Re: [OAUTH-WG] Token Chaining Use Case

2015-07-08 Thread Mike Jones
Best wishes, -- Mike From: Justin Richer [mailto:jric...@mit.edu<mailto:jric...@mit.edu>] Sent: Tuesday, July 07, 2015 4:47 PM To: Mike Jones Cc: Brian Campbell; mailto:oauth@ietf.org>> Subject: Re: [OAUTH-WG] Token C

Re: [OAUTH-WG] Token Chaining Use Case

2015-07-08 Thread John Bradley
>>> thinking of the Token Exchange requests as signed requests to the Token >>> Endpoint, just like Nat’s draft makes signed requests to the >>> Authorization Endpoint, is probably a good unifying mental framework for >>> all of us to consider applying to this

Re: [OAUTH-WG] Token Chaining Use Case

2015-07-08 Thread Brian Campbell
t;> > >>Now, a question for the working group… What should the security > >>token type values for access token and refresh token be? Two > >>different choices seem to make sense. > >> > >>(1) Use the values “access_token” and “refresh_t

Re: [OAUTH-WG] Token Chaining Use Case

2015-07-08 Thread Brian Campbell
Agree Sergey. That line of thinking is largely why https://tools.ietf.org/html/draft-campbell-oauth-sts utilizes normal OAuth client authentication. On Wed, Jul 8, 2015 at 3:26 AM, Sergey Beryozkin wrote: > > On 08/07/15 01:41, Mike Jones wrote: > >> [...] That’s why the WG draft uses a JWT as

Re: [OAUTH-WG] Token Chaining Use Case

2015-07-08 Thread Brian Campbell
probably a good unifying mental framework for all of us to consider > applying to this problem space. > > > > Best > wishes, > > -- Mike > > >

Re: [OAUTH-WG] Token Chaining Use Case

2015-07-08 Thread Justin Richer
e values for access token and refresh token be? Two >>different choices seem to make sense. >> >>(1) Use the values “access_token” and “refresh_token”, which are >>used in RFC 6749 token response values. >> >>(2) Define new URNs for this usage, such as >>urn:ietf:params:oauth:token-type:access-t

Re: [OAUTH-WG] Token Chaining Use Case

2015-07-08 Thread Sergey Beryozkin
...@mit.edu] *Sent:* Tuesday, July 07, 2015 4:47 PM *To:* Mike Jones *Cc:* Brian Campbell; *Subject:* Re: [OAUTH-WG] Token Chaining Use Case This approach is not a good fit for my use cases, and it’s still not OAuth-y at all. It requires a specially-formed security assertion on the way in, which the

Re: [OAUTH-WG] Token Chaining Use Case

2015-07-07 Thread Mike Jones
, -- Mike From: Justin Richer [mailto:jric...@mit.edu] Sent: Tuesday, July 07, 2015 4:47 PM To: Mike Jones Cc: Brian Campbell; Subject: Re: [OAUTH-WG] Token Chaining Use Case This approach is not a good fit for my use cases, and it’s

Re: [OAUTH-WG] Token Chaining Use Case

2015-07-07 Thread Anthony Nadalin
I’m not sure how Brian’s approach solves the basic generic token exchange use case that we have From: OAuth [mailto:oauth-boun...@ietf.org] On Behalf Of Justin Richer Sent: Tuesday, July 7, 2015 4:47 PM To: Mike Jones Cc: Subject: Re: [OAUTH-WG] Token Chaining Use Case This approach is not a

Re: [OAUTH-WG] Token Chaining Use Case

2015-07-07 Thread Justin Richer
From: OAuth [mailto:oauth-boun...@ietf.org] On Behalf Of Brian Campbell > Sent: Thursday, March 26, 2015 3:15 PM > To: Justin Richer > Cc: > Subject: Re: [OAUTH-WG] Token Chaining Use Case > > This kind of token exchange might involve exchanges other than swapping an AT > for a

