Re: [OAUTH-WG] review comments on draft-ietf-oauth-dyn-reg-11.txt

2013-05-30 Thread Richer, Justin P.
I don't understand any of the comments below -- it already *is* an OAuth2 protected resource without any special handling. Your access tokens can be short-lived, long-lived, federated, structured, random blobs ... totally doesn't matter. They are access tokens being used to access a normal prote

Re: [OAUTH-WG] review comments on draft-ietf-oauth-dyn-reg-11.txt

2013-05-30 Thread Phil Hunt
Phil On 2013-05-30, at 16:11, "Richer, Justin P." wrote: > Comments inline, marked by [JR]. > > From: Phil Hunt [phil.h...@oracle.com] > Sent: Thursday, May 30, 2013 5:25 PM > To: Richer, Justin P. > Cc: John Bradley; oauth@ietf.org WG > Subject: Re: [OAUTH-WG] review comments on draft-ietf-o

[OAUTH-WG] (no subject)

2013-05-30 Thread Maik Mahn
___ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth

Re: [OAUTH-WG] review comments on draft-ietf-oauth-dyn-reg-11.txt

2013-05-30 Thread Phil Hunt
Justin, So far, every time an OAuth server has accepted a 3rd party token it has been a bearer assertion. The common pattern is to exchange that assertion for a an access token issued by the local server for the local resource endpoint. That's the pattern I am trying to follow. Going this way

Re: [OAUTH-WG] review comments on draft-ietf-oauth-dyn-reg-11.txt

2013-05-30 Thread Justin Richer
I don't understand which access token is being talked about here -- is this the Initial Registration Token? Because you can already do everything below. How you get the Initial Registration token is out of scope precisely so that the AS can decide what that means. We can add language in the lif

Re: [OAUTH-WG] review comments on draft-ietf-oauth-dyn-reg-11.txt

2013-05-30 Thread Phil Hunt
For this, I would suggest: Anonymous, user assisted registration - client registers using the client credential flow but may use an administrator (in the case of web app) or end-user (uid/password) . Since resource owner would still require separate credential, then the client flow could be us

Re: [OAUTH-WG] review comments on draft-ietf-oauth-dyn-reg-11.txt

2013-05-30 Thread Justin Richer
But this still doesn't address clients who don't have a client_secret. Do they now need one in order to talk to the registration endpoint? What you're suggesting is that a client use one set of credentials to get access tokens and another set of credentials to get registrations. This is certain

Re: [OAUTH-WG] review comments on draft-ietf-oauth-dyn-reg-11.txt

2013-05-30 Thread Phil Hunt
It's hard to say what the best solution here is regarding clarifications until we get clarity on the issue of registration access token. I don't think using a client credential flow to obtain an access token to the registration endpoint is complex. It's the normal flow. I concede that you are

Re: [OAUTH-WG] review comments on draft-ietf-oauth-dyn-reg-11.txt

2013-05-30 Thread Justin Richer
Thanks for clearing up where the confusion was taking place. I had tried to make it clear that these were absolutely standard, opaque OAuth2 bearer tokens and absolutely standard OAuth2-protected endpoints, but if that's not clear that needs to be updated. This is what the text says right now:

Re: [OAUTH-WG] review comments on draft-ietf-oauth-dyn-reg-11.txt

2013-05-30 Thread Phil Hunt
I see what is happening. I think the reason why I find this spec sooo confusing is that the terms imply new token types when they don't. For example when you say "Registration Access Token" and "Initial Access Token" it implies to me that it is a totally new token type (and in one case it sorta

Re: [OAUTH-WG] review comments on draft-ietf-oauth-dyn-reg-11.txt

2013-05-30 Thread Phil Hunt
The issue is that it has different issuing/lifecycle than normal. E.g. Why is it issued by the registration endpoint? Why doesn't the client just request an access token using its client credential for the registration endpoint when it wants to update its profile? Phil @independentid www.indep

Re: [OAUTH-WG] review comments on draft-ietf-oauth-dyn-reg-11.txt

2013-05-30 Thread Justin Richer
What I don't understand is that the existing structure also allows for exactly that same use case. The difference is where the information is carried. But since we're not locking down where or how that information is specified, your application use case can do it how it makes sense. I fully ag

Re: [OAUTH-WG] review comments on draft-ietf-oauth-dyn-reg-11.txt

2013-05-30 Thread John Bradley
The reg access token is a OAuth bearer token that is issued as part of the registration response and used to access the new client resource for reads and or updates depending on the permissions. They are both oauth access tokens. On 2013-05-30, at 12:02 PM, Phil Hunt wrote: > Seriously. The n

