
> basic authentication, but this is considered bad practice at this
> point in time. The second and apparently preferred approach is to use
> OAuth. So I have spent the past day learning what I can about OAuth.
> While I have learned loads about who created OAuth, what the history
> of the name is and that it is a "double entente" [sic - it's double
> entendre]. I have read beginners guides only to find that they are
> obsolete or authoritative gruide's only to find they are incomplete.
> All in all, I feel I have read about a lot of things, but in the end I
> haven't learned much at all.
>
> What I have learned is that, if this is to work at all, it will
> require the two-legged model rather than the three-legged model.  I
> have struggled to find very much information about the two-legged
> model or get any confirmation that twitter even supports this. I did
> find what I believe to be the original spec for this model and it
> seemed to indicate that the model was simpler than the three-legged
> dance. It apparently requires the consumer key and consumer secret but
> no token key or token secret. I guess that the consumer key and secret
> is adequate to authenticate the application - and somehow maybe the
> app is associated with the twitter account so that is good enough.
> [???].
>
>  So I registered my app with twitter, got the consumer key and
> consumer secret, found a library to work with, and set about trying to
> get something to work, But alas, all I seem to get is a login popping
> up at me and then nothing.
> Am I on the right track? Or should I just abandon an effort to follow
> best practices and instead do the simpler thing?
>
> --
> You received this message because you are subscribed to the Google Groups
> "OAuth" group.
> To post to this group, send email to oa...@googlegroups.com.
> To unsubscribe from this group, send email to
> oauth+unsubscr...@googlegroups.com .
> For more options, visit this group at
> http://groups.google.com/group/oauth?hl=en.
>
>


-- 
http://lukasrosenstock.net/

-- 
You received this message because you are subscribed to the Google Groups 
"OAuth" group.
To post to this group, send email to oa...@googlegroups.com.
To unsubscribe from this group, send email to 
oauth+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/oauth?hl=en.



Re: [oauth] 3-legged oauth -- user authorization failures -- what is the standard oauth spec

2010-02-24 Thread Lukas Rosenstock
Hi!
I would like to see this issue addressed in the next iteration of OAuth.
For one internal scenario in which we have deployed OAuth we have come up
with a solution in which apart from oauth_callback another error_callback
parameter is passed - in case of failure the user will be redirected to that
one instead.

Regards,
 Lukas Rosenstock

2010/2/21 Mahesh Venkat 

> Hi,
>
> I recently implemented the 3-legged oauth as per the OAuth 1.0a specs.
> During the implementation I am finding some gaps in the specs for error
> scenarios.
> We have oauth_callback url to redirect the user to the consumer app after a
> successful user authorization. There are a number of exception cases where I
> am not sure what the oauth specs are:
>
>
>1. What is the user interface or oauth interface, if the user denies
>the authorization
>2. If there is system failure in presenting the authorization page to
>the user,  should the service provide redirect to the same oauth_callback
>url of the consumer?
>3. When the service provider receives a request for user authorization
>using the 'unauthorized' request token, if the token is invalid or expired
>should the service provider redirect to the oauth_callback url or send a 
> 404
>error?
>
> Appreciate your response.
>
> --
> Regards
> --Mahesh
>
> --
> You received this message because you are subscribed to the Google Groups
> "OAuth" group.
> To post to this group, send email to oa...@googlegroups.com.
> To unsubscribe from this group, send email to
> oauth+unsubscr...@googlegroups.com .
> For more options, visit this group at
> http://groups.google.com/group/oauth?hl=en.
>



-- 
http://lukasrosenstock.net/

-- 
You received this message because you are subscribed to the Google Groups 
"OAuth" group.
To post to this group, send email to oa...@googlegroups.com.
To unsubscribe from this group, send email to 
oauth+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/oauth?hl=en.



Re: [oauth] Re: Persistent OAuth session

2009-12-27 Thread Lukas Rosenstock
Currently, Twitter gives out OAuth Access Tokens which have unlimited
validity. They are not bound to a specific browser session.

For your intranet pages, you could just authenticate once with the
account of the company (which can see its own tweets) and then save
the Access Token on your server and whenever any user opens the page
you use the same Access Token to fetch the tweets from Twitter API
(user's own timeline) and display it. As the Access Token doesn't show
up in the browser it is secure as well.

Regards,
 Lukas Rosenstock

2009/12/21 hitoshi uchida :
>> My client wants to display their private tweets on one of their
>> intranet pages. The tweets need to just show up without the need for
>> their employees to authenticate with Twitter. Their employees wouldn't
>> be able to authenticate anyways since they wouldn't know the username/
>> password for the account.
>
> What you mentioned isn't related to OAuth.
> If the tweets is private,
> it is impossible for someone to review the tweets without
> authentication.
>
> --
>
> You received this message because you are subscribed to the Google Groups 
> "OAuth" group.
> To post to this group, send email to oa...@googlegroups.com.
> To unsubscribe from this group, send email to 
> oauth+unsubscr...@googlegroups.com.
> For more options, visit this group at 
> http://groups.google.com/group/oauth?hl=en.
>
>
>



-- 
http://lukasrosenstock.net/

--

You received this message because you are subscribed to the Google Groups 
"OAuth" group.
To post to this group, send email to oa...@googlegroups.com.
To unsubscribe from this group, send email to 
oauth+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/oauth?hl=en.




