Re: [OAUTH-WG] Token Revocation error codes

2022-01-28 Thread Sergey Ponomarev
ing an invalid_request response is > fine. The key is if the value provided for the token parameter is a token, > then the API MUST NOT leak whether the token was valid or not. > > Is this not sufficient? > > On 1/26/22 3:01 PM, Sergey Ponomarev wrote: > > Thank you, Waren, > >

Re: [OAUTH-WG] Token Revocation error codes

2022-01-26 Thread Sergey Ponomarev
*a token that has already been invalidated.* And I > would interpret all other tokens as justifications for returning a 4XX > status code. > > Warren Parad > > Founder, CTO > Secure your user data with IAM authorization as a service. Implement > Authress <https://authress.io/>.

Re: [OAUTH-WG] Token Revocation error codes

2022-01-26 Thread Sergey Ponomarev
ding to CC authors of the spec On Tue, 22 May 2018 at 20:29, Sergey Ponomarev wrote: > > What is also should be discussed and specified is revoking of expired token. > For example in Keycloak you can invalidate a session by expired token: >> >> It should be possible to logou

[OAUTH-WG] Implicit Grant Flow for authentication on both Client UI and Back End by OIDC id_token verification

2022-01-18 Thread Sergey Ponomarev
Hello OAuth experts, I developed a new Grant Flow based on the Implicit Grant Flow and OIDC and I would like to ask for it's review. I hope it's safe, but maybe I missed something. I'll appreciate any feedback. The Implicit grant flow was intended for authorising clients which can't store the `cl

[OAUTH-WG] Grant flow for delegated auth

2018-05-24 Thread Sergey Ponomarev
rCD%0A4XB1CKKumZvCedgHHF3IAK4dVEDSUoGlH9z4pP_eWYNXvqQOjGs-rDaQzUHl%0A6cQQWNiDpWOl_lxXjQEvQ' And response contains access_token. So my question is: maybe something similar already exists in specification? If no, then what usually used in this case? Regards, Sergey Ponomarev <https:/

Re: [OAUTH-WG] Token Revocation error codes

2018-05-22 Thread Sergey Ponomarev
s.org/browse/KEYCLOAK-3302> Think this is doubtful but makes sense. To summarize: we have to create some threat model with description of possible use cases. On Tue, 22 May 2018 at 18:18, Sergey Ponomarev wrote: > From OAuth perspective we can't say that the token should have som

Re: [OAUTH-WG] Token Revocation error codes

2018-05-22 Thread Sergey Ponomarev
marc.ietf.org> wrote: >> >> I'm not understanding how these different cases matter to the client? I >> doubt that the running code will be able to dynamically handle the error.. >> So it seems this information is only relevant to the developers and not >> relevant

Re: [OAUTH-WG] Token Revocation error codes

2018-05-22 Thread Sergey Ponomarev
ou define, the effect of calling revocation is > still that the token is "revoked" because the token is already not valid. > > So from an implementation perspective, where is the concern that developer > will do the "wrong thing" without these more detailed error r

[OAUTH-WG] Token Revocation error codes

2018-05-19 Thread Sergey Ponomarev
. But it would be better to mention that revocation of ID token (which can be is considered as "public" and not used to auth) definitely should cause this error. It would be great if we discuss this cases and improve specification. P.S. Also it may be worse to mention that specificat