Re: [OAUTH-WG] Assertion flow and token bootstrapping

2010-06-14 Thread Eran Hammer-Lahav
As long as:

- You can provide a URI identifier for the assertion format you are going to 
use, and
- The authorization server can do something useful with the assertion provided 
and decide if it should grant an access token

Then sure, you can use the assertion flow for utilizing any other trust 
framework for obtaining an access token.

EHL

From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of Lisa 
Dusseault
Sent: Wednesday, June 02, 2010 10:33 AM
To: oauth
Subject: [OAUTH-WG] Assertion flow and token bootstrapping


I've been trying to understand the use case for the assertion flow 
(http://tools.ietf.org/html/draft-ietf-oauth-v2-05#section-3.10) .  Conversely, 
I have a use case for bootstrapping, and I'm trying to understand if the 
assertion flow is the right flow for that use case.

The bootstrapping use case I have in mind is to allow a client to interact with 
a related set of services by bootstrapping from client secret to an access 
token, and then from that access token to other access tokens.  For example, in 
a "login" interaction the client would get a generic access token.  Later, to 
use various services -- access to personal data, access to friends' data, 
attempts to do uploads -- the client would ask the security token server for 
access to new resources by URI, and if access was granted, receive new access 
tokens which could be used on those services.  The client secret is not reused 
very often, and policy is centralized.

This seems similar to other use cases being discussed and so it's possible my 
main point of confusion is trying to tie this to the assertion flow instead of 
something else.

The assertion flow has the right number of parties involved, and it could 
certainly be hacked/extended to do bootstrapping: instead of the client secret, 
the general session access token could be used, and the "assertion" field can 
contain anything including the URI of the service that the client now wants.  
However I wondered if something less generic could make this more interoperable.

Any thoughts?

Thanks,
Lisa
___
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth


Re: [OAUTH-WG] Assertion flow and token bootstrapping

2010-06-07 Thread Dick Hardt
I would prefer to see it in the core spec. 

On 2010-06-07, at 7:32 AM, Thomas Hardjono wrote:

> Thanks Dick.  I was just kinda confused: if the Assertion Flow was already in 
> the WRAP draft and now in the core spec (OAuth2.0-draft-05), what do we gain 
> from separating it off again.
> 
> /thomas/
> 
> __
> 
> 
>> -Original Message-
>> From: Dick Hardt [mailto:dick.ha...@gmail.com]
>> Sent: Sunday, June 06, 2010 8:10 PM
>> To: Thomas Hardjono
>> Cc: oauth@ietf.org
>> Subject: Re: [OAUTH-WG] Assertion flow and token bootstrapping
>> 
>> I hope so.
>> 
>> On 2010-06-06, at 3:22 PM, Thomas Hardjono wrote:
>> 
>>> Apologies for another newbie question: is the design-intention underlying
>> the Assertion Flow in OAuth2.0-draft-05 the same as that in the WRAP draft
>> (draft-hardt-oauth-01)?
>>> 
>>> /thomas/
>>> 
>>> __
>>> 
>>>> -Original Message-
>>>> From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of
>>>> Dick Hardt
>>>> Sent: Friday, June 04, 2010 9:59 PM
>>>> To: Luke Shepard
>>>> Cc: oauth@ietf.org
>>>> Subject: Re: [OAUTH-WG] Assertion flow and token bootstrapping
>>>> 
>>>> because we use it
>>>> 
>>>> On 2010-06-04, at 6:40 PM, Luke Shepard wrote:
>>>> 
>>>>> Why?
>>>>> 
>>>>> On Jun 4, 2010, at 4:41 PM, Patrick Harding wrote:
>>>>> 
>>>>>> +1
>>>>>> 
>>>>>> Sent from my iPhone
>>>>>> 
>>>>>> On Jun 4, 2010, at 5:38 PM, Brian Campbell
>>>>>>  wrote:
>>>>>> 
>>>>>>> On Thu, Jun 3, 2010 at 9:20 AM, Peter Saint-Andre
>>>>>>>  wrote:
>>>>>>>> 
>>>>>>>> At least for the assertion flow, that's definitely true. At the
>>>>>>>> interim
>>>>>>>> meeting we had some discussion about perhaps pulling the assertion
>>>>>>>> flow
>>>>>>>> out of the base spec and into a separate document. Perhaps that's the
>>>>>>>> best way to proceed.
>>>>>>> 
>>>>>>> 
>>>>>>> I'd like to see the assertion flow remain in the base spec.
>>>>>>> ___
>>>>>>> OAuth mailing list
>>>>>>> OAuth@ietf.org
>>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>> ___
>>>>>> OAuth mailing list
>>>>>> OAuth@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>> 
>>>>> ___
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>> 
>>>> ___
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
> 

___
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth


Re: [OAUTH-WG] Assertion flow and token bootstrapping

2010-06-07 Thread Thomas Hardjono
Thanks Dick.  I was just kinda confused: if the Assertion Flow was already in 
the WRAP draft and now in the core spec (OAuth2.0-draft-05), what do we gain 
from separating it off again.