Re: [oauth] test OAuth consumer and service provider

2009-12-04 Thread Lukas Rosenstock
Hi!
I think this looks very nice and will help to understand the flow and
is good for debugging. We might use it to test the upgrade of our
internal OAuth use from 1.0 to 1.0a.

Lukas

2009/11/18 k42b3 :
> hi OAuth folks,
>
> I like to announce a test consumer and service provider.
>
> http://dev.k42b3.com/index.php/oauth
>
> this is a implementation of the specification OAuth 1.0 Revision A. Because
> I missed a test server
> while Iam trying to understand the concept of OAuth ... I developed this
> OAuth service provider and
> consumer. This should help people to understand OAuth and to test
> applications that are based on it.
>
>
> best regards
> k42b3
>
> --
>
> You received this message because you are subscribed to the Google Groups
> "OAuth" group.
> To post to this group, send email to oa...@googlegroups.com.
> To unsubscribe from this group, send email to
> oauth+unsubscr...@googlegroups.com.
> For more options, visit this group at
> http://groups.google.com/group/oauth?hl=.
>



-- 
http://lukasrosenstock.net/

--

You received this message because you are subscribed to the Google Groups 
"OAuth" group.
To post to this group, send email to oa...@googlegroups.com.
To unsubscribe from this group, send email to 
oauth+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/oauth?hl=en.




[oauth] Status of XRDS Simple and OAuth Discovery

2009-11-06 Thread Lukas Rosenstock
Good afternoon!
A long time back I came across two drafts for standards, which are now
marked as obsolute, with "a new version to be expected by the end of March
2009". Now it's November 2009!

These standards are the OAuth Discovery and XRDS Simple:
http://oauth.net/discovery/1.0
http://xrds-simple.net/core/1.0/

I planned to incorporate some of the functionality specified by those
standards in my current project, but right now I'm unsure on how to proceed.
Are there any successors of those protocols or is there any work in
progress?!
As I haven't been too active in the OAuth/OpenID communities recently I
apologize in case this is a stupid question where I should know the answer
...

Regards,
 Lukas

--~--~-~--~~~---~--~~
You received this message because you are subscribed to the Google Groups 
"OAuth" group.
To post to this group, send email to oauth@googlegroups.com
To unsubscribe from this group, send email to oauth+unsubscr...@googlegroups.com
For more options, visit this group at http://groups.google.com/group/oauth?hl=en
-~--~~~~--~~--~--~---



[oauth] Re: Question about Access Token

2009-11-01 Thread Lukas Rosenstock
Ok, sorry, I read your last sentence wrong so my first sentence doesn't make
sense ...

One more thing: Using an Access Token the Consumer can make any number of
requests as long as that token is valid.

2009/11/2 Lukas Rosenstock 

> Hi Melvin,
>
> yes, the Access Token is used to access the permissioned resource directly,
> but I would not say "just" access because this is the purpose of OAuth,
> right?!
>
> The Provider has some resources (data, functionality etc.) exposed through
> webservice APIs, which are related to a particular user (e.g. contain this
> user's personal details). Every request that directly goes from the Consumer
> to the Provider - a server-to-server request in which the user's browser is
> not involved - carries an OAuth signature. This signature contains the
> Access Token so that the Provider can verify that the user has actually
> given his consent to share the data with the Consumer.
>
> Hope that helped!
>
> Regards,
>  Lukas
>
> 2009/10/31 Melvin Carvalho 
>
>
>> Hi All
>>
>> I hope this is not too much of a beginner question.
>>
>> I've been reading through the OAuth spec and I was wondering what the
>> role of the access token is.
>>
>> It seems to me after stage 6.2 http://oauth.net/core/1.0a#auth_step2
>>
>> 1. The Service Provider has authorized the Consumer
>> 2. The Service Provider has verified the Consumer
>>
>> Why then does the consumer need an access token, rather than just
>> accessed the permissioned resource directly.
>>
>> Thanks
>> Melvin
>>
>> >>
>>
>
>
> --
> http://lukasrosenstock.net/
>



-- 
http://lukasrosenstock.net/

--~--~-~--~~~---~--~~
You received this message because you are subscribed to the Google Groups 
"OAuth" group.
To post to this group, send email to oauth@googlegroups.com
To unsubscribe from this group, send email to oauth+unsubscr...@googlegroups.com
For more options, visit this group at http://groups.google.com/group/oauth?hl=en
-~--~~~~--~~--~--~---



[oauth] Re: Question about Access Token

2009-11-01 Thread Lukas Rosenstock
Hi Melvin,

yes, the Access Token is used to access the permissioned resource directly,
but I would not say "just" access because this is the purpose of OAuth,
right?!

