[OAUTH-WG] Definition of additional client profiles

2014-10-02 Thread Lewis Adam-CAL022
Hi, 6749 defines three client profiles which are mapped to either confidential or public client types. Have any new client profiles since been defined? And is there a process or place to put those additional profiles? For example I'm thinking about additional confidential client types, maybe

[OAUTH-WG] HOTK/POP/etc drafts

2014-04-24 Thread Lewis Adam-CAL022
Hi, Lots of crypto drafts on OAuth popping up that I need to come up to speed on. draft-bradley-oauth-pop-key-distribution-00http://datatracker.ietf.org/doc/draft-bradley-oauth-pop-key-distribution/

[OAUTH-WG] OAuth Enteprise federation ... 5 years from now

2014-03-27 Thread Lewis Adam-CAL022
I am curious it ping the thoughts of others on the list of how OAuth is going to continue to mature, especially with respect to enterprise federation scenarios. This is something that I spend a whole lot of time thinking about. Specifically, consider the following use case: An end user in

Re: [OAUTH-WG] OAuth Enteprise federation ... 5 years from now

2014-03-27 Thread Lewis Adam-CAL022
, March 27, 2014 9:07 AM To: Lewis Adam-CAL022 Cc: oauth@ietf.org Subject: Re: [OAUTH-WG] OAuth Enteprise federation ... 5 years from now Hi Adam, 3 is the most common today. In the Salesforce case it has the additional benefit that when Domain 1 is federating to SalesForce via OpenID Connect

Re: [OAUTH-WG] OAuth Enteprise federation ... 5 years from now

2014-03-27 Thread Lewis Adam-CAL022
it? Looking for actual examples in the wild to point to. adam From: John Bradley [mailto:ve7...@ve7jtb.com] Sent: Thursday, March 27, 2014 1:07 PM To: Lewis Adam-CAL022 Cc: oauth@ietf.org Subject: Re: [OAUTH-WG] OAuth Enteprise federation ... 5 years from now Handing out a id_token with a 3rd party

Re: [OAUTH-WG] OAuth Enteprise federation ... 5 years from now

2014-03-27 Thread Lewis Adam-CAL022
… adam From: Tim Bray [mailto:tb...@textuality.com] Sent: Thursday, March 27, 2014 4:48 PM To: John Bradley Cc: Lewis Adam-CAL022; oauth@ietf.org Subject: Re: [OAUTH-WG] OAuth Enteprise federation ... 5 years from now I can’t give names or numbers but yeah, it’s happening. Especially for Android

Re: [OAUTH-WG] Conference Call Agenda

2014-01-28 Thread Lewis Adam-CAL022
Hi Hannes, you (or others on the list) might be interested to know that we prototyped the draft version of HOTK, for what it's worth. adam -Original Message- From: OAuth [mailto:oauth-boun...@ietf.org] On Behalf Of Hannes Tschofenig Sent: Tuesday, January 28, 2014 7:56 AM To:

Re: [OAUTH-WG] Scopes in access token response

2013-12-04 Thread Lewis Adam-CAL022
To: Lewis Adam-CAL022; Thomas Broyer; Andreas Kohn Cc: oauth@ietf.org Subject: Re: [OAUTH-WG] Scopes in access token response Actually, section 5.1 is quite specifically how it's returned, and the intent of the cross-reference to 3.3 is that they use the same format: a space-separated list presented

Re: [OAUTH-WG] Device profile usage

2013-05-29 Thread Lewis Adam-CAL022
Hi Vincent … it sounds to me like you should be looking at the code flow. It is optimized for the use case you describe (or at least as I understand it). A native application which uses an installed web browser to interact with the AS and obtain a token for your client. Using this flow, your

Re: [OAUTH-WG] Proposed Syntax Changes in Dynamic Registration

2013-05-23 Thread Lewis Adam-CAL022
For what it's worth, I am in favor of making the changes to (1) and (2) and leaving (3) unchanged. (1) and (2) are definitely confusing to me, as I would normally have associated the issued and expiration times to the token. (3) is obvious as it stands, and as other have mentioned, only

[OAUTH-WG] Question/comments on draft-ietf-oauth-revocation-09

2013-05-23 Thread Lewis Adam-CAL022
Hi, Section 2.2 (Revocation Response) of draft-ietf-oauth-revocation-09 states: The authorization server responds with HTTP status code 200 if the token has been revoked sucessfully or if the client submitted an invalid token. The content of the response body does not matter as all

Re: [OAUTH-WG] Recap of two well known OAuth related attacks

2013-05-17 Thread Lewis Adam-CAL022
One wonders that - if in hindsight - the implicit flow was a mistake to include in the framework. Yes it saves a single round trip for use cases where the tokens are exposed to the UA, but it's not clear that optimization is worth the security headaches that are going to be caused down the