/thomas/

__


> -Original Message-
> From: Dick Hardt [mailto:dick.ha...@gmail.com]
> Sent: Sunday, June 06, 2010 8:10 PM
> To: Thomas Hardjono
> Cc: oauth@ietf.org
> Subject: Re: [OAUTH-WG] Assertion flow and token bootstrapping
> 
> I hope so.
> 
> On 2010-06-06, at 3:22 PM, Thomas Hardjono wrote:
> 
> > Apologies for another newbie question: is the design-intention underlying
> the Assertion Flow in OAuth2.0-draft-05 the same as that in the WRAP draft
> (draft-hardt-oauth-01)?
> >
> > /thomas/
> >
> > __
> >
> >> -Original Message-
> >> From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of
> >> Dick Hardt
> >> Sent: Friday, June 04, 2010 9:59 PM
> >> To: Luke Shepard
> >> Cc: oauth@ietf.org
> >> Subject: Re: [OAUTH-WG] Assertion flow and token bootstrapping
> >>
> >> because we use it
> >>
> >> On 2010-06-04, at 6:40 PM, Luke Shepard wrote:
> >>
> >>> Why?
> >>>
> >>> On Jun 4, 2010, at 4:41 PM, Patrick Harding wrote:
> >>>
> >>>> +1
> >>>>
> >>>> Sent from my iPhone
> >>>>
> >>>> On Jun 4, 2010, at 5:38 PM, Brian Campbell
> >>>>  wrote:
> >>>>
> >>>>> On Thu, Jun 3, 2010 at 9:20 AM, Peter Saint-Andre
> >>>>>  wrote:
> >>>>>>
> >>>>>> At least for the assertion flow, that's definitely true. At the
> >>>>>> interim
> >>>>>> meeting we had some discussion about perhaps pulling the assertion
> >>>>>> flow
> >>>>>> out of the base spec and into a separate document. Perhaps that's the
> >>>>>> best way to proceed.
> >>>>>
> >>>>>
> >>>>> I'd like to see the assertion flow remain in the base spec.
> >>>>> ___
> >>>>> OAuth mailing list
> >>>>> OAuth@ietf.org
> >>>>> https://www.ietf.org/mailman/listinfo/oauth
> >>>> ___
> >>>> OAuth mailing list
> >>>> OAuth@ietf.org
> >>>> https://www.ietf.org/mailman/listinfo/oauth
> >>>
> >>> ___
> >>> OAuth mailing list
> >>> OAuth@ietf.org
> >>> https://www.ietf.org/mailman/listinfo/oauth
> >>
> >> ___
> >> OAuth mailing list
> >> OAuth@ietf.org
> >> https://www.ietf.org/mailman/listinfo/oauth

___
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth


Re: [OAUTH-WG] Assertion flow and token bootstrapping

2010-06-07 Thread Dick Hardt
I hope so.

On 2010-06-06, at 3:22 PM, Thomas Hardjono wrote:

> Apologies for another newbie question: is the design-intention underlying the 
> Assertion Flow in OAuth2.0-draft-05 the same as that in the WRAP draft 
> (draft-hardt-oauth-01)?
> 
> /thomas/
> 
> __
> 
>> -Original Message-
>> From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of
>> Dick Hardt
>> Sent: Friday, June 04, 2010 9:59 PM
>> To: Luke Shepard
>> Cc: oauth@ietf.org
>> Subject: Re: [OAUTH-WG] Assertion flow and token bootstrapping
>> 
>> because we use it
>> 
>> On 2010-06-04, at 6:40 PM, Luke Shepard wrote:
>> 
>>> Why?
>>> 
>>> On Jun 4, 2010, at 4:41 PM, Patrick Harding wrote:
>>> 
>>>> +1
>>>> 
>>>> Sent from my iPhone
>>>> 
>>>> On Jun 4, 2010, at 5:38 PM, Brian Campbell
>>>>  wrote:
>>>> 
>>>>> On Thu, Jun 3, 2010 at 9:20 AM, Peter Saint-Andre
>>>>>  wrote:
>>>>>> 
>>>>>> At least for the assertion flow, that's definitely true. At the
>>>>>> interim
>>>>>> meeting we had some discussion about perhaps pulling the assertion
>>>>>> flow
>>>>>> out of the base spec and into a separate document. Perhaps that's the
>>>>>> best way to proceed.
>>>>> 
>>>>> 
>>>>> I'd like to see the assertion flow remain in the base spec.
>>>>> ___
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>> ___
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>> 
>>> ___
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>> 
>> ___
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth

___
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth


Re: [OAUTH-WG] Assertion flow and token bootstrapping

2010-06-07 Thread Thomas Hardjono
Apologies for another newbie question: is the design-intention underlying the 
Assertion Flow in OAuth2.0-draft-05 the same as that in the WRAP draft 
(draft-hardt-oauth-01)?