Re: [OAUTH-WG] Token Chaining Use Case

2015-07-07 Thread Mike Jones
ETF 93. -- Mike From: OAuth [mailto:oauth-boun...@ietf.org] On Behalf Of Brian Campbell Sent: Thursday, March 26, 2015 3:15 PM To: Justin Richer Cc: Subject: Re: [OAUTH-WG] Token Chaining Use Case This kind of token exchange might involve exchanges other than swapping an AT for another A

Re: [OAUTH-WG] Token Chaining Use Case

2015-03-26 Thread Bill Mills
Hunt' Cc: oauth@ietf.org Subject: Re: [OAUTH-WG] Token Chaining Use Case    Again, I don't think requiring a call out to an internal token reissuer is a general solution.  That said...  The RS calls the token endpoint treating the AT as a refresh token in all cases and using the refre

Re: [OAUTH-WG] Token Chaining Use Case

2015-03-26 Thread Donald F. Coffin
) 636-8571 Email:<mailto:donald.cof...@reminetworks.com> donald.cof...@reminetworks.com From: Bill Mills [mailto:wmills_92...@yahoo.com] Sent: Thursday, March 26, 2015 6:04 PM To: Bill Mills; Donald F. Coffin; 'Phil Hunt' Cc: oauth@ietf.org Subject: Re: [OAUTH-WG] Token C

Re: [OAUTH-WG] Token Chaining Use Case

2015-03-26 Thread Brian Campbell
This kind of token exchange might involve exchanges other than swapping an AT for another AT (and downscoping it). It might be an AT for a structured JWT specifically targeted at one of the the particular services that the original RS needs to call. Or an AT might be exchanged for a SAML assertion

Re: [OAUTH-WG] Token Chaining Use Case

2015-03-26 Thread Bill Mills
sing Suite EDunwoody, GA 30338-8221  Phone:  (949) 636-8571Email:   donald.cof...@reminetworks.com  From: Bill Mills [mailto:wmills_92...@yahoo.com] Sent: Thursday, March 26, 2015 5:13 PM To: Donald F. Coffin; 'Phil Hunt' Cc: oauth@ietf.org Subject: Re: [OAUTH-WG] Token Chaining

Re: [OAUTH-WG] Token Chaining Use Case

2015-03-26 Thread Pedro Igor Silva
t; Cc: "Phil Hunt" , oauth@ietf.org > Sent: Thursday, March 26, 2015 6:29:41 PM > Subject: RE: [OAUTH-WG] Token Chaining Use Case > > Pedro, > > Although the registry could be changed to support the new type format, how is > that any different than adding a new grant_ty

Re: [OAUTH-WG] Token Chaining Use Case

2015-03-26 Thread Donald F. Coffin
ot;Bill Mills" > To: "Donald F. Coffin" , "Phil Hunt" > > Cc: oauth@ietf.org > Sent: Thursday, March 26, 2015 6:13:05 PM > Subject: Re: [OAUTH-WG] Token Chaining Use Case > > The RS calling back to the AS won't be confused, the token it gets

Re: [OAUTH-WG] Token Chaining Use Case

2015-03-26 Thread Pedro Igor Silva
Mills" > To: "Donald F. Coffin" , "Phil Hunt" > > Cc: oauth@ietf.org > Sent: Thursday, March 26, 2015 6:13:05 PM > Subject: Re: [OAUTH-WG] Token Chaining Use Case > > The RS calling back to the AS won't be confused, the token it gets would be

Re: [OAUTH-WG] Token Chaining Use Case

2015-03-26 Thread Donald F. Coffin
ks.com From: Bill Mills [mailto:wmills_92...@yahoo.com] Sent: Thursday, March 26, 2015 5:13 PM To: Donald F. Coffin; 'Phil Hunt' Cc: oauth@ietf.org Subject: Re: [OAUTH-WG] Token Chaining Use Case The RS calling back to the AS won't be confused, the token it gets would be i