The Provider has some resources (data, functionality etc.) exposed through
webservice APIs, which are related to a particular user (e.g. contain this
user's personal details). Every request that directly goes from the Consumer
to the Provider - a server-to-server request in which the user's browser is
not involved - carries an OAuth signature. This signature contains the
Access Token so that the Provider can verify that the user has actually
given his consent to share the data with the Consumer.

Hope that helped!

Regards,
 Lukas

2009/10/31 Melvin Carvalho 

>
> Hi All
>
> I hope this is not too much of a beginner question.
>
> I've been reading through the OAuth spec and I was wondering what the
> role of the access token is.
>
> It seems to me after stage 6.2 http://oauth.net/core/1.0a#auth_step2
>
> 1. The Service Provider has authorized the Consumer
> 2. The Service Provider has verified the Consumer
>
> Why then does the consumer need an access token, rather than just
> accessed the permissioned resource directly.
>
> Thanks
> Melvin
>
> >
>


-- 
http://lukasrosenstock.net/

--~--~-~--~~~---~--~~
You received this message because you are subscribed to the Google Groups 
"OAuth" group.
To post to this group, send email to oauth@googlegroups.com
To unsubscribe from this group, send email to oauth+unsubscr...@googlegroups.com
For more options, visit this group at http://groups.google.com/group/oauth?hl=en
-~--~~~~--~~--~--~---



[oauth] Re: My case against section 6.2.1 (User redirection)

2009-09-29 Thread Lukas Rosenstock
The idea behind OAuth has often been described as a "valet key". The kind of
authentication provided by the access token in OAuth is different from the
user's username and password. During the redirect, the user may choose what
kind of access he wants to give, for example whether the consumer
application may only read data from the provider or whether write-access is
also provided. Asking for the user's credentials does not provide this kind
of access.

The second thing about OAuth is that - while of course user's may be tricked
- it at least gives the user the opportunity to find out about potential
phishing sites by looking at the URL. With asking for the username and
password there is no way the user can check whether his credentials are
stored by the consumer or not.

What you call a "normal authorization flow" has been described as the
"password anti pattern". I would agree that this may be a bit unusual to
users but they're getting used to it and from security perspective it is
better due to the reasons which I described above.

Regards,
 Lukas

PS: Although I'm using OAuth for some time, this is my first posting to this
mailing list. I hope it's okay ... and welcome everybody ...

2009/9/29 James Wanga 

>
> I'm new to the OAuth pattern, as such, I welcome any criticism of my
> ignorance. As I understand it, Section 6.2.1 of the OAuth 1.0a spec
> states that the consumer MUST obtain approval by directing the user to
> the service provider at which point the user enters their credentials,
> consequently, approving the request token. From what I gather, this
> redirection serves two purposes. It keeps the users credentials safe
> from a malicious/careless consumers and it prevents anyone snooping
> the wire on non-SSL connections from obtaining any useful data. I
> think premise that a redirect to the service provider keeps
> credentials safe in any reliable way is deeply, deeply flawed. I've
> read several arguments issuing caution about the susceptibility of
> this pattern to phishing attacks and most just issue the warning then
> continue on to explain how to implement it anyway.  In my humble
> opinion a phishing attack is so trivial with this pattern that
> attempting to keep user credentials from the consumer is futile.
>
> Let me use the canonical scenario. The consumer - printer.example.com
> - directs the user to the service provider authorization page -
> photos.example.com/authorize - where the user logs in and authorizes
> the consumer. The OAuth pattern argues that this keeps the user safe
> in the event that printer.example.com is a den of thieves interested
> is stealing your credentials. I disagree. If they wanted to steal your
> info it would be pitifully trivial to redirect you to
> example.printer.com/authorize. The idea that most users will notice
> the URL slight of hand is unrealistic. Did you? For that matter, a
> malicious consumer could load the authorization page in a browser
> window without an address bar and remove the users ability to tell the
> difference. The only benefit redirection seems to offer is in keeping
> consumers from carelessly storing passwords that can be stolen. If a
> consumer wants your password, they'll get it. Easily!
>
>  I argue that it is so easy to trick large numbers of users with a
> fake authorization page that the requirement is useless. Though far
> from ideal, I propose that it isn't any less safe to allow the
> consumer - web or installed - to authorize themselves by prompting for
> the users credentials and passing them over SSL. This would still
> eliminate the need for the consumer to store credentials on the users
> behalf as with basic auth and it would spare users the unfamiliarity
> of the OAuth workflow. I realize this does nothing to control
> malicious consumers. My only case is that compromising the redirect
> workflow is so trivial that at least we can give the user back a
> normal authentication experience.
>
> Once again, it is entirely possible that I'm mis-understanding
> something, it wouldn't be the first time. But if I'm not, then we
> should really consider whether or not redirection is presenting a
> dangerous, false sense of security.
>
> >
>

--~--~-~--~~~---~--~~
You received this message because you are subscribed to the Google Groups 
"OAuth" group.
To post to this group, send email to oauth@googlegroups.com
To unsubscribe from this group, send email to oauth+unsubscr...@googlegroups.com
For more options, visit this group at http://groups.google.com/group/oauth?hl=en
-~--~~~~--~~--~--~---