/thomas/

__

> -Original Message-
> From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of
> Dick Hardt
> Sent: Friday, June 04, 2010 9:59 PM
> To: Luke Shepard
> Cc: oauth@ietf.org
> Subject: Re: [OAUTH-WG] Assertion flow and token bootstrapping
> 
> because we use it
> 
> On 2010-06-04, at 6:40 PM, Luke Shepard wrote:
> 
> > Why?
> >
> > On Jun 4, 2010, at 4:41 PM, Patrick Harding wrote:
> >
> >> +1
> >>
> >> Sent from my iPhone
> >>
> >> On Jun 4, 2010, at 5:38 PM, Brian Campbell
> >>  wrote:
> >>
> >>> On Thu, Jun 3, 2010 at 9:20 AM, Peter Saint-Andre
> >>>  wrote:
> >>>>
> >>>> At least for the assertion flow, that's definitely true. At the
> >>>> interim
> >>>> meeting we had some discussion about perhaps pulling the assertion
> >>>> flow
> >>>> out of the base spec and into a separate document. Perhaps that's the
> >>>> best way to proceed.
> >>>
> >>>
> >>> I'd like to see the assertion flow remain in the base spec.
> >>> ___
> >>> OAuth mailing list
> >>> OAuth@ietf.org
> >>> https://www.ietf.org/mailman/listinfo/oauth
> >> ___
> >> OAuth mailing list
> >> OAuth@ietf.org
> >> https://www.ietf.org/mailman/listinfo/oauth
> >
> > ___
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
> 
> ___
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
___
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth


Re: [OAUTH-WG] Assertion flow and token bootstrapping

2010-06-04 Thread Dick Hardt
because we use it

On 2010-06-04, at 6:40 PM, Luke Shepard wrote:

> Why?
> 
> On Jun 4, 2010, at 4:41 PM, Patrick Harding wrote:
> 
>> +1
>> 
>> Sent from my iPhone
>> 
>> On Jun 4, 2010, at 5:38 PM, Brian Campbell  
>>  wrote:
>> 
>>> On Thu, Jun 3, 2010 at 9:20 AM, Peter Saint-Andre  
>>>  wrote:
 
 At least for the assertion flow, that's definitely true. At the  
 interim
 meeting we had some discussion about perhaps pulling the assertion  
 flow
 out of the base spec and into a separate document. Perhaps that's the
 best way to proceed.
>>> 
>>> 
>>> I'd like to see the assertion flow remain in the base spec.
>>> ___
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>> ___
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
> 
> ___
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

___
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth


Re: [OAUTH-WG] Assertion flow and token bootstrapping

2010-06-04 Thread Luke Shepard
Why?

On Jun 4, 2010, at 4:41 PM, Patrick Harding wrote:

> +1
> 
> Sent from my iPhone
> 
> On Jun 4, 2010, at 5:38 PM, Brian Campbell  
>  wrote:
> 
>> On Thu, Jun 3, 2010 at 9:20 AM, Peter Saint-Andre  
>>  wrote:
>>> 
>>> At least for the assertion flow, that's definitely true. At the  
>>> interim
>>> meeting we had some discussion about perhaps pulling the assertion  
>>> flow
>>> out of the base spec and into a separate document. Perhaps that's the
>>> best way to proceed.
>> 
>> 
>> I'd like to see the assertion flow remain in the base spec.
>> ___
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
> ___
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

___
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth


Re: [OAUTH-WG] Assertion flow and token bootstrapping

2010-06-04 Thread Patrick Harding

+1

Sent from my iPhone

On Jun 4, 2010, at 5:38 PM, Brian Campbell  
 wrote:


On Thu, Jun 3, 2010 at 9:20 AM, Peter Saint-Andre  
 wrote:


At least for the assertion flow, that's definitely true. At the  
interim
meeting we had some discussion about perhaps pulling the assertion  
flow

out of the base spec and into a separate document. Perhaps that's the
best way to proceed.



I'd like to see the assertion flow remain in the base spec.
___
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

___
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth


Re: [OAUTH-WG] Assertion flow and token bootstrapping

2010-06-04 Thread Torsten Lodderstedt

+1

Am 04.06.2010 23:38, schrieb Brian Campbell:

On Thu, Jun 3, 2010 at 9:20 AM, Peter Saint-Andre  wrote:
   

At least for the assertion flow, that's definitely true. At the interim
meeting we had some discussion about perhaps pulling the assertion flow
out of the base spec and into a separate document. Perhaps that's the
best way to proceed.
 


I'd like to see the assertion flow remain in the base spec.
___
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth
   


___
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth


Re: [OAUTH-WG] Assertion flow and token bootstrapping

2010-06-04 Thread Brian Campbell
On Thu, Jun 3, 2010 at 9:20 AM, Peter Saint-Andre  wrote:
>
> At least for the assertion flow, that's definitely true. At the interim
> meeting we had some discussion about perhaps pulling the assertion flow
> out of the base spec and into a separate document. Perhaps that's the
> best way to proceed.


I'd like to see the assertion flow remain in the base spec.
___
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth


Re: [OAUTH-WG] Assertion flow and token bootstrapping

2010-06-03 Thread Dick Hardt

On 2010-06-03, at 8:20 AM, Peter Saint-Andre wrote:

> On 6/3/10 8:54 AM, Thomas Hardjono wrote:
> 
>> PS. Compared to the details of RFC4120 and even
>> to the old ISAKMP in the IETF, the current
>> OAuth2.0 draft-05 spec appear to be a high-level framework
>> that needs to be instantiated/profiled.
> 
> At least for the assertion flow, that's definitely true. At the interim
> meeting we had some discussion about perhaps pulling the assertion flow
> out of the base spec and into a separate document. Perhaps that's the
> best way to proceed.

I think all of the flows have some aspect that requires the developer reading 
some context specific documentation to implement and that standardizing what we 
can is useful.  The assertions being passed around are based on specs that 
themselves need to be profiled often. 

___
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth


Re: [OAUTH-WG] Assertion flow and token bootstrapping

2010-06-03 Thread Dick Hardt

On 2010-06-03, at 7:54 AM, Thomas Hardjono wrote:

> Dick, Brian,
> 
> Thanks for the clarification.
> 
> - Is the Assertion Flow designed only for the STS,
> or can it be used with other "identity providers" (non-WSS).

It can be used with any tokens. I use the STS term to clarify the design 
pattern.

> 
> - Also, is it the expectation that a "profile" of OAuth2.0
> be created to address certain use-cases.

Such as?

> 
> PS. Compared to the details of RFC4120 and even
> to the old ISAKMP in the IETF, the current
> OAuth2.0 draft-05 spec appear to be a high-level framework
> that needs to be instantiated/profiled.

Agreed there are some aspects of OAuth that are left to other documentation. 
Standardizing what can easily be standardized has proven very useful to 
implementors.

-- Dick


___
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth


Re: [OAUTH-WG] Assertion flow and token bootstrapping

2010-06-03 Thread Paul Madsen

I think STS was used in the generic sense, ie token in, token out

Although a SOAP-binding for the flow would be wonderfully perverse

paul

On 03/06/2010 10:54 AM, Thomas Hardjono wrote:

Dick, Brian,

Thanks for the clarification.

- Is the Assertion Flow designed only for the STS,
or can it be used with other "identity providers" (non-WSS).

- Also, is it the expectation that a "profile" of OAuth2.0
be created to address certain use-cases.

PS. Compared to the details of RFC4120 and even
to the old ISAKMP in the IETF, the current
OAuth2.0 draft-05 spec appear to be a high-level framework
that needs to be instantiated/profiled.

/thomas/



__

-From: Dick Hardt [mailto:dick.ha...@gmail.com]
-Sent: Thursday, June 03, 2010 1:51 AM
To: Brian Campbell
Cc: Thomas Hardjono; oauth
Subject: Re: [OAUTH-WG] Assertion flow and token bootstrapping

The Assertion Flow is for the AS to act as an STS where one token is exchanged 
for another. This allows the PR to not have to worry about different kinds of 
tokens and to only deal with tokens issued by an AS.

Lisa: a real world example of your use case would make it easier for how you 
got to the requirements you stated (ie. I am confused :)

-- Dick
On Wed, Jun 2, 2010 at 8:09 PM, Brian Campbell  
wrote:
I'm still a newbie here so someone please correct me if I'm wrong, but
I believe the Assertion Flow was intentionally left generic to serve
as an extension point for profiling more specific types of
assertions/tokens being exchanged for OAuth Access Tokens (or allowing
for proprietary usage).   The use of SAML 2 tokens is suggested in
draft-ietf-oauth-v2-05 but one could imagine SAML 1.1, Kerberos (along
the lines of what Thomas outlines though I don't know enough about
Kerb to really comment), X.509, or whatever. Perhaps part of Lisa's
use case could be addressed by profiling a flow that defines an Access
Token being exchanged for a different Access Token?  And the initial
bootstrapping could maybe be accomplished via the Client Credentials
Flow?

On Wed, Jun 2, 2010 at 12:56 PM, Thomas Hardjono  wrote:
   


Lisa,



I'm also looking at the assertion flow right now

and wondering if I could use it to  "swap" a

Kerberos service-ticket for an OAuth Access-Token.



In particular, I would like to:



(1) Wrap the KRB AP_REQ message within a SAML-assertion

(eg. using the existing WSS Token Profile standard),



(2) Deliver it using the OAuth assertion flow to a special

Kerberized-service (or IdP or OP), who then verifies

the Authenticator and Service-Ticket within

the AP_REQ message.



(3) Obtain in return an OAuth Access-Token with

the same lifetimes/expiration as defined in the original

service-ticket (in the AP_REQ request).



(4) Present the Access-Token to an OAuth Resource Server.



(ps. Alternatively, I could use the Kerberos delegation feature

but that may be more complicated).





I think Section 3.10 needs more fleshing-out.



/thomas/





__



From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of
Lisa Dusseault
Sent: Wednesday, June 02, 2010 1:33 PM
To: oauth
Subject: [OAUTH-WG] Assertion flow and token bootstrapping



I've been trying to understand the use case for the assertion flow
(http://tools.ietf.org/html/draft-ietf-oauth-v2-05#section-3.10) .
Conversely, I have a use case for bootstrapping, and I'm trying to
understand if the assertion flow is the right flow for that use case.

The bootstrapping use case I have in mind is to allow a client to interact
with a related set of services by bootstrapping from client secret to an
access token, and then from that access token to other access tokens.  For
example, in a "login" interaction the client would get a generic access
token.  Later, to use various services -- access to personal data, access to
friends' data, attempts to do uploads -- the client would ask the security
token server for access to new resources by URI, and if access was granted,
receive new access tokens which could be used on those services.  The client
secret is not reused very often, and policy is centralized.

This seems similar to other use cases being discussed and so it's possible
my main point of confusion is trying to tie this to the assertion flow
instead of something else.

The assertion flow has the right number of parties involved, and it could
certainly be hacked/extended to do bootstrapping: instead of the client
secret, the general session access token could be used, and the "assertion"
field can contain anything including the URI of the service that the client
now wants.  However I wondered if something less generic could make this
more interoperable.

Any thoughts?

Thanks,
Lisa

___
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth


Re: [OAUTH-WG] Assertion flow and token bootstrapping

2010-06-03 Thread Peter Saint-Andre
On 6/3/10 8:54 AM, Thomas Hardjono wrote:

> PS. Compared to the details of RFC4120 and even
> to the old ISAKMP in the IETF, the current
> OAuth2.0 draft-05 spec appear to be a high-level framework
> that needs to be instantiated/profiled.

At least for the assertion flow, that's definitely true. At the interim
meeting we had some discussion about perhaps pulling the assertion flow
out of the base spec and into a separate document. Perhaps that's the
best way to proceed.

Peter

-- 
Peter Saint-Andre
https://stpeter.im/





smime.p7s
Description: S/MIME Cryptographic Signature
___
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth


Re: [OAUTH-WG] Assertion flow and token bootstrapping

2010-06-03 Thread Thomas Hardjono
Dick, Brian,

Thanks for the clarification.

- Is the Assertion Flow designed only for the STS,
or can it be used with other "identity providers" (non-WSS).

- Also, is it the expectation that a "profile" of OAuth2.0
be created to address certain use-cases.

PS. Compared to the details of RFC4120 and even
to the old ISAKMP in the IETF, the current
OAuth2.0 draft-05 spec appear to be a high-level framework
that needs to be instantiated/profiled.

/thomas/



__

-From: Dick Hardt [mailto:dick.ha...@gmail.com] 
-Sent: Thursday, June 03, 2010 1:51 AM
To: Brian Campbell
Cc: Thomas Hardjono; oauth
Subject: Re: [OAUTH-WG] Assertion flow and token bootstrapping

The Assertion Flow is for the AS to act as an STS where one token is exchanged 
for another. This allows the PR to not have to worry about different kinds of 
tokens and to only deal with tokens issued by an AS.

Lisa: a real world example of your use case would make it easier for how you 
got to the requirements you stated (ie. I am confused :)

-- Dick
On Wed, Jun 2, 2010 at 8:09 PM, Brian Campbell  
wrote:
I'm still a newbie here so someone please correct me if I'm wrong, but
I believe the Assertion Flow was intentionally left generic to serve
as an extension point for profiling more specific types of
assertions/tokens being exchanged for OAuth Access Tokens (or allowing
for proprietary usage).   The use of SAML 2 tokens is suggested in
draft-ietf-oauth-v2-05 but one could imagine SAML 1.1, Kerberos (along
the lines of what Thomas outlines though I don't know enough about
Kerb to really comment), X.509, or whatever. Perhaps part of Lisa's
use case could be addressed by profiling a flow that defines an Access
Token being exchanged for a different Access Token?  And the initial
bootstrapping could maybe be accomplished via the Client Credentials
Flow?

On Wed, Jun 2, 2010 at 12:56 PM, Thomas Hardjono  wrote:
>
>
> Lisa,
>
>
>
> I'm also looking at the assertion flow right now
>
> and wondering if I could use it to  "swap" a
>
> Kerberos service-ticket for an OAuth Access-Token.
>
>
>
> In particular, I would like to:
>
>
>
> (1) Wrap the KRB AP_REQ message within a SAML-assertion
>
> (eg. using the existing WSS Token Profile standard),
>
>
>
> (2) Deliver it using the OAuth assertion flow to a special
>
> Kerberized-service (or IdP or OP), who then verifies
>
> the Authenticator and Service-Ticket within
>
> the AP_REQ message.
>
>
>
> (3) Obtain in return an OAuth Access-Token with
>
> the same lifetimes/expiration as defined in the original
>
> service-ticket (in the AP_REQ request).
>
>
>
> (4) Present the Access-Token to an OAuth Resource Server.
>
>
>
> (ps. Alternatively, I could use the Kerberos delegation feature
>
> but that may be more complicated).
>
>
>
>
>
> I think Section 3.10 needs more fleshing-out.
>
>
>
> /thomas/
>
>
>
>
>
> __
>
>
>
> From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of
> Lisa Dusseault
> Sent: Wednesday, June 02, 2010 1:33 PM
> To: oauth
> Subject: [OAUTH-WG] Assertion flow and token bootstrapping
>
>
>
> I've been trying to understand the use case for the assertion flow
> (http://tools.ietf.org/html/draft-ietf-oauth-v2-05#section-3.10) .
> Conversely, I have a use case for bootstrapping, and I'm trying to
> understand if the assertion flow is the right flow for that use case.
>
> The bootstrapping use case I have in mind is to allow a client to interact
> with a related set of services by bootstrapping from client secret to an
> access token, and then from that access token to other access tokens.  For
> example, in a "login" interaction the client would get a generic access
> token.  Later, to use various services -- access to personal data, access to
> friends' data, attempts to do uploads -- the client would ask the security
> token server for access to new resources by URI, and if access was granted,
> receive new access tokens which could be used on those services.  The client
> secret is not reused very often, and policy is centralized.
>
> This seems similar to other use cases being discussed and so it's possible
> my main point of confusion is trying to tie this to the assertion flow
> instead of something else.
>
> The assertion flow has the right number of parties involved, and it could
> certainly be hacked/extended to do bootstrapping: instead of the client
> secret, the general session access token could be used, and the "assertion"
> field can contain anything including the URI of the service that the client
> no

Re: [OAUTH-WG] Assertion flow and token bootstrapping

2010-06-03 Thread Torsten Lodderstedt
If I understand you correct, then you could utilize the assertion flow 
as follows:


Put the generic token into the assertion parameter, set the scopes 
parameter to the scope(s) of the service your client wants to interact 
with and use the client credentials as described. If the AS supports 
such a token swap, then it should respond with a new access token 
applicable for the target services. Pre-Requisite: The original token 
must have been authorized for the target service (scope). How do you 
want to achieve that? Which flow do you want to obtain the first access 
token?


Alternatively, your client could also obtain all tokens required to 
access the target services in the initial authorization flow. Please 
take a look on the thread about multiple access tokens from one 
authorization flow 
(http://www.ietf.org/mail-archive/web/oauth/current/msg02688.html).


regards,
Torsten.

Am 02.06.2010 19:32, schrieb Lisa Dusseault:


I've been trying to understand the use case for the assertion flow 
(http://tools.ietf.org/html/draft-ietf-oauth-v2-05#section-3.10) .  
Conversely, I have a use case for bootstrapping, and I'm trying to 
understand if the assertion flow is the right flow for that use case.


The bootstrapping use case I have in mind is to allow a client to 
interact with a related set of services by bootstrapping from client 
secret to an access token, and then from that access token to other 
access tokens.  For example, in a "login" interaction the client would 
get a generic access token.  Later, to use various services -- access 
to personal data, access to friends' data, attempts to do uploads -- 
the client would ask the security token server for access to new 
resources by URI, and if access was granted, receive new access tokens 
which could be used on those services.  The client secret is not 
reused very often, and policy is centralized.


This seems similar to other use cases being discussed and so it's 
possible my main point of confusion is trying to tie this to the 
assertion flow instead of something else.


The assertion flow has the right number of parties involved, and it 
could certainly be hacked/extended to do bootstrapping: instead of the 
client secret, the general session access token could be used, and the 
"assertion" field can contain anything including the URI of the 
service that the client now wants.  However I wondered if something 
less generic could make this more interoperable.


Any thoughts?

Thanks,
Lisa


___
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth
   
___
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth


Re: [OAUTH-WG] Assertion flow and token bootstrapping

2010-06-02 Thread Dick Hardt
The Assertion Flow is for the AS to act as an STS where one token is
exchanged for another. This allows the PR to not have to worry about
different kinds of tokens and to only deal with tokens issued by an AS.

Lisa: a real world example of your use case would make it easier for how you
got to the requirements you stated (ie. I am confused :)

-- Dick

On Wed, Jun 2, 2010 at 8:09 PM, Brian Campbell
wrote:

> I'm still a newbie here so someone please correct me if I'm wrong, but
> I believe the Assertion Flow was intentionally left generic to serve
> as an extension point for profiling more specific types of
> assertions/tokens being exchanged for OAuth Access Tokens (or allowing
> for proprietary usage).   The use of SAML 2 tokens is suggested in
> draft-ietf-oauth-v2-05 but one could imagine SAML 1.1, Kerberos (along
> the lines of what Thomas outlines though I don't know enough about
> Kerb to really comment), X.509, or whatever. Perhaps part of Lisa's
> use case could be addressed by profiling a flow that defines an Access
> Token being exchanged for a different Access Token?  And the initial
> bootstrapping could maybe be accomplished via the Client Credentials
> Flow?
>
> On Wed, Jun 2, 2010 at 12:56 PM, Thomas Hardjono  wrote:
> >
> >
> > Lisa,
> >
> >
> >
> > I’m also looking at the assertion flow right now
> >
> > and wondering if I could use it to  “swap” a
> >
> > Kerberos service-ticket for an OAuth Access-Token.
> >
> >
> >
> > In particular, I would like to:
> >
> >
> >
> > (1) Wrap the KRB AP_REQ message within a SAML-assertion
> >
> > (eg. using the existing WSS Token Profile standard),
> >
> >
> >
> > (2) Deliver it using the OAuth assertion flow to a special
> >
> > Kerberized-service (or IdP or OP), who then verifies
> >
> > the Authenticator and Service-Ticket within
> >
> > the AP_REQ message.
> >
> >
> >
> > (3) Obtain in return an OAuth Access-Token with
> >
> > the same lifetimes/expiration as defined in the original
> >
> > service-ticket (in the AP_REQ request).
> >
> >
> >
> > (4) Present the Access-Token to an OAuth Resource Server.
> >
> >
> >
> > (ps. Alternatively, I could use the Kerberos delegation feature
> >
> > but that may be more complicated).
> >
> >
> >
> >
> >
> > I think Section 3.10 needs more fleshing-out.
> >
> >
> >
> > /thomas/
> >
> >
> >
> >
> >
> > __
> >
> >
> >
> > From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf
> Of
> > Lisa Dusseault
> > Sent: Wednesday, June 02, 2010 1:33 PM
> > To: oauth
> > Subject: [OAUTH-WG] Assertion flow and token bootstrapping
> >
> >
> >
> > I've been trying to understand the use case for the assertion flow
> > (http://tools.ietf.org/html/draft-ietf-oauth-v2-05#section-3.10) .
> > Conversely, I have a use case for bootstrapping, and I'm trying to
> > understand if the assertion flow is the right flow for that use case.
> >
> > The bootstrapping use case I have in mind is to allow a client to
> interact
> > with a related set of services by bootstrapping from client secret to an
> > access token, and then from that access token to other access tokens.
> For
> > example, in a "login" interaction the client would get a generic access
> > token.  Later, to use various services -- access to personal data, access
> to
> > friends' data, attempts to do uploads -- the client would ask the
> security
> > token server for access to new resources by URI, and if access was
> granted,
> > receive new access tokens which could be used on those services.  The
> client
> > secret is not reused very often, and policy is centralized.
> >
> > This seems similar to other use cases being discussed and so it's
> possible
> > my main point of confusion is trying to tie this to the assertion flow
> > instead of something else.
> >
> > The assertion flow has the right number of parties involved, and it could
> > certainly be hacked/extended to do bootstrapping: instead of the client
> > secret, the general session access token could be used, and the
> "assertion"
> > field can contain anything including the URI of the service that the
> client
> > now wants.  However I wondered if something less generic could make this
> > more interoperable.
> >
> > Any thoughts?
> >
> > Thanks,
> > Lisa
> >
> > ___
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
> >
> >
> ___
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
___
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth


Re: [OAUTH-WG] Assertion flow and token bootstrapping

2010-06-02 Thread Brian Campbell
I'm still a newbie here so someone please correct me if I'm wrong, but
I believe the Assertion Flow was intentionally left generic to serve
as an extension point for profiling more specific types of
assertions/tokens being exchanged for OAuth Access Tokens (or allowing
for proprietary usage).   The use of SAML 2 tokens is suggested in
draft-ietf-oauth-v2-05 but one could imagine SAML 1.1, Kerberos (along
the lines of what Thomas outlines though I don't know enough about
Kerb to really comment), X.509, or whatever. Perhaps part of Lisa's
use case could be addressed by profiling a flow that defines an Access
Token being exchanged for a different Access Token?  And the initial
bootstrapping could maybe be accomplished via the Client Credentials
Flow?