Re: [OAUTH-WG] Token Chaining Use Case

2015-03-26 Thread Bill Mills
: Thursday, March 26, 2015 4:22 PM To: Bill Mills Cc: Subject: Re: [OAUTH-WG] Token Chaining Use Case  +1. We all have to change production code when non final specs evolve.   I particularly don't see this as a valid argument at the start of a standards discussion.  Phil On Mar 26, 2015, at

Re: [OAUTH-WG] Token Chaining Use Case

2015-03-26 Thread Donald F. Coffin
ks.com From: Phil Hunt [mailto:phil.h...@oracle.com] Sent: Thursday, March 26, 2015 4:22 PM To: Bill Mills Cc: Subject: Re: [OAUTH-WG] Token Chaining Use Case +1. We all have to change production code when non final specs evolve. I particularly don't see this as a valid argument at t

Re: [OAUTH-WG] Token Chaining Use Case

2015-03-26 Thread Bill Mills
Requiring a round trip to the AS is going to have a huge headwind for implementation in high performance environments. I think we need to pursue something like what Phil is talking about where the intermediary server has it's own credential or authority.  On Thursday, March 26, 2015 1:25

Re: [OAUTH-WG] Token Chaining Use Case

2015-03-26 Thread Phil Hunt
See below Phil > On Mar 26, 2015, at 15:15, Justin Richer wrote: > > Your service layout will determine whether or not each bit calls the same AS > that issued the original token, since you can easily do it across boundaries > if your AS takes in cross domain tokens. That’s another benefit of

Re: [OAUTH-WG] Token Chaining Use Case

2015-03-26 Thread Phil Hunt
Original message ---- > From: Bill Mills > Date: 03/26/2015 2:24 PM (GMT-06:00) > To: Justin Richer , "" > Subject: Re: [OAUTH-WG] Token Chaining Use Case > > So why can't the access tokne simply be re-used as a refresh token? Why > would it need

Re: [OAUTH-WG] Token Chaining Use Case

2015-03-26 Thread Justin Richer
om my phone / > > > Original message ---- > From: Bill Mills > Date: 03/26/2015 2:24 PM (GMT-06:00) > To: Justin Richer , "" > Subject: Re: [OAUTH-WG] Token Chaining Use Case > > So why can't the access tokne simply be re-used as a refresh

Re: [OAUTH-WG] Token Chaining Use Case

2015-03-26 Thread Justin Richer
Your service layout will determine whether or not each bit calls the same AS that issued the original token, since you can easily do it across boundaries if your AS takes in cross domain tokens. That’s another benefit of having it be a generic token swap, you can build it out using the same mech

Re: [OAUTH-WG] Token Chaining Use Case

2015-03-26 Thread Bill Mills
: 03/26/2015 2:24 PM (GMT-06:00) To: Justin Richer , "" Subject: Re: [OAUTH-WG] Token Chaining Use Case So why can't the access tokne simply be re-used as a refresh token?  Why would it need a new grant type at all? On Thursday, March 26, 2015 11:31 AM, Justin Riche

Re: [OAUTH-WG] Token Chaining Use Case

2015-03-26 Thread Phil Hunt
What if A calls be with it’s own authorization token (server token ST1) and passes AT1 in another header e.g. on-behalf-of. You save a call and can still check the scope downstream. Further, service B and C can each check whether ST1 and ST2 had the right to wield AT1 even when AT1’s POP proof

Re: [OAUTH-WG] Token Chaining Use Case

2015-03-26 Thread Justin Richer
phone / Original message From: Bill Mills Date: 03/26/2015 2:24 PM (GMT-06:00) To: Justin Richer , "" Subject: Re: [OAUTH-WG] Token Chaining Use Case So why can't the access tokne simply be re-used as a refresh token?  Why would it need a new grant type

Re: [OAUTH-WG] Token Chaining Use Case

2015-03-26 Thread Bill Mills
So why can't the access tokne simply be re-used as a refresh token?  Why would it need a new grant type at all? On Thursday, March 26, 2015 11:31 AM, Justin Richer wrote: As requested after last night’s informal meeting, here is the token chaining use case that I want to see repr