Re: [OAUTH-WG] review comments on draft-ietf-oauth-dyn-reg-11.txt

2013-05-30 Thread Phil Hunt
Justin, You are right, 6750 does not define "local" or "3rd party". But the use cases we are talking about are clearly very very different. You are blurring the distinction between access tokens and bearer assertions such as defined by draft-ietf-oauth-saml2-bearer and draft-ietf-oauth-jwt-bea

Re: [OAUTH-WG] review comments on draft-ietf-oauth-dyn-reg-11.txt

2013-05-30 Thread Justin Richer
But OAuth says nothing about whether tokens are "local" or "3rd party", and this spec inherits that definition. The AS is free to do whatever it wants with the token. You can already do both scenarios that you're talking about below with the existing functionality (in a way that makes sense), s

Re: [OAUTH-WG] review comments on draft-ietf-oauth-dyn-reg-11.txt

2013-05-30 Thread Phil Hunt
In 1.4.1 - I'm ok with this use of having the AS token endpoint issue an access token to an anonymous client to begin the registration process (just not sure the value of it). I'm not ok with what is happening in 1.4.2 (Protected Registration). I think we should make it clear that it is for P

Re: [OAUTH-WG] review comments on draft-ietf-oauth-dyn-reg-11.txt

2013-05-30 Thread Justin Richer
These were not introduced in the new draft, they were just explained better. The Client Registration Endpoint has been (optionally) OAuth protected all along. The Initial Registration Token is an authorization token (not authentication) used to access that protected resource. The Client Conf

Re: [OAUTH-WG] review comments on draft-ietf-oauth-dyn-reg-11.txt

2013-05-30 Thread John Bradley
The initial access token is a OAuth bearer Access token (Authz). Like any bearer token it can be structured or not. Your concern is I think around some work BB+ has done to profile a structured token for this particular RS use. That is out of scope for the core of dynamic registration, as i

Re: [OAUTH-WG] review comments on draft-ietf-oauth-dyn-reg-11.txt

2013-05-30 Thread Phil Hunt
Seriously. The new dyn reg draft introduces two new tokens. The initial reg token and the registration access token. As for the latter, the reg access token, my understanding is it has nothing to do with an access token. It is issued *after* registration to allow reg updates. Right? I know so

Re: [OAUTH-WG] review comments on draft-ietf-oauth-dyn-reg-11.txt

2013-05-30 Thread George Fletcher
I still "argue" that the initial client access token (not assertion) is really just an authorization token for the endpoint (like any other OAuth2 protected resource). There is nothing within OAuth2 that precludes a system using structured authorization tokens that contain claims and using that

Re: [OAUTH-WG] review comments on draft-ietf-oauth-dyn-reg-11.txt

2013-05-30 Thread Phil Hunt
No different issue. I was concerned about the initial client assertion being passed in as authen cred. It is a signed set of client reg metadata. See we are confused. Hence my worry. :-) Phil On 2013-05-30, at 8:48, John Bradley wrote: > I think Phil also had some processing reason why a Tok

Re: [OAUTH-WG] review comments on draft-ietf-oauth-dyn-reg-11.txt

2013-05-30 Thread John Bradley
I think Phil also had some processing reason why a Token endpoint or RS wouldn't want to tale the authentication as a header, as the processing was easier with them as parameters as they are potentially available to different parts of the stack. That may have been mostly around RS, but the pri

Re: [OAUTH-WG] review comments on draft-ietf-oauth-dyn-reg-11.txt

2013-05-30 Thread Richer, Justin P.
On May 30, 2013, at 11:18 AM, Torsten Lodderstedt wrote: > Hi Justin, > > see below :-) > > Justin Richer schrieb: > >> Torsten, thanks -- responses inline. >> >> On 05/30/2013 06:34 AM, Torsten Lodderstedt wrote: >>> Hi Justin, >>> >>> comments inline. >>> > > section 1.4 >

Re: [OAUTH-WG] review comments on draft-ietf-oauth-dyn-reg-11.txt

2013-05-30 Thread Justin Richer
Torsten, thanks -- responses inline. On 05/30/2013 06:34 AM, Torsten Lodderstedt wrote: Hi Justin, comments inline. section 1.4 How is the client supposed to identify/distinguish authorization servers? Based on the Client Registration Endpoint URI? Authorization server identification is n

Re: [OAUTH-WG] review comments on draft-ietf-oauth-dyn-reg-11.txt

2013-05-30 Thread Torsten Lodderstedt
Hi Justin, comments inline. section 1.4 How is the client supposed to identify/distinguish authorization servers? Based on the Client Registration Endpoint URI? Authorization server identification is necessary in order to map client_ids to authorization servers for clients, which are conne