2 questions?
1. Would there be a conference line one could dial into remotely? (I'm in
New York City)
2. Is this open to implementors of the spec in addition to it's authors?
(I'm currently implementing draft 15 as developer @ meetup.com)
-Doug Tangren
http://lessis.me
Yes and yes. Just please add (remote) to your name on the wiki page.
On Wed, May 11, 2011 at 8:38 AM, Doug Tangren d.tang...@gmail.com wrote:
2 questions?
1. Would there be a conference line one could dial into remotely? (I'm in
New York City)
2. Is this open to implementors of the spec in
This is an official interim working group meeting which goes by all the normal
IETF rules of such meetings and is open for all.
EHL
From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of Doug
Tangren
Sent: Tuesday, May 10, 2011 11:38 PM
To: Barry Leiba
Cc: OAuth WG
Subject:
On 09.05.2011 18:49, Eran Hammer-Lahav wrote:
...
The OAuth WG is seeking guidance on the following questions:
1. Should the WG define a general purpose method for returning errors with a
401 WWW-Authenticate headers, including a cross-scheme error code registry?
...
Not sure. Are there
Doug says...
2. Is this open to implementors of the spec in addition to it's authors?
(I'm currently implementing draft 15 as developer @ meetup.com)
Eran says...
This is an official interim working group meeting which goes by all the
normal IETF rules of such meetings and is open for all.
Thanks guys. Added my name to the list.
-Doug Tangren
http://lessis.me
___
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth
A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Open Authentication Protocol Working Group of
the IETF.
Title : HTTP Authentication: MAC Access Authentication
Author(s) : E. Hammer-Lahav, et al.
On Tue, May 10, 2011 at 4:43 PM, Lodderstedt, Torsten
t.lodderst...@telekom.de wrote:
Hi Marius,
wrt auto-approval: how is the authorization server supposed to validated
the client's identity in a reliable way? Otherwise another application (using
the id of the legitimate client) could
On Tue, May 10, 2011 at 4:43 PM, Lodderstedt, Torsten
t.lodderst...@telekom.de wrote:
Hi Marius,
wrt auto-approval: how is the authorization server supposed to validated
the client's identity in a reliable way? Otherwise another application
(using the id of the legitimate client) could
Breno did a review of the security draft.
Thanks a lot!
Begin forwarded message:
From: Breno de Medeiros br...@google.com
Date: May 7, 2011 4:25:53 AM GMT+03:00
To: Hannes Tschofenig hannes.tschofe...@gmx.net
Subject: Re: OAuth Security Consideration Text
Hi Hannes,
I have gone through
How shall the authorization server ensure that the calling client is a
user-agent based app (i.e. a native app could impersonate an user-agent based
app)?
In my opinion, enforcing explicit user consent is the only way to prevent this
kind of attack.
regards,
Torsten.
-Ursprüngliche
On Wed, May 11, 2011 at 11:44 AM, Lodderstedt, Torsten
t.lodderst...@telekom.de wrote:
How shall the authorization server ensure that the calling client is a
user-agent based app (i.e. a native app could impersonate an user-agent
based app)?
In my opinion, enforcing explicit user consent is
On Wed, May 11, 2011 at 11:44 AM, Lodderstedt, Torsten
t.lodderst...@telekom.de wrote:
How shall the authorization server ensure that the calling client is a
user-agent based app (i.e. a native app could impersonate an user-agent based
app)?
Through registration and redirect URI validation.
On Wed, May 11, 2011 at 3:26 PM, Lodderstedt, Torsten
t.lodderst...@telekom.de wrote:
Through registration and redirect URI validation. A native app does
not have to impersonate, they can just register a user-agent client.
Everything boils down to the user trusting the app. As Breno
My .02 -
On 10/05/2011, at 2:49 AM, Eran Hammer-Lahav wrote:
The OAuth working group has defined an authorization protocol [1] for
delegating access to protected resources. Once access has been authorized,
the client is issued a set of token credentials which are uses to make
Hi Breno,
thanks for the feedback. Please find my comments inline.
Now higher level comments:
On Native Apps protection of refresh token:
On section Definitions, there is a sentence in the Native Apps It is
assumed that such applications can protect dynamically issued
secrets,
This may have come up before so I'm sorry if I'm repeating. Why does bearer
token spec introduce a new name for oauth2 access tokens [1],
bearer_token, and before that [2], oauth_token?
I apologize if this may sound shallow but, why introduce a new parameter
name verses sticking with what the
The name needs to be unique enough not to conflict with likely parameters
already used by providers. I don’t have an opinion which name is better, just
that it was oauth_token before and when we changed the scheme name to Bearer,
changed it too.
EHL
From: oauth-boun...@ietf.org
On Wed, May 11, 2011 at 7:23 PM, Lodderstedt, Torsten
t.lodderst...@telekom.de wrote:
Hi Breno,
thanks for the feedback. Please find my comments inline.
Now higher level comments:
On Native Apps protection of refresh token:
On section Definitions, there is a sentence in the
19 matches
Mail list logo