Re: [OAUTH-WG] JWT grant_type and client_id

2013-03-16 Thread Lewis Adam-CAL022
might be inclined to use it. adam From: Mike Jones [mailto:michael.jo...@microsoft.com] Sent: Saturday, March 16, 2013 12:17 PM To: Phil Hunt Cc: Brian Campbell; Lewis Adam-CAL022; oauth@ietf.org Subject: RE: [OAUTH-WG] JWT grant_type and client_id I agree that it’s likely a claim that would

Re: [OAUTH-WG] JWT grant_type and client_id

2013-03-15 Thread Lewis Adam-CAL022
@ietf.org Subject: Re: [OAUTH-WG] JWT grant_type and client_id Hi On 15/03/13 20:40, Lewis Adam-CAL022 wrote: Hi John, I would like to argue that the scope should be a parameter in the access token request message, the same as it is for the RO creds grant and client creds grant type. This would keep

Re: [OAUTH-WG] JWT grant_type and client_id

2013-03-15 Thread Lewis Adam-CAL022
profiles as a self-contained doc. adam From: Brian Campbell [mailto:bcampb...@pingidentity.com] Sent: Friday, March 15, 2013 5:13 PM To: Lewis Adam-CAL022 Cc: Sergey Beryozkin; oauth@ietf.org Subject: Re: [OAUTH-WG] JWT grant_type and client_id So currently the base assertion document defines

Re: [OAUTH-WG] JWT grant_type and client_id

2013-03-15 Thread Lewis Adam-CAL022
. If not, then it will be JSON+encryption+signing, just not a JWT :) adam From: Brian Campbell [mailto:bcampb...@pingidentity.com] Sent: Friday, March 15, 2013 5:16 PM To: Lewis Adam-CAL022 Cc: Sergey Beryozkin; oauth@ietf.org Subject: Re: [OAUTH-WG] JWT grant_type and client_id Codifying

Re: [OAUTH-WG] JWT grant_type and client_id

2013-03-14 Thread Lewis Adam-CAL022
and the assertion. Is this correct? From: Mike Jones [mailto:michael.jo...@microsoft.com] Sent: Monday, February 18, 2013 6:58 PM To: Lewis Adam-CAL022; oauth@ietf.org WG Subject: RE: JWT grant_type and client_id The client_id value and the access token value are independent

Re: [OAUTH-WG] JWT grant_type and client_id

2013-03-14 Thread Lewis Adam-CAL022
PM To: Lewis Adam-CAL022 Cc: Mike Jones; WG oauth@ietf.org@il06exr02.mot.com Subject: Re: [OAUTH-WG] JWT grant_type and client_id Yes, that is correct. I'm working on new revisions of the drafts that will hopefully make that point more clear. On Thu, Mar 14, 2013 at 5:26 PM, Lewis Adam-CAL022

Re: [OAUTH-WG] JWT - scope claim missing

2013-03-11 Thread Lewis Adam-CAL022
qualified scope, but it just seems that claims, scopes, and audiences are each unique and should be kept that way. adam From: Phil Hunt [mailto:phil.h...@oracle.com] Sent: Monday, March 11, 2013 9:25 AM To: Nat Sakimura Cc: Lewis Adam-CAL022; oauth@ietf.org WG Subject: Re: [OAUTH-WG] JWT - scope claim

Re: [OAUTH-WG] JWT - scope claim missing

2013-02-28 Thread Lewis Adam-CAL022
Adding my 2 cents ... I am looking to use JWT as the structure for my access tokens, and will likely profile it to look just like an id_token, plus the scope claim which triggered this thread :-) I am also looking at JWT as a grant type. I am also looking into federating my access tokens (one

[OAUTH-WG] JWT grant_type and client_id

2013-02-18 Thread Lewis Adam-CAL022
Is there any guidance on the usage of client_id when using the JWT assertion profile as a grant type? draft-ietf-oauth-jwt-bearer-04 makes no mention so I assume that it is not required ... but it would be necessary if using in conjunction with a HOK profile where the JWT assertion is issued

Re: [OAUTH-WG] Why OAuth it self is not an authentication framework ?

2013-02-06 Thread Lewis Adam-CAL022
[mailto:wmills_92...@yahoo.com] Sent: Tuesday, February 05, 2013 6:49 PM To: Lewis Adam-CAL022; Tim Bray Cc: WG oauth@ietf.org@il06exr02.mot.com Subject: Re: [OAUTH-WG] Why OAuth it self is not an authentication framework ? Why use OAuth when OpenID does everything that OAuth can do as an authentication method

Re: [OAUTH-WG] Why OAuth it self is not an authentication framework ?