On Wed, Jun 2, 2010 at 12:56 PM, Thomas Hardjono  wrote:
>
>
> Lisa,
>
>
>
> I’m also looking at the assertion flow right now
>
> and wondering if I could use it to  “swap” a
>
> Kerberos service-ticket for an OAuth Access-Token.
>
>
>
> In particular, I would like to:
>
>
>
> (1) Wrap the KRB AP_REQ message within a SAML-assertion
>
> (eg. using the existing WSS Token Profile standard),
>
>
>
> (2) Deliver it using the OAuth assertion flow to a special
>
> Kerberized-service (or IdP or OP), who then verifies
>
> the Authenticator and Service-Ticket within
>
> the AP_REQ message.
>
>
>
> (3) Obtain in return an OAuth Access-Token with
>
> the same lifetimes/expiration as defined in the original
>
> service-ticket (in the AP_REQ request).
>
>
>
> (4) Present the Access-Token to an OAuth Resource Server.
>
>
>
> (ps. Alternatively, I could use the Kerberos delegation feature
>
> but that may be more complicated).
>
>
>
>
>
> I think Section 3.10 needs more fleshing-out.
>
>
>
> /thomas/
>
>
>
>
>
> __
>
>
>
> From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of
> Lisa Dusseault
> Sent: Wednesday, June 02, 2010 1:33 PM
> To: oauth
> Subject: [OAUTH-WG] Assertion flow and token bootstrapping
>
>
>
> I've been trying to understand the use case for the assertion flow
> (http://tools.ietf.org/html/draft-ietf-oauth-v2-05#section-3.10) .
> Conversely, I have a use case for bootstrapping, and I'm trying to
> understand if the assertion flow is the right flow for that use case.
>
> The bootstrapping use case I have in mind is to allow a client to interact
> with a related set of services by bootstrapping from client secret to an
> access token, and then from that access token to other access tokens.  For
> example, in a "login" interaction the client would get a generic access
> token.  Later, to use various services -- access to personal data, access to
> friends' data, attempts to do uploads -- the client would ask the security
> token server for access to new resources by URI, and if access was granted,
> receive new access tokens which could be used on those services.  The client
> secret is not reused very often, and policy is centralized.
>
> This seems similar to other use cases being discussed and so it's possible
> my main point of confusion is trying to tie this to the assertion flow
> instead of something else.
>
> The assertion flow has the right number of parties involved, and it could
> certainly be hacked/extended to do bootstrapping: instead of the client
> secret, the general session access token could be used, and the "assertion"
> field can contain anything including the URI of the service that the client
> now wants.  However I wondered if something less generic could make this
> more interoperable.
>
> Any thoughts?
>
> Thanks,
> Lisa
>
> ___
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>
___
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth


Re: [OAUTH-WG] Assertion flow and token bootstrapping

2010-06-02 Thread Thomas Hardjono

Lisa,

I'm also looking at the assertion flow right now
and wondering if I could use it to  "swap" a
Kerberos service-ticket for an OAuth Access-Token.

In particular, I would like to:

(1) Wrap the KRB AP_REQ message within a SAML-assertion
(eg. using the existing WSS Token Profile standard),

(2) Deliver it using the OAuth assertion flow to a special
Kerberized-service (or IdP or OP), who then verifies
the Authenticator and Service-Ticket within
the AP_REQ message.

(3) Obtain in return an OAuth Access-Token with
the same lifetimes/expiration as defined in the original
service-ticket (in the AP_REQ request).

(4) Present the Access-Token to an OAuth Resource Server.

(ps. Alternatively, I could use the Kerberos delegation feature
but that may be more complicated).


I think Section 3.10 needs more fleshing-out.

/thomas/


__

From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of Lisa 
Dusseault
Sent: Wednesday, June 02, 2010 1:33 PM
To: oauth
Subject: [OAUTH-WG] Assertion flow and token bootstrapping


I've been trying to understand the use case for the assertion flow 
(http://tools.ietf.org/html/draft-ietf-oauth-v2-05#section-3.10) .  Conversely, 
I have a use case for bootstrapping, and I'm trying to understand if the 
assertion flow is the right flow for that use case.

The bootstrapping use case I have in mind is to allow a client to interact with 
a related set of services by bootstrapping from client secret to an access 
token, and then from that access token to other access tokens.  For example, in 
a "login" interaction the client would get a generic access token.  Later, to 
use various services -- access to personal data, access to friends' data, 
attempts to do uploads -- the client would ask the security token server for 
access to new resources by URI, and if access was granted, receive new access 
tokens which could be used on those services.  The client secret is not reused 
very often, and policy is centralized.

This seems similar to other use cases being discussed and so it's possible my 
main point of confusion is trying to tie this to the assertion flow instead of 
something else.

The assertion flow has the right number of parties involved, and it could 
certainly be hacked/extended to do bootstrapping: instead of the client secret, 
the general session access token could be used, and the "assertion" field can 
contain anything including the URI of the service that the client now wants.  
However I wondered if something less generic could make this more interoperable.

Any thoughts?

Thanks,
Lisa
___
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth