Re: [OAUTH-WG] draft-ietf-oauth-saml2-bearer-10 question

2012-04-06 Thread Brian Campbell
It really depends on the situation - what other systems are available to
the client and the nature of the trust relationship between the client and
the AS.

As John said, a client could generate and self sign an assertion. This
likely works for well for client authentication via asymmetric keys.

WS-Trust/STS is the most typical (in my view anyway) way a client might get
an assertion to use for authorization. We've got a few customers doing it
that way.  I did a little demo a while back using WS-Trust but where the
assertion issuer acts as a broker of sorts in the transaction rather than
returning the assertion to the client:
https://www.pingidentity.com/blogs/pingtalk/index.cfm/2010/11/5/Securing-Mobile-for-Enterprise--SAML-OAuth-WSTrust-in-Action

ECP is possible but you are right that lack of support for it makes it
unlikely.

Various permutations of Web SSO are possible too.  The client might be a
SAML SP, for example, and get an assertion from an IDP that's suitable for
both SSO and use as a grant type. Although, in current practice, I don't
think IDP support for issuing such assertions is very good.

And there's nothing ruling out some kind of simple proprietary exchange
between the client and the assertion issuer.


On Thu, Apr 5, 2012 at 7:46 PM, John Bradley ve7...@ve7jtb.com wrote:

 Adam,

 It may be a self signed SAML assertion.

 That is likely the case where someone wanted to use asymmetric keys to
 authenticate to the Token Endpoint.

 I could see an STS used in some cases.

 ECP is a touch unlikely unless someone was super keen.

 The client could use a Web SSO profile to get a assertion for the user if
 you are using the Assertion profile for the Authorization endpoint.

 There is also a JWT token profile for assertions,  you knew I couldn't
 resist a plug:)

 John B.
 On 2012-04-05, at 10:35 PM, Lewis Adam-CAL022 wrote:

 Hi,
 ** **
 Reading draft-ietf-oauth-saml2-bearer-10, it states:
 ** **
 The process by which the client obtains the SAML Assertion, prior to
exchanging it with the authorization server or using it for client
authentication, is out of scope.
 ** **
 Accepting that it’s out of scope from the draft, what are the realistic
 alternatives to obtaining the SAML assertion out of band?  WS-Trust
 provides a direct method to request a SAML assertion from a STS, and the
 SAML ECP profiles seems to allow this behavior, but it doesn’t seem like
 ECP is very well supported.  What other viable means are there from a
 client to directly request a SAML assertion from an assertion issuer?
 ** **
 Tx!
 adam
 ___
 OAuth mailing list
 OAuth@ietf.org
 https://www.ietf.org/mailman/listinfo/oauth



 ___
 OAuth mailing list
 OAuth@ietf.org
 https://www.ietf.org/mailman/listinfo/oauth


___
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth


[OAUTH-WG] draft-ietf-oauth-saml2-bearer-10 question

2012-04-05 Thread Lewis Adam-CAL022
Hi,

Reading draft-ietf-oauth-saml2-bearer-10, it states:

The process by which the client obtains the SAML Assertion, prior to
   exchanging it with the authorization server or using it for client
   authentication, is out of scope.

Accepting that it's out of scope from the draft, what are the realistic 
alternatives to obtaining the SAML assertion out of band?  WS-Trust provides a 
direct method to request a SAML assertion from a STS, and the SAML ECP profiles 
seems to allow this behavior, but it doesn't seem like ECP is very well 
supported.  What other viable means are there from a client to directly request 
a SAML assertion from an assertion issuer?

Tx!
adam
___
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth