Re: [OAUTH-WG] OAuth 2.0 Bearer Token Specification draft -06

2011-07-10 Thread Ian McKellar
Hi, I'm reading through draft 6 of the bearer token spec and had a question about one of the examples. In section 2.4 there's an error response example when an expired token is used: HTTP/1.1 401 Unauthorized WWW-Authenticate: Bearer realm="example" error="invalid_token"

Re: [OAUTH-WG] state parameter and XSRF detection

2011-07-10 Thread Eran Hammer-Lahav
> -Original Message- > From: Torsten Lodderstedt [mailto:tors...@lodderstedt.net] > Sent: Sunday, July 10, 2011 2:17 AM > Eran Hammer-Lahav schrieb: > > >The security of the protocol relies fully (implicit grant) or partially > >(authorization code) on the validation of the redirection

Re: [OAUTH-WG] Refresh token security considerations

2011-07-10 Thread William J. Mills
I agree that this is something you could do, but it doesn't seem like a good design pattern. From: Torsten Lodderstedt To: Eran Hammer-Lahav ; OAuth WG Sent: Sunday, July 10, 2011 1:21 AM Subject: Re: [OAUTH-WG] Refresh token security considerations replaceme

Re: [OAUTH-WG] SAML Assertion Draft Items [Item 1: client auth]

2011-07-10 Thread Brian Campbell
Not before the submission deadline tomorrow. Probably sometime before submissions reopen. On Sat, Jul 9, 2011 at 9:04 AM, Eran Hammer-Lahav wrote: > Sounds reasonable. Can you provide a schedule outline? > > EHL > >> -Original Message- >> From: Brian Campbell [mailto:bcampb...@pingidenti

Re: [OAUTH-WG] state parameter and XSRF detection

2011-07-10 Thread Torsten Lodderstedt
Eran Hammer-Lahav schrieb: >The security of the protocol relies fully (implicit grant) or partially >(authorization code) on the validation of the redirection URI. This was >well understood by many experts but until -17, we largely ignored by >the specification. what does "security of the pr

Re: [OAUTH-WG] Section 10.1 (Client authentication)

2011-07-10 Thread Torsten Lodderstedt
Hi, I just remembered the original aim of the text. We not just intended to list alternative means but to get a general message across: If you cannot authenticate a client considers this in your security design! Either (1) you accept the fact the respective identities can be forged and handle t

Re: [OAUTH-WG] Refresh token security considerations

2011-07-10 Thread Torsten Lodderstedt
replacement of the refresh token with every access token refresh is an example. The authz server creates and returns a new refresh token value with every access token refreshment. The old value is invalidated and must not be used any further. Note: The authz server keeps track of all old (invali