2013-02-05 Thread Lewis Adam-CAL022
I think this is becoming a largely academic / philosophical argument by this time. The people who designed OAuth will likely point out that it was conceptualized as an authorization protocol to enable a RO to delegate access to a client to access its protected resources on some RS. And of

Re: [OAUTH-WG] I'm concerned about how the sniffability of oauth2 requests

2013-02-04 Thread Lewis Adam-CAL022
Speaking of ... what is the status of the HOK work? The last draft has expired and its fallen off of the OAuth page now. -Original Message- From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of Sergey Beryozkin Sent: Monday, February 04, 2013 10:58 AM To:

Re: [OAUTH-WG] Using structured access_token as grant type in assertion flow

2012-12-17 Thread Lewis Adam-CAL022
the TGS on-demand. I think this is totally within the realm of reason. We will likely prototype this idea very early next year (Jan/Feb). -adam From: Brian Campbell [mailto:bcampb...@pingidentity.com] Sent: Friday, December 14, 2012 3:14 PM To: Lewis Adam-CAL022 Cc: oauth@ietf.org Subject: Re

[OAUTH-WG] Using structured access_token as grant type in assertion flow

2012-12-10 Thread Lewis Adam-CAL022
Hi, I continue to have an interest in the OAuth assertion profiles for my use cases. I'm wondering if the idea of performing a first OAuth dance which returns to the client a structured JWT access token (with scope=AS for example) could then be used as the JWT in an assertion grant type? So

Re: [OAUTH-WG] Assertion Framework - Why does issuer have to be either the client or a third party token service?

2012-12-05 Thread Lewis Adam-CAL022
Hi Brian, This is sort of my feeling on the STS as well (theoretical). Are there any real-life examples of obtaining a JWT assertion from an STS that can be used for the assertion flow? And if so then how is it obtained? It cannot be an id_token because that is audience restricted to the

Re: [OAUTH-WG] How the client can decide it is time to use the refresh token

2012-11-27 Thread Lewis Adam-CAL022
Hi Sergey, In my use cases the client actively monitors the expiration of the AT in order to request a new AT using the RT. We do this as you suggested, because presenting an expired AT to the RS is a wasted round trip and adds latency and degrades the user experience. Why send the AT if we

Re: [OAUTH-WG] is OAuth protocol based on HTTP?

2012-11-14 Thread Lewis Adam-CAL022
Hi Guangqing, Just to build on what Justin and Hannes said, I have use cases that involve sending OAuth access tokens over MANY non-HTTP protocols including SIP, RTSP, SOAP (though you could argue that it is HTTP underneath), and other proprietary protocols. (I also have use cases for the more

Re: [OAUTH-WG] access tokens refresh tokens of different scopes

2012-11-02 Thread Lewis Adam-CAL022
it’s worthwhile. It seems at least you and Torsten agree in principle … what level of critical mass is required to get something moving? adam From: Manger, James H [mailto:james.h.man...@team.telstra.com] Sent: Wednesday, October 31, 2012 8:01 PM To: Lewis Adam-CAL022 Cc: WG oauth@ietf.org

[OAUTH-WG] access tokens refresh tokens of different scopes

2012-10-31 Thread Lewis Adam-CAL022
I have a use case where I would like to request both an access token and a refresh token, but I would like the access token to have a scope less than that of the refresh token. It is standard OAuth behavior for using the refresh token to request additional access tokens (of equal or lesser

Re: [OAUTH-WG] access tokens refresh tokens of different scopes

2012-10-31 Thread Lewis Adam-CAL022
: Wednesday, October 31, 2012 12:19 PM To: Lewis Adam-CAL022 Subject: Re: [OAUTH-WG] access tokens refresh tokens of different scopes If the latency is important, you can deal with the latency by making the first call to the RS with the original access token while you are waiting for the stricter

Re: [OAUTH-WG] access tokens refresh tokens of different scopes

2012-10-31 Thread Lewis Adam-CAL022
, October 31, 2012 3:11 PM To: Lewis Adam-CAL022 Cc: Dick Hardt; oauth@ietf.org Subject: Re: [OAUTH-WG] access tokens refresh tokens of different scopes Hi Adam Give your clarification, why not have 3 different calls to the AS so that there are separate refresh tokens for each RS? If you don't want

Re: [OAUTH-WG] access tokens refresh tokens of different scopes

2012-10-31 Thread Lewis Adam-CAL022
31, 2012 4:07 PM To: Lewis Adam-CAL022 Cc: oauth@ietf.org WG Subject: Re: [OAUTH-WG] access tokens refresh tokens of different scopes On Oct 31, 2012, at 1:29 PM, Lewis Adam-CAL022 adam.le...@motorolasolutions.commailto:adam.le...@motorolasolutions.com wrote: Hi Dick, Totally agree about

[OAUTH-WG] Best practices for AT and RT lifetime?

2012-09-07 Thread Lewis Adam-CAL022
Hi, I would like to understand if there are any current best practices around the lifetime of an OAuth access token and refresh token. The spec gives guidance of a max of 10min for a code, and section 4.2.2. gives an example of 3600sec for an access token. There is no mention of a lifetime

[OAUTH-WG] hotk and refresh tokens

2012-09-07 Thread Lewis Adam-CAL022
Hi, What are the plans for the OAuth HOTK draft with respect to refresh tokens? Section 4.3 says that a new public key can be bound to a new access token using a refresh token grant, but it would be nice if the refresh token could also use the public key such that when using the refresh token

Re: [OAUTH-WG] Is Allow / disallow screen mandatory ?

2012-08-07 Thread Lewis Adam-CAL022
Hi Jérôme, I am one of those non-consumer use cases where explicit consent is not part of our envisioned OAuth flow. The resource servers that we create and sell to our customers are owned by the customer's IT department, so when a user (employee) authenticates to the AS, it is the enterprise

Re: [OAUTH-WG] Report an authentication issue

2012-06-28 Thread Lewis Adam-CAL022
Hi Nat, Starting from a standalone use case would be good. My impression (I may be wrong) is that your requirement is to be able to (1) Log the user identifier of the person who is accessing the resource at the resource server for the audit etc. purposes. acl yes ... that *and* to authenticate

Re: [OAUTH-WG] Report an authentication issue

2012-06-28 Thread Lewis Adam-CAL022
, since everybody seems to at least agree that it can be profiled to do so. Tx! adam From: John Bradley [mailto:ve7...@ve7jtb.com] Sent: Thursday, June 28, 2012 3:48 PM To: Lewis Adam-CAL022 Cc: Nat Sakimura; oauth@ietf.org Subject: Re: [OAUTH-WG] Report an authentication issue Adam

Re: [OAUTH-WG] Report an authentication issue

2012-06-21 Thread Lewis Adam-CAL022
Hi Nat ... It could also be that RS is the PDP+PEP. Your model seem to fit this one. acl Yes, exactly! Then, you just take id_token there and PDP portion of the RS gives you the access token, which you present it to the PEP portion of the RS. acl if by you you're referring to the native

Re: [OAUTH-WG] Report an authentication issue

2012-06-20 Thread Lewis Adam-CAL022
I am entirely confused. I understand what everybody is saying for confidential clients, no problem here. I fall apart when thinking of iPhone apps. Consider the scenario where I deploy a video server, and write an iPhone app to talk to the video server. The video server is under the control

Re: [OAUTH-WG] Authorization Request via back channel / direct communication?

2012-06-09 Thread Lewis Adam-CAL022
register a handler for a browser URI thing ... but for enterprise use cases, it's a kludge. Just my 2 cents. It's free :) adam From: John Bradley [mailto:ve7...@ve7jtb.com] Sent: Friday, June 08, 2012 9:04 PM To: Lewis Adam-CAL022 Cc: oauth@ietf.org Subject: Re: [OAUTH-WG] Authorization Request

[OAUTH-WG] Implicit vs. Code flow for Native clients

2012-06-08 Thread Lewis Adam-CAL022
Hi all, I'm looking for a better understanding of why the code flow is recommended as the preferred OAuth flow, even when used for native (public) clients. I totally get why it is preferred for confidential clients, as explained in section 1.3.1. of the version 26 of the draft. The first

[OAUTH-WG] Authorization Request via back channel / direct communication?

2012-06-08 Thread Lewis Adam-CAL022
Hi, I have a historical question around front channel / back channel (direct) communications and Authorization Requests. Both the code-flow and implicit-flow utilize a front channel communication through the UA. This makes sense for the delegated credentials case (e.g. shutterfly accessing

[OAUTH-WG] Inter-domain AS/RS communication (revisited)

2012-06-01 Thread Lewis Adam-CAL022
Hi all, I've asked about the lack of standardization of the AS-RS interface in the past, but I have a new twist on my question. What is the viability of performing user authentication using OAuth with an RS in domain-1, and a whole bunch of AS's in different domains (assuming that the RS and

Re: [OAUTH-WG] Inter-domain AS/RS communication (revisited)

2012-06-01 Thread Lewis Adam-CAL022
To: Manger, James H Cc: Lewis Adam-CAL022; oauth@ietf.org Subject: Re: [OAUTH-WG] Inter-domain AS/RS communication (revisited) More specifically, OpenID Connect with the addition of reusing the access_token provided by the AS to get at other API services. This capability is explicitly encouraged

Re: [OAUTH-WG] Inter-domain AS/RS communication (revisited)

2012-06-01 Thread Lewis Adam-CAL022
. -adam From: George Fletcher [mailto:gffle...@aol.com] Sent: Friday, June 01, 2012 2:34 PM To: Lewis Adam-CAL022 Cc: oauth@ietf.org Subject: Re: [OAUTH-WG] Inter-domain AS/RS communication (revisited) I'm not sure why the dependency on the unstructured token. You can have a small structured token

Re: [OAUTH-WG] Inter-domain AS/RS communication (revisited)

2012-06-01 Thread Lewis Adam-CAL022
, because of my edge cases). Tx! adam -Original Message- From: Justin Richer [mailto:jric...@mitre.org] Sent: Friday, June 01, 2012 3:00 PM To: Lewis Adam-CAL022 Cc: Manger, James H; oauth@ietf.org Subject: Re: [OAUTH-WG] Inter-domain AS/RS communication (revisited) First, I have to give

Re: [OAUTH-WG] Inter-domain AS/RS communication (revisited)

2012-06-01 Thread Lewis Adam-CAL022
-token, in response to an Access Token request? I realize that Connect may be looking to make more ubiquitous, but who does it today? Tx!! adam From: George Fletcher [mailto:gffle...@aol.com] Sent: Friday, June 01, 2012 3:42 PM To: Lewis Adam-CAL022 Cc: Justin Richer; oauth@ietf.org Subject: Re

Re: [OAUTH-WG] Examples of structured tokens in the wild?

2012-04-19 Thread Lewis Adam-CAL022
I would find this useful as well. I've been ramping up on OAuth and have found the lack of standardization of access tokens very frustrating (structured vs. unstructured, if structured then what type of structure, etc). Not being able to understand what type of access tokens are being

Re: [OAUTH-WG] Using OAuth to get a JWT/SAML token

2012-04-19 Thread Lewis Adam-CAL022
external or embedded? Why can't my native client make RESTful API calls to the AS and RS natively? Tx! adam From: Justin Richer [mailto:jric...@mitre.org] Sent: Friday, April 13, 2012 11:38 AM To: Lewis Adam-CAL022 Cc: oauth@ietf.org Subject: Re: [OAUTH-WG] Using OAuth to get a JWT/SAML token

Re: [OAUTH-WG] Using OAuth to get a JWT/SAML token

2012-04-19 Thread Lewis Adam-CAL022
' Original message Subject: Re: [OAUTH-WG] Using OAuth to get a JWT/SAML token From: Lewis Adam-CAL022 adam.le...@motorolasolutions.com To: Justin Richer jric...@mitre.org CC: Re: [OAUTH-WG] Using OAuth to get a JWT/SAML token Hi Justin, There is one thing I have not understood about the whole

Re: [OAUTH-WG] Using OAuth to get a JWT/SAML token

2012-04-19 Thread Lewis Adam-CAL022
, April 19, 2012 5:08 PM To: Lewis Adam-CAL022 Cc: Justin Richer; oauth@ietf.org Subject: Re: [OAUTH-WG] Using OAuth to get a JWT/SAML token A browser isn't required. The browser based flows are pretty common with OAuth but they are certainly not the only way to get a token. The resource owner

Re: [OAUTH-WG] Using OAuth to get a JWT/SAML token

2012-04-13 Thread Lewis Adam-CAL022
Hi Justin ... In your application, to start things off, you fire off a web browser to the authorization server's authorization endpoint. The user logs in to the authorization server through the web browser, approves this copy of your app, and gets redirected to

[OAUTH-WG] Using OAuth to get a JWT/SAML token

2012-04-12 Thread Lewis Adam-CAL022
Hi all, I've been talking to some of you off line about this already, but I need some help in terms of implementation. I would like to use OAuth as a means to get either a JWT or SAML token to a client running on a handheld device. This is something that I'm looking to prototype (as part of

[OAUTH-WG] draft-ietf-oauth-saml2-bearer-10 question

2012-04-05 Thread Lewis Adam-CAL022
Hi, Reading draft-ietf-oauth-saml2-bearer-10, it states: The process by which the client obtains the SAML Assertion, prior to exchanging it with the authorization server or using it for client authentication, is out of scope. Accepting that it's out of scope from the draft